Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is AQE (Adaptive Quantization Embedder)

Handbook of Research on Secure Multimedia Distribution
The AQE is the embedding function that can be used to make adaptive steganography. With the changes of the sizes of the quantizers of AQE, the amount of message bits that can be embedded changes.
Published in Chapter:
Adaptive Image Steganography Based on Structural Similarity Metric
Guangjie Liu (Nanjing University of Science and Technology, China), Shiguo Lian (France Telecom R&D (Orange Labs) Beijing, China), Yuewei Dai (Nanjing University of Science and Technology, China), and Zhiquan Wang (Nanjing University of Science and Technology, China)
Copyright: © 2009 |Pages: 18
DOI: 10.4018/978-1-60566-262-6.ch024
Abstract
Image steganography is a common form of information hiding which embeds as many message bits into images and keep the introduced distortion imperceptible. How to balance the trade-off between the capacity and imperceptibility has become a very important issue in the researches of steganography. In this chapter, we discuss one kind of the solution for disposing the trade-off, named adaptive image steganography. After a brief review, we present two methods based on structural similarity metric. The first one is based on the generalized LSB, in which the substitution depth vector is obtained via the dynamic programming under the constraint of an allowable distortion. The second method is proposed to use adaptive quantization-embedder to carry message bits. Different from the first method, the distortion index is constructed by contrast-correlation distortion. The other difference is that the parameters of the adaptive quantization embedder are embedded into the image containing message bits by the reversible da a hiding method. Beside that, we also bring forward some attractive directions worthy of being studied in the future. Furthermore, we find that the existing methods do not have a good way to control the amount of information and the distortion as an extract manner, and most schemes are designed just according to the experiences and experiments.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR