5th International Conference on Computer Sciences and Convergence Information Technology 2010
DOI: 10.1109/iccit.2010.5711225
|View full text |Cite
|
Sign up to set email alerts
|

A data hiding algorithm based on histogram re-quantization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…is about 7 times smaller than that of the proposed scheme. Although the method of Teng et al (2010) has acceptable PSNR values, its payload values are also about 6 times smaller than that of the proposed scheme and its PSNR results are diving when the payload is increased to 0.07 bpp. On the other hand, the method by Khrisna et al (2010) has almost similar payload sizes as the proposed scheme.…”
Section: Evaluation Of the Secret Data Embedding Schemementioning
confidence: 76%
See 1 more Smart Citation
“…is about 7 times smaller than that of the proposed scheme. Although the method of Teng et al (2010) has acceptable PSNR values, its payload values are also about 6 times smaller than that of the proposed scheme and its PSNR results are diving when the payload is increased to 0.07 bpp. On the other hand, the method by Khrisna et al (2010) has almost similar payload sizes as the proposed scheme.…”
Section: Evaluation Of the Secret Data Embedding Schemementioning
confidence: 76%
“…The proposed scheme's numerical performance is shown in table 6. Figure 10 provides PSNR and data embedding capacity comparisons between the proposed (using both schemes described above to increase capacity) and five other classical methods (Thanuja et al 2008;Teng et al 2010;Khrisna et al 2010;Lin & Chang 2007;Chang et al 2008) after increasing payload size.…”
Section: Evaluation Of the Secret Data Embedding Schemementioning
confidence: 99%
“…Above all, Ni et al's (2006) method offers very low data embedding capacity making it very unsuitable in current steganography applications. Teng et al (2010) slightly improved Ni et al's method detailed above. In accordance with Ni et al's method, the data hiding capacity of the cover image directly depends on the frequency of occurrence of the pixels.…”
Section: Ni Et Al's Methodsmentioning
confidence: 98%
“…Above all, Ni et al's (2006) method offers very low d a t a e m b e d d i n g c a p a c i t y m a k i n g i t v e r y u n s u i t a b l e i n c u r r e n t s t e g a n o g r a p h y applications. Teng et al (2010) slightly improved Ni et al's method detailed above. In accordance with Ni et al's method, the data hiding capacity of the cover image directly depends on the frequency of occurrence of the pixels.…”
Section: Ni Et Al's Methodsmentioning
confidence: 99%
“…Lee et al (2006) also proposed a reversible data hiding scheme based on histogram modification of difference images. To increase data hiding ability, Chang et al (2008) presented an efficient extension of the histogram modification technique by considering the pixel difference instead of simple pixel value and Teng et al (2010) had some other similar proposals. They also exploited a histogram shifting technique to prevent problems raised about overflow and underflow.…”
Section: Histogram Modification−based Data Hidingmentioning
confidence: 99%