A method embedding email address into digital images

  • Yan Ping Zhang*
  • , Juan Jiang
  • , Z. X. Yin
  • , Chen Chu Xu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Generally, being an efficient information hiding system, what we want to achieve is the high embedding capacity of the cover image (i.e. the image used to imply secret message as a carrier) and the high visual quality of the stego image (i.e. the image that has carried secret message). The method we proposed in this paper was used to embed an email address into an 8-bit grayscale cover image to complete the secret data transmission between the sender and the receiver. Inspiring from the "Hamming+1" method proposed by Zhang et al. and the previous methods, we embed twelve secret bits of the binary string of the secret message, which was converted from an email address, into a block of 4x4 cover pixels of a cover image sized 512x512 each time. The experimental results show that the proposed method achieves high embedding capacity and acceptable visual quality of the stego image.

Original languageEnglish
Title of host publicationICCSE 2010 - 5th International Conference on Computer Science and Education, Final Program and Book of Abstracts
Pages346-350
Number of pages5
DOIs
StatePublished - 2010
Externally publishedYes
Event5th International Conference on Computer Science and Education, ICCSE 2010 - Hefei, China
Duration: 24 Aug 201027 Aug 2010

Publication series

NameICCSE 2010 - 5th International Conference on Computer Science and Education, Final Program and Book of Abstracts

Conference

Conference5th International Conference on Computer Science and Education, ICCSE 2010
Country/TerritoryChina
CityHefei
Period24/08/1027/08/10

Keywords

  • Embedding capacity
  • Hamming code
  • Least significant bits
  • The "hamming+1" method
  • Visual quality

Fingerprint

Dive into the research topics of 'A method embedding email address into digital images'. Together they form a unique fingerprint.

Cite this