2017
DOI: 10.1007/s11042-017-4774-y
|View full text |Cite
|
Sign up to set email alerts
|

Reversible data hiding in dual Stegano-image using an improved center folding strategy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…extracted binary strings to obtain the original secret message. 8) Restore the original pixel by averaging the values of P i and P i , as shown in Equation (22). In the recovery procedure, the mean value of the camouflage pixels is the original pixel.…”
Section: ) Convert D Into a Binary String And Concatenate Allmentioning
confidence: 99%
See 1 more Smart Citation
“…extracted binary strings to obtain the original secret message. 8) Restore the original pixel by averaging the values of P i and P i , as shown in Equation (22). In the recovery procedure, the mean value of the camouflage pixels is the original pixel.…”
Section: ) Convert D Into a Binary String And Concatenate Allmentioning
confidence: 99%
“…This method uses two identical cover images to hide information. It disperses the distortion into two images, which effectively improves the image quality and the embedding capacity, thereby effectively hiding information [15], [20], [22], [24]. In addition, dual-images technology uses the concept of secret sharing, such that only the legal person who owns two stego-images can completely extract the secret information.…”
Section: Introductionmentioning
confidence: 99%
“…However, the quality of the two stego-images was asymmetric. In addition, there are some works [21], [22] on further increase the embedding capacity.…”
Section: Introductionmentioning
confidence: 99%
“…To enhance the hiding capacity, Lu et al [20] proposed a center folding strategy that can embed a set of K secret bits into a pair of pixels. In addition, the strategy can The current methods in the spatial domain can be classified mainly into five types, i.e., the compression method [4], difference expansion [5], prediction [6][7][8][9][10][11], histogram [12][13][14], and dual-image [15][16][17][18][19][20][21][22][23]. In 2002, Celik et al [4] proposed a compression-based hiding method that quantified the pixels in the image and recorded the values of remainders, which were used as recovery information.…”
Section: Introductionmentioning
confidence: 99%
“…However, the strategy does not analyze the relationships between adjacent secret messages. Therefore, Chi et al [22] proposed a dynamic encoding method that used the similarity of the neighboring data to encode secret data. These methods can effectively reduce the modification level of pixels.…”
Section: Introductionmentioning
confidence: 99%