PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Tree Structure Based Data Hiding for Progressive Transmission Images

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Progressive image transmission (PIT) is supported by several encoders such as SPIHT, JPEG2000 and so on. However, few of data hiding scheme for progressive transmission images is designed. In this paper, tree-structure-based data hiding for set partitioning in hierarchical trees (SPIHT) images is proposed. The bit stream of SPIHT multi-stage encoded was structured of tree. The secret image can be progressively embedded into SPIHT bit trees. Experimental results showed the progressive image data hiding is achieved. The secret image is progressively embedded/extracted in SPIHT encoded images. Furthermore, a higher hiding capacity was provided in an earlier encoding which helped the secret image to be identified earlier. Also, an adaptive hiding capacity could be developed by using different tree structures. In comparison with Tsai et al.'s scheme, the proposed scheme had a higher hiding capacity and a better secret image quality.
Wydawca
Rocznik
Strony
257--275
Opis fizyczny
Bibliogr. 16 poz., tab., wykr.
Twórcy
autor
  • Department of Computer Science and Information Engineering, National United University, Miaoli, 360, Taiwan, ROC, pytsai@nuu.edu.tw
Bibliografia
  • [1] Artz, D.: Digital Steganography: Hiding Data within Data, IEEE Internet Computing, 5(3), 2001, 75 -80.
  • [2] Lee, Y. K., Chen, L. H. : High Capacity Image Steganographic Model, Proceedings of IEE International Conference on Vision, Image and Signal Processing, 147(3), 2000, 288 -294.
  • [3] Wang, R. Z., Lin, C. F., Lin, J. C. : Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34(3), 2001, 671 -683.
  • [4] Hu, Y. C. , Tsou, C. C. and Su, B. H. : Grayscale Image Hiding Scheme Based on Modulus Function and Greedy Method, Fundamenta Informaticae, 86(1-2), 2008, 113-126.
  • [5] Wu, D. C. and Tsai, W. H., : A Steganographic Method for Images by Pixel-Value Differencing, Pattern Recognition Letters, 24, 2003, 1613-1626.
  • [6] Chang, C. C., Chuang, J. C. and Hu, Y. C., : Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing, Fundamenta Informaticae, 70( 3), 2006, 171-184.
  • [7] Wang, R. Z., and Chen, Y. S. : High-payload image steganography using two-way block-matching, IEEE Signal Process. Letters. 13(3), 2006, 161-164.
  • [8] Almohammad, A., Hierons R. M. and Ghinea, G. : High Capacity SteganographicMethod Based upon JPEG, Proceedings of IEEE International Conference on Availability, Reliability and Security, 2008, 544-549.
  • [9] Lin, C. Y. and Ching, Y. T.: A Robust Image HidingMethod UsingWavelet Technique, Journal of Information Science and Engineering. 22, 2006, 163-174.
  • [10] Wang, Y. Y and Yu, Y. B., : An adaptive data hiding in wavelet domain based on texture analysis of image, Proceedings of International Conference on Audio, Language and Image processing (ICALIP), 2008, 1369-1372
  • [11] Kobayashi, H., Noguchi, Y., Kiya, H. : A Method of Embedding Binary Data into JPEG Bitstreams, IEICE Transactions,, J83-D2(6), 2000, 1469 -1476.
  • [12] Spaulding, J., Noda, H., Shirazi, M. N., Kawaguchi, E. : BPCS Steganography Using EZW Lossy Compressed Images, Pattern Recognition Letters, 23(13), 2002, 1579 -1587.
  • [13] Tsai, P., Hu, Y. C., Chang, C. C. : A Progressive Secret Reveal System Based on SPIHT Image Transmission, Signal Processing: Image Communication, 9(3), 2004, 285 -297.
  • [14] Said, A., Pearlman, W. A. : A new fast and efficient image coder based on set partitioning in hierarchical trees, IEEE Trans. Circuits Syst. Video Technol. 6(3),1996, 243-250.
  • [15] Pan, H. K., Chen, Y. Y. and Tseng, Y. C.: A secure data hiding scheme for two-color images, IEEE Proceedings of the Fifth Symposium on Computers and Communications (ISCC 2000), Antibes, France, July 2000, 750-755.
  • [16] Li, Y. M., Au, O. C., Lai, K. K., Yuk, K. M. and Lam, S. Y.: Data Hiding with Tree Based Parity Check, IEEE International Conference on Multimedia and Expo. July 2007, 635-638.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0010-0014
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.