PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper, we present a spatial domain Image hiding scheme that embeds secret data in a gray-level image. Our scheme is inspired from Wu and Tsai's scheme that embeds secret bits in the difference values of consecutive pixels. To improve the hiding capacity of their scheme, the overlapping concept is proposed to produce more difference values from the cover image in this paper. Experimental results show that our scheme provides an average hiding capacity gain of 84.16% over Wu and Tsai's scheme while maintaining satisfactory image quality.
Słowa kluczowe
Wydawca
Rocznik
Strony
171--184
Opis fizyczny
fot., tab., bibliogr. 20 poz.
Twórcy
autor
autor
autor
  • Department of Computer Science and Information Engineering, Providence University, Taichung, Taiwan, 433, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
  • [1] Hwang,M. S., Chang, C. C., Hwang, K. F.: DigitalWatermarking of Images Using NeuralNetworks, Journal of Electronic Imaging, 9(4), 2000, 548-555.
  • [2] Hwang, M. S., Chang, C. C., Hwang, K. F.: A Watermarking Technique Based on One-Way Hash Functions, IEEE Transactions on Consumer Electronics, 42(2), 1999, 286-294.
  • [3] DES Encryption Standard (DES), National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, 1997.
  • [4] Rivest, R., Shamir, A., Adleman, L.:A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, 21(2), 1978, 120-126.
  • [5] Katzenbeisser, S., Petitcolas, F. A. P.: Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 2000.
  • [6] Anderson, R., Petitcolas, F.: On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, 16(4), 1998, 471-478.
  • [7] Bender, W., Gruhl, D., Morimoto, N.:Techniques for Data Hiding, Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases III, San Jose, CA, 1995, 164-173.
  • [8] Bourbakits, N., Alexopoulos, C.: Picture Data Encryption Using Scan Patterns, Pattern Recognition, 25(6), 1992, 567-581.
  • [9] Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding, IBM Systems Journal, 35(3&4), 1996, 313-336.
  • [10] Lou, D. C., Liu, J. L.: Steganographic Method for Secure Communications, Computer and Security, 21(5), 2002, 449-460.
  • [11] Chen, T. S., Chang, C. C., Hwang, M. S.: Virtual Image Cryptosystem Based upon Vector Quantization, IEEE Transactions on Image Processing, 7(10), 1998, 1485-1488.
  • [12] Chang, C. C., Chen, T. S., Chung, L. Z.: A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, 141(2), 2002, 123-138.
  • [13] Wu, D. C., Tsai, W. H. : Spatial-Domain Image Hiding Using an Image Differencing, IEE Proceedings -Vision, Image and Signal Processing, 147(1), 2000, 29-37.
  • [14] Chang, C. C., Lin, M. H., Hu, Y. C.: A Fast and Secure Image Hiding Scheme Based on LSB Substitution, International Journal of Pattern Recognition and Artificial Intelligence, 16(4), 2002, 399-416.
  • [15] Chang, C. C., Hsiao, J. Y., Chan, C. S.: Finding Optimal LSB Substitution in Image Hiding by Using Dynamic Programming Strategy, Pattern Recognition, 36, 2003, 1583-1595.
  • [16] Hsu, C. T., Wu, J. L.: Hidden Digital Watermarks in Images, ,IEEE Transactions on Image Processing, 8(1), 1999, 58-68.
  • [17] Wu, D. C., Tsai,W. H.: A SteganographicMethod for Images by Pixel-Value Differencing, Pattern Recognition Letters, 24, 2003, 1613-1626.
  • [18] Cox, I. J., Kilian, J., Leighton, F. T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia, IEEE Transactions on Image Processing, 6(12), 1997, 1673-1687.
  • [19] Wu, D. C., Tsai,W. H.: Data Hiding in Images via Multiple-Based Number Conversion and Lossy Compression, IEEE Transactions on Consumer Electronics, 44(4), 1998, 1406-1412.
  • [20] Chao, H.M., Hsu, C.M.,Miaou, S. G.: A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records, IEEE Transactions on Information Technology in Biomedicine, 6(1), 2002, 46-53.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0009-0053
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.