2009 Ninth International Conference on Hybrid Intelligent Systems 2009
DOI: 10.1109/his.2009.226
|View full text |Cite
|
Sign up to set email alerts
|

A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method

Abstract: Data hiding is one of the most important strategies on the field of data security; the main purpose of data hiding is to disguise the secret information and put them behind a cover image to make them unnoticeable and to assure the secrecy as a stego-image. Besides safety, the quantity of data that can be hidden in a single cover image is also very important to the data encryption. In this paper, we propose two kinds of weightchanging evaluation of high capacity EMD data hiding strategies that formulas can be o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Figure 3 as show that the first pixel pair is where D n , (2) (1) (2 1) 2 1 75 1 74 n D g g , Besides, (2) R =(1,0,1) is then obtained. The stego-pixel group (3*2+1, 74*2+0, 79*2+1) = (7,148,159). After processing other cover image pixels in order, an embedded stego-image is obtained, as shown in Figure 4.…”
Section: Extracting and Recovering Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Figure 3 as show that the first pixel pair is where D n , (2) (1) (2 1) 2 1 75 1 74 n D g g , Besides, (2) R =(1,0,1) is then obtained. The stego-pixel group (3*2+1, 74*2+0, 79*2+1) = (7,148,159). After processing other cover image pixels in order, an embedded stego-image is obtained, as shown in Figure 4.…”
Section: Extracting and Recovering Phasementioning
confidence: 99%
“…For example when 3 n , secret messages are converted into 7-ary secret digits. When the 7-ary secret digits are expressed as two-digits, the maximum value can be expressed as 7 66 , and its decimal digits are 1 0 10 7 6 7 7 48 . Therefore, it can be learned that when the secret message is larger than 10 49 , it is not able to embed secret messages.…”
Section: A Preprocessing Of Secret Message Transferringmentioning
confidence: 99%
“…Generalized exploiting modification direction method (GEMD) proposed by Wang and Kuo [3] introduces a new extraction function [12] mentioned in equation 3.2 using binary coefficient for modulo-2 division to (n+1)-bits of binary secret data into n adjacent pixels of cover pixel block.…”
Section: Gemd Data Hiding Schemementioning
confidence: 99%
“…From the simulation results implemented [12] in MATLAB (R20011a) software on a personal computer with Intel Core I3 2.50 GHz, 4GB RAM performance of proposed BEMD scheme is evaluated. 512*512 grayscale images were taken for experimental analysis using PSNR and MSE as discussed below.…”
Section: Performance Analysismentioning
confidence: 99%
“…However, there is a serious disadvantage common to these approaches as the embedded data is compromised when the embedding function, with fixed weighting parameters and modulus, is disclosed. Note the previous work in [5] allowed for preshared weighting parameters, but still did not solve the problem of total disclosure of said parameters. In order to maintain embedded data security and improve the overflow/underflow problem, we propose a secure data hiding scheme by employing an additional modulus function.…”
Section: Introductionmentioning
confidence: 99%