The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lee and Huang proposed a dual-image reversible data hiding method to protect the confidential data in 2011. The image quality obtained by the method is good because each pixel in the cover image is modified by only adding or subtracting one to generate the stego image. However, in their method, each set of four cover pixels can only embed five confidential bits, thereby restricting the embedding rate...
In 2010, Chen et al. proposed a data hiding scheme with high payload and good visual quality. The edge information is detected and most of the secret bits are embedded into the edge area. An index pixel is chosen to record the edge information for each block. However, the embedding space will decrease because of the index pixel. Thus, we proposed a data hiding that enhances the visual quality based...
This paper proposes a data hiding with high visual quality in stego-images so that malicious invaders are hardly aware of the existence of the embedded message. Due to high visual quality and good embedding capacity, we also apply our scheme with region of importance (ROI) for protecting the important part of an image. The overload, location map of ROI, is compressed with run length encoding (RLE)...
An edge in an image is the boundary between two different regions. Edge detection is important in image processing and computer vision, particularly in the area of feature detection. An edge often indicates the physical extent of object within the image. An edge detection process ultimately aims to obtain a binary edge map. In this paper, we propose a new scheme for edge detection. It is simple but...
Wet paper coding is a technique that can be used to embed secrets into some specific pixels, called dry pixels, of a digital image. The fully exploiting modifications method (FEM) is a method applied to convey secrets securely from senders to receivers using a stego-image that is slightly modified from the original digital image. Based on FEM, before embedding, we randomly choose pixels in the image...
This paper demonstrates an effective lossless data hiding scheme using modified Huffman coding. The binary secret message is concurrently embedded and encoded with a cover medium such as a video file, an audio file, or even a text file. The proposed scheme not only provides good data hiding capacity and data recovery capability, but also being efficient in space saving (the stego medium is much smaller...
In this paper, we propose an information hiding scheme to embed secret information into the compression code of an index table. First, the codewords neighboring the current processed index along with their closest codewords form a state codebook. Two indices of the state codebook are reserved as indicators. Once the current processed index satisfies some pre-defined conditions, the current processed...
This paper proposes a data hiding method by secret sharing. The proposed method embeds a k-bit secret digit in a secret message (i.e., a bit stream, a secret image) into a cover pixel of a grayscale cover image at a time by generating two shadow pixels. The two shadow images produced by the proposed scheme are meaningful. The experimental results show that the proposed scheme achieves good visual...
The wet paper codes method provides a good data embedding technique for secret data delivery. The WPC method applies matrix multiplications to determine modification locations in order to conceal secret data into a cover image. However, the WPC method is not suitable for low power computation environments. The proposed method applies pixel segmentation and exclusive-OR operation to achieve the goal...
Steganography is a study to hide secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. In this paper, a novel scheme is proposed to hide data in 8-bits gray-scale cover image based on a 256times256 secret reference matrix (SRM) which was constructed by using a 3times3 table with unrepeated digits from 0~8. Experimental...
In this paper, a good data hiding scheme has been proposed. This scheme embeds messages into a still image based on (Fridrich, et.al; 2005; Dumitrescu, et.al; 2003) Hamming codes oriented wet paper codes . It embeds a segment of three secret bits into a group of seven cover pixels at a time. The experimental results show that the proposed scheme achieves high embedding efficiency and acceptable capacity.
A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding...
In this paper, we propose a simple reversible data hiding method in spatial domain for digital images by exploiting the correlation characteristic of neighboring pixels in natural images. The proposed method embeds several secret bits into a block of two consecutive cover pixels whose values are equal. The experimental results show that the proposed method achieves very good visual quality at low...
This paper proposes a novel data embedding method for embedding secrets into VQ indices by using the Chinese Remainder Theorem (CRT). In the experimental results, the hiding capacity is flexible which corresponds to the pre-defined prime parameters. In addition, a reversible mechanism is imported into the scheme so the original VQ indices can be restored after extracting secrets retrieval.
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the proposed scheme generates the watermark block-by-block in the cover image. To improve security by preventing malicious attacks, such as the vector quantization attack, a pseudo-random number generator using a private key...
This paper proposes an information hiding method based on block-segmentation strategy. The proposed scheme divides a grayscale image into several 4 times 4 blocks and further segment each block into four small blocks sized 2 times 2. Each small block chooses one reference point to be proceeded with outer embedding process. The chosen points then formed an inner block to be proceeded with inner embedding...
In this paper, we proposed a novel (2, 2) secret sharing scheme applied for grayscale images. This scheme can produce two noise-like shared images that help avoid a secret image being grabbed. The construction phase of shared image consists of producing two shared images of the secret image by a (7, 4) Hamming code operation. To prevent attackers from forging shared images, a logo is embedded into...
We proposed a visual cryptography scheme based on Tu and Houpsilas visual cryptographic method to enhance the contrast and visibility for gray-level images. With more detailed distribution of codebooks, we could get good identification for those vertical edges of secret image. Especially, the smaller the image size, the better the contrast. Besides strengthening the reorganization, ours proposed scheme...
Authorization takes a significant role in grid security, and the function of the agent is more and more obvious in the grid environment. However, some popular grid toolkits (e.g., Globus) do not support agent technology. In order to enhance the real-time validity of the authorization process, lighten the userspsila burden, reduce the cost of management and apply intelligent authorization, this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.