{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T19:52:22Z","timestamp":1672257142818},"reference-count":7,"publisher":"World Scientific Pub Co Pte Lt","issue":"06","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2003,9]]},"abstract":"<jats:p> The typical model of steganography has led the prisoners' problem, in which two persons attempt to communicate covertly without alerting the warden, that is, only the receiver knows the existence of the message sent by the sender. One available way to achieve this task is to embed the message in an innocuous-looking medium. In this paper, we propose a variation of the Quantization Index Modulation (QIM) for solving the prisoners' problem. We also propose a theorem to show that the error of mean intensity value of an image block caused by JPEG compression is bounded. The proposed method embeds the messages to be conveyed by modifying the mean intensity value, and the resulting stego-image can be stored in the JPEG format with a low quality setting. Besides, a specific pattern caused by using the QIM embedding method is also identified, and this pattern will be removed using the proposed embedding method. Experimental results and the proposed theorem show that the hidden message is error-free against the JPEG distortion under the quality setting as low as 25. Furthermore, the existence of the hidden message is not only visually imperceptible but also statistically undetectable. <\/jats:p>","DOI":"10.1142\/s021800140300268x","type":"journal-article","created":{"date-parts":[[2003,8,30]],"date-time":"2003-08-30T01:24:37Z","timestamp":1062206677000},"page":"967-981","source":"Crossref","is-referenced-by-count":15,"title":["Secure Error-Free Steganography for JPEG Images"],"prefix":"10.1142","volume":"17","author":[{"given":"Yeuan-Kuen","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu, Taiwan  30050, ROC"}]},{"given":"Ling-Hwei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu, Taiwan  30050, ROC"}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"rf6","first-page":"22","author":"Fridrich J.","journal-title":"Mag. IEEE Multimedia (Special Issue on Security)"},{"key":"rf9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1998.4655281"},{"key":"rf12","volume-title":"The Codebreakers \u2014 The Compressive History of Secret Communication from Ancient Times to the Internet","author":"Kahn D.","year":"1996"},{"key":"rf13","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"Katzenbeisser S.","year":"2000"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.1109\/83.777088"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S021800140300268X","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T02:20:37Z","timestamp":1565144437000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S021800140300268X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,9]]},"references-count":7,"journal-issue":{"issue":"06","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2003,9]]}},"alternative-id":["10.1142\/S021800140300268X"],"URL":"https:\/\/doi.org\/10.1142\/s021800140300268x","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"value":"0218-0014","type":"print"},{"value":"1793-6381","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,9]]}}}