The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the development of sensor technologies and network technologies has rapidly improved, generating high volumes of data every second. To deal with the massive volumes of data created from the Internet of things (IoT) environment, the open source framework, Hadoop, has been developed and widely used in every domain. This study proposes a method improved the efficiency of K-Medoids algorithm...
Reversible data hiding (RDH), also known as lossless data embedding, is increasingly attracting more attentions of academic and industry researchers intrigued by their affordances and reach. Recently, various pixel value ordering (PVO) predictors for RDH methods with remarkable embedding performance have been proposed. These PVO-based schemes have good performance in high fidelity images but low in...
Recently, a novel reversible data hiding method based on pixel value ordering, also called PVO, has been widespread concerned by the researchers in the field of data hiding, because the incorporation of PVO-based reversible data hiding reduces pixels modification, and thus it can contribute in the high fidelity of image quality. To date, several improvements of the PVO method originated form Li et...
The data explosion brings several difficult challenges. One of critical and fundamental challenges is to have a storage infrastructure that can store and manage such voluminous information to meet business goals, such as cost, performance, reliability, and availability. To reduce the storage cost and improve data access performance, it is typically required a storage management solution based on Information...
Data hiding has been used to send sensitive information that is hidden in another signal/object, such as in audio or image data. The cover and marked signals are indistinguishable, so that they remain imperceptible to the human senses. Chang et al. proposed a dual-image data hiding method, which uses a magic matrix to embed secret data. Even though the peak signal-to-noise ratio (PSNR) of the image...
The paper is an extension of the Enhanced Neighbor Mean Interpolation (ENMI) scheme based data hiding from Chang et al., in hopes of raising the embedding capacity with limited image distortion. The scheme combines the advantages of ENMI scheme and the techniques of pixel shifting and direction modification in a reversible manner, to increase the embedding capacity, while maintaining satisfactory...
An Adjustable Frequency Bat Algorithm (AFBA) is proposed to improve solution accuracy for optimization problem in this study. The conception is to employ the adjustable frequency determined by flight direction of bats to adapt the velocity toward the correct direction. The bats emit an ultrasound with various frequencies decided by flight direction to the current best bat. The adjustable frequency...
This paper is a two staged multi-layer reversible data hiding scheme based on Lagrange interpolation. Lagrange interpolation will cross applied on odd and even pixels to produce predicted images, and then histogram shifting modification will be applied to embed confidential data into the differences between predicted and original images. The experimental results show the quality of Lena image from...
Typically instant messaging software has to install inside the computer. By this way, the evidence could be therefore probed from the relative paths after operating it by the forensic procedures. Accompanying the appearance of the Web version of the instant messaging, this situation is changed accordingly. It has become a new challenge about the Information-volatile attributes and the data generated...
Data confidentiality is a critical issue in today¡¦s computing environment. When data are exchanged via ubiquitous computing devices, they become even more vulnerable to malicious people since eavesdropping are easy. Data hiding, a technique to hide data into cover media, can reduce the risks of eavesdropping. In this paper, we propose a steganographic scheme based on vector quantization (VQ) that...
In 2006, Zhang and Wang proposed the Exploiting Modification Direction method (EMD) technique, which has good embedding capacity (about 1.16bpp) and high image quality (about 52dB) in irreversible data hiding field. Later other scholars have continued making improvements on EMD to increase data embedding capacity. However, these methods do not possess reversibility. Therefore, this paper exploits...
Loss less data hiding can extract the embedded secret data and restore the cover media to its original status. Wang et al. in 2010 proposed a loss less data hiding method to embed secret message on VQ indices but their scheme has the encoded bit stream over-expanded. This paper improves their embedding approach by employing the index clusters with localization to enhance the similarity of adjacent...
Zhang et al. in 2006 proposed a data hiding technique called Exploiting Modification Direction (EMD) with good capacity and high image quality. Related follow-up improvements are proposed by other scholars to raise the change between pixel values thus increasing the capacity and without reversibility. This paper utilizes the high image quality feature of EMD to develop a reversible data hiding method...
Reversible data hiding technique makes it possible to extract out embedded secret data and restore the cover image without any distortion. In 2010, Wang et al. proposed a lossless data hiding technique based on vector quantization (VQ) compression encoding. It uses difference values around index to design three strategies for embedding secret data. However, length of encoding hugely expands after...
In 2010, Chen et al. proposed a data hiding scheme with high payload and good visual quality. The edge information is detected and most of the secret bits are embedded into the edge area. An index pixel is chosen to record the edge information for each block. However, the embedding space will decrease because of the index pixel. Thus, we proposed a data hiding that enhances the visual quality based...
Passwords and smart cards have been widely utilized to remotely authenticate users for system security and users' convenience. However, it is not always safe or convenient for users to type in their passwords or carrying their personal cards. In such circumstances, pressing one's fingerprint instead of typing passwords and carrying personal smart cards is much more convenient, safer and more practical...
In this paper, we propose an adaptive embedding algorithm for VQ-compressed images. Adjusting the predefined distance threshold according to the required image visual quality, the proposed algorithm-which is designed as a codeword arrangement strategy-clusters a number of similar codewords together such that a codeword in a group can embed a sub-message while preserving embedding capacity and achieving...
This paper proposes a data hiding with high visual quality in stego-images so that malicious invaders are hardly aware of the existence of the embedded message. Due to high visual quality and good embedding capacity, we also apply our scheme with region of importance (ROI) for protecting the important part of an image. The overload, location map of ROI, is compressed with run length encoding (RLE)...
This paper demonstrates an effective lossless data hiding scheme using modified Huffman coding. The binary secret message is concurrently embedded and encoded with a cover medium such as a video file, an audio file, or even a text file. The proposed scheme not only provides good data hiding capacity and data recovery capability, but also being efficient in space saving (the stego medium is much smaller...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.