Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Structural Similarity Metric

Handbook of Research on Secure Multimedia Distribution
The structural similarity metric is the image quality index proposed by Wang and Bovik at about 2000, which models any distortion as a combination of the loss of correlation, mean distortion and variance distortion. The Q index and SSIM are two realization of the structural similarity metric.
Published in Chapter:
Adaptive Image Steganography Based on Structural Similarity Metric
Guangjie Liu (Nanjing University of Science and Technology, China), Shiguo Lian (France Telecom R&D (Orange Labs) Beijing, China), Yuewei Dai (Nanjing University of Science and Technology, China), and Zhiquan Wang (Nanjing University of Science and Technology, China)
Copyright: © 2009 |Pages: 18
DOI: 10.4018/978-1-60566-262-6.ch024
Abstract
Image steganography is a common form of information hiding which embeds as many message bits into images and keep the introduced distortion imperceptible. How to balance the trade-off between the capacity and imperceptibility has become a very important issue in the researches of steganography. In this chapter, we discuss one kind of the solution for disposing the trade-off, named adaptive image steganography. After a brief review, we present two methods based on structural similarity metric. The first one is based on the generalized LSB, in which the substitution depth vector is obtained via the dynamic programming under the constraint of an allowable distortion. The second method is proposed to use adaptive quantization-embedder to carry message bits. Different from the first method, the distortion index is constructed by contrast-correlation distortion. The other difference is that the parameters of the adaptive quantization embedder are embedded into the image containing message bits by the reversible da a hiding method. Beside that, we also bring forward some attractive directions worthy of being studied in the future. Furthermore, we find that the existing methods do not have a good way to control the amount of information and the distortion as an extract manner, and most schemes are designed just according to the experiences and experiments.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR