The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we will propose a data hiding method to embed the color information into the grayscale image and then only authorized users can recover the original color image. At the same time, according to the viewer's reliability, image owners can distribute the different embedding color image information. In other words, they will assign the more closer to the original image color information...
Due to the development of internet rapidly, the secure transmission of information has become more and more importance. Until now, there are many scholars study in the topic of data hiding. Specially, the reversible data hiding scheme catch the researcher's attention. No matter how the researchers use the different technology to embed the secret information, they always try to increase the hide space...
Yang et al. (2007) showed that the Lin-Tsai scheme has three weaknesses and further proposed improvements in 2007. They are not only improve authentication ability and image quality of stego-image, but also introduce a lossless image sharing scheme for secret image. Unfortunately, the embedding algorithm in their scheme is obviously not optimal. To enhance Yang et al.psilas scheme, a novel secret...
Recently, Hwang et al. (HKC) proposed a simple improvement reversible data hiding scheme based on the histogram shift. They claim that the read don't send any additional information to the receiver in their scheme. However, it will generate an informal distribution in the histogram when the secret data is embedded into a cover image. In this paper, we will use this defect to propose a method to show...
Recently, the reversible data hiding has become a hot research topic. Its major characteristic is that allows an original image to be completely reconstructed from the stego-image after the extraction of the embedded data.2006, the reversible data hiding based on histogram was proposed by Ni, et al. (NSAS). However, the receiver can not recover the secret data unless he knows the peak point information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.