PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Multiple Images Embedding Scheme Based on Moment Preserving Block Truncation Coding

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A low-complexity grayscale image embedding scheme that can embed multiple secret images is proposed in this paper. In this scheme, different users can extract different secret images according to the secret keys they hold. To reduce the storage cost of the secret images, each of the secret images is first compressed using an improved version of the moment preserving block truncation coding scheme. The compressed message of each secret image is then encrypted by the DES cryptography system with different secret key and then embedded into the host image using the modulus least-significant-bit substitution technique. According to the experimental results, it is shown that the proposed scheme consumes a little computational cost. Besides, different users can extract different number of secret images. In other words, the proposed scheme indeed provides a good approach for the hiding of grayscale images with access control.
Słowa kluczowe
Wydawca
Rocznik
Strony
373--387
Opis fizyczny
bibliogr. 18 poz., fot.,tab.,wykr.
Twórcy
autor
  • Department of Computer Science and Information Engineering, Providence University, Shalu 433, Taichung, Taiwan, R.O.C., ychu@pu.edu.tw
Bibliografia
  • [1] Bender, W., Gruhl, D., Morimoto, N.:Techniques for Data Hiding, Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases III, San Jose, CA, 1995, 164-173.
  • [2] Petitcolas, F. A. P., Anderson, R. J., Kuhn, M. G.:Information Hiding - A Survey, Proceedings of the IEEE, 87(7), 1999, 1062-1078.
  • [3] Wang, R. Z., Lin, C. F., Lin, J. C.:Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34(7), 2001, 671-683.
  • [4] Chang, C. C., Lin, M. H., Hu, Y. C.: A Fast and Secure Image Hiding Scheme Based on LSB Substitution, International Journal of Pattern Recognition and Artificial Intelligence, 16(4), 2002, 399-416.
  • [5] Thien, C. C., Lin, J. C.:A Simple and High-hiding Capacity Method for Hiding Digit-by-digit Data in Images Based on Modulus Function, Pattern Recognition, 36(12), 2003, 2875-2881.
  • [6] Lin,M. H., Hu, Y. C., Chang, C. C.: Both Color and Gray Scale Images Hiding in a Color Image, International Journal of Pattern Recognition and Artificial Intelligence, 2002.
  • [7] Chen, T. S., Chang, C. C.,Hwang, M. S.: A Virtual Image Cryptosystem Based on Vector Quantization, IEEE Transactions on Image Processing, 7(10), 1998, 1485-1488.
  • [8] Linde, Y., Buzo, A., Gray, R. M.: An Algorithm for Vector Quantizer Design, IEEE Trans. on Communs., COM-28, 1980, 84-95.
  • [9] Hu, Y. C., Chang, C. C.: An Effective Codebook Search Algorithm for Vector Quantization, Imaging Science Journal, 51(4), 2003, 221-234.
  • [10] Hu, Y. C.: A Gray-level Image Hiding Scheme Based on Vector Quantization, Electronics Letters, 39(2), 2003, 202-203.
  • [11] Chang, C. C., Chen, T. S., Chung, L. Z.: A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, 141(2), 2002, 123-138.
  • [12] Spaulading, J., Noda, H., Shirazi, M. N., Kawaguchi, E.: BPCS Steganography Using EZW Lossy Compressed Images, Pattern Recognition Letter, 23(2), 2002, 1579-1587.
  • [13] Noda, H., Spaulading, J., Shirazi, M. N., Kawaguchi, E.: Application of Bit-plane Decomposition Steganography to JPEG2000 Encoded Image, IEEE Signal Processing Letters, 9(12), 2003, 410-413.
  • [14] Delp, E. J., Mitchell, O. R.: Image Coding Using Block Truncation Coding, IEEE Transactions on Communications, 27, 1979, 1335-1342.
  • [15] Franti, P., Nevalainen, P., Kaudoranta, T.: Compression of Digital Image by Block Truncation Coding: A Survey, Computer Journal, 37(4), 1994, 308-332.
  • [16] Ward, R. K., Morse, D. J.: Adaptive Compression Coding, IEEE Transactions on Communications, 39(7), 1991, 1245-1254.
  • [17] Hu, Y. C.: Predictive Grayscale Image Coding Scheme Using VQ and BTC, Fundamenta Informaticae, (Under Revision).
  • [18] DES Encryption Standard (DES), National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, April 1997.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0015-0041
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.