3,969 Hits in 4.0 sec

Low Bit-Rate and High Fidelity Reversible Data Hiding [article]

Xiaochao Qu, Suah Kim, Run Cui, Hyoung Joong Kim
2015 arXiv   pre-print
As a result, the proposed method can obtain very high fidelity marked images with low bit-rate data embedded.  ...  The experimental results show that the proposed method outperforms the state-of-the-art low bit-rate reversible data hiding method.  ...  In this paper, a low bit-rate and high fidelity reversible data hiding method is proposed.  ... 
arXiv:1507.08075v1 fatcat:kiakbw6rdbd35e7giqsf7em2by

Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues

Ching-Chun Chang, Chang-Tsun Li, Kaimeng Chen
2019 IEEE Access  
The experimental results showed significant improvements over the state-of-the-art methods with regard to capacity, fidelity, and reversibility.  ...  , and electronic data management.  ...  Overall, our scheme achieves high fidelity due to the fact that the watermarking process does not necessarily alter all the bits of changeable symbols, and attains high capacity by embedding two bits into  ... 
doi:10.1109/access.2019.2908924 fatcat:32v2fc4rdzb5rmsmebkqiwgkj4

Reversible Data Hiding for DICOM Image Using Lifting and Companding

Amit Phadikar, Poulami Jana, Himadri Mandal
2019 Cryptography  
In this work, a reversible watermarking technique is proposed for DICOM (Digital Imaging and Communications in Medicine) image that offers high embedding capacity (payload), security and fidelity of the  ...  In the embedding process, the companding technique is used to increase the data hiding capacity.  ...  Data Decoding Step 1: Image transformation: Decompose the watermarked image (I w ) into 4-subbands, i.e., low-low (LL), high-low (HL), low-high (LH), and high-high (HH), using lifting.  ... 
doi:10.3390/cryptography3030021 fatcat:2icxbibq6jhrdjlli2zasgucr4

Current status and key issues in image steganography: A survey

Mansi S. Subhedar, Vijay H. Mankar
2014 Computer Science Review  
Digital watermarking is another branch of information hiding. Both steganography and watermarking are the methods of data embedding, but there are several differences among them.  ...  Image steganography Steganalysis Image quality measures A B S T R A C T Steganography and steganalysis are the prominent research fields in information hiding paradigm.  ...  A reversible data hiding scheme for VQ indices is explained in [40] that outperforms many schemes such as Lin and Chang, Tsai and Yang and Lin's method giving the compression rate of 0.49 bpp.  ... 
doi:10.1016/j.cosrev.2014.09.001 fatcat:vpvq6qozrrcvpfuhz73t26ma54

Temporally Synchronized Reversible Data Hiding of EEG to MREG

Angelos Fylakis, Anja Keskinarkaus, Vesa Kiviniemi, Tapio Seppänen
2016 Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies  
It is demonstrated through experiments that MREG maintains high perceptual fidelity and also verified that after EEG extraction and acquisition of every electrode's sample, MREG is fully reversed to its  ...  The embedding procedure maintains temporal synchronization between EEG and 32-bit MREG making it a novel data hiding application.  ...  The data hiding method can guarantee with the proper quantization settings high fidelity between the original MREG sequence and its version that carries hidden data.  ... 
doi:10.5220/0005665700580067 dblp:conf/biostec/FylakisKKS16 fatcat:yhdwaleujjdvzfudmn5y27pgae

A data hiding approach for sensitive smartphone data

Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Goncalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos
2016 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '16  
We develop and evaluate a data hiding method that enables smartphones to encrypt and embed sensitive information into carrier streams of sensor data.  ...  Our evaluation considers multiple handsets and a variety of data types, and we demonstrate that our method has a computational cost that allows real-time data hiding on smartphones with negligible distortion  ...  A large number of LSBs leads to high capacity and low fidelity in the carrier signals.  ... 
doi:10.1145/2971648.2971686 dblp:conf/huc/LuoFPKGLSK16 fatcat:go6b3d4egfgzxhajmrdutp7vpe

A PVO-based Reversible Data Hiding Scheme Using Variable Difference

2019 DEStech Transactions on Engineering and Technology Research  
In order to improve the PSNR of the marked image, an improved high-fidelity reversible data hiding algorithm was proposed based on Pixel-Value-Ordering.  ...  The algorithm can extract the secret information and restore the original image without any damage.  ...  Introduction Image data hiding is usually divided into reversible data hiding (RDH) and irreversible data hiding.  ... 
doi:10.12783/dtetr/icicr2019/30582 fatcat:frvq5ybkybcepanlrqldopjzqa

Steganography in RGB Images Using Adjacent Mean

Yun-Hsin Chuang, Bor-Shing Lin, Yan-Xiang Chen, Hung-Jr Shiu
2021 IEEE Access  
Swain, “High Fidelity Based Reversible Data Hiding Using Modified LSB Matching and Pixel Difference,” Journal of King Saud Univeristy-Computer and Information  ...  Kittawi and A. Al-Haj, “Reversible Data Hiding in Encrypted [9] A. Nilizadeh and A. R. N.  ... 
doi:10.1109/access.2021.3132424 fatcat:zr6ifymknzdm5m6do5gauaojza

Embedding Data in Non-Important Gabor Ridges

Ali Abdulazeez Mohammed Baqer Qazzaz, Elaf J. Al Taee, Ziena Hassan Razaq Al Hadad
2022 International Journal on Advanced Science, Engineering and Information Technology  
There are many hiding techniques; each one of them used different paths to ensure standard properties such as optimizing security level, increasing the amount of embedding data, decreasing the ability  ...  The imaging stage constructed after the suggested technique is good and identical to the pure image for the accepted degree as shown in used fidelity metrics (PSNR).  ...  bits, ensuring that noise quantity stills in accepted rate in the file after the hiding process [22] .  ... 
doi:10.18517/ijaseit.12.1.15005 fatcat:huyjwpvaejd37dv2kndai4gasq

A high-capacity reversible data hiding method: HCRHide

Y. Yalman, F. Akar
2013 Imaging Science Journal  
Throughout a joint imperceptibility and data hiding capacity evaluation, results have approved high performance of the proposed method over the existing reversible data hiding methods.  ...  In this paper, we propose a highcapacity reversible data hiding method called HCRHide based on the Neighbour Mean Interpolation (NMI) method and the R-weighted Coding Method (RCM).  ...  Acknowledgements The authors would like to thank the anonymous reviewers and the editor for their valuable comments and suggestions as well as Mr Jeffry Livesay for his contribution in language editing  ... 
doi:10.1179/1743131x13y.0000000060 fatcat:u3gm3qwgybce3iozsakdjzl27e

Guest Editorial: Information Hiding and Forensics for Multimedia Security

Chuan Qin, Dengpan Ye, Xiangyang Luo
2016 Multimedia tools and applications  
confidential data into ECG signal reversibly, while keeping its high visual quality.  ...  high-capacity separable data hiding in encrypted images using compressive sensing.  ... 
doi:10.1007/s11042-016-3876-2 fatcat:h2z6bme6sjdmhj3y4msr2d2gli

An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT) [article]

Madhumita Sengupta, J. K. Mandal, N. Ghoshal
2012 arXiv   pre-print
(PSNR), Standard Deviation(SD) and Image Fidelity(IF) analysis, which shows better performances in ATFDWT.  ...  The secret message/image bits stream in varying positions are embedded in 'Vertical orientation sub-image' followed by reverse transformation to generate embedded/encrypted image.  ...  Acknowledgement The authors express deep sense of gratuity towards the department of CSE University of Kalyani and the IIPC Project AICTE, Govt. of India, of the department where the computational resources  ... 
arXiv:1212.3719v1 fatcat:zubzvsdxwngr5ehvq4osyqkikm

A Novel LSB Matching Algorithm Based on Information Pre-Processing

Yongjin Hu, Xiyan Li, Jun Ma
2021 Mathematics  
This paper analyzes random bits and scanned documents, two forms of secret data.  ...  Both theory and experiment have demonstrated that our study presented a good trade-off between high capacity and low distortion and is superior to other related schemes.  ...  High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 2013, 93, 198–205. [CrossRef] 12. Ou, B.; Li, X.L.; Zhao, Y.; Ni, R.R.  ... 
doi:10.3390/math10010008 fatcat:y7hh52sj45cjxj5euucjd3l32m

Watermarking in Transform Domains (WTD)

J.K. Mandal
2012 Procedia Technology - Elsevier  
Extraction is made in reverse manner.  ...  with enhanced fidelity.  ...  ACKNOWLEDGMENT The author express deep sense of gratuity towards the Dept of CSE University of Kalyani and the IIPC Project AICTE, Govt of India, of the dept where the computational resourses are used  ... 
doi:10.1016/j.protcy.2012.05.003 fatcat:mzjgu74ijncbnk7oastrhbblau

Audio Hiding Using Wavelet Transform with Amplitude Modulation

Waffaa S. Ahmed, Loay E. George
2013 Al-Nahrain Journal of Science  
The performance of hiding method was tested using the fidelity measures Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR) to describe the overall error rate.  ...  Hiding rate was computed to asses the embedding power of this method.  ...  The two produced bands are called the low frequency (L) and high frequency (H).  ... 
doi:10.22401/jnus.16.1.27 fatcat:mensea7cujcuhe5wkh32okprxu
« Previous Showing results 1 — 15 out of 3,969 results