2012
DOI: 10.1016/j.dsp.2011.09.003
|View full text |Cite
|
Sign up to set email alerts
|

Robust and secured image-adaptive data hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…This layer is introduced to make it more difficult to detect the segments' edges by a steganalyser, and it is more secure to carry the secret message than to use one-level non-uniform segmentation (EL-Emam and AL-Zubidy, 2013;Mali, Suresh N. et al, 2012).…”
Section: Definition 23mentioning
confidence: 99%
“…This layer is introduced to make it more difficult to detect the segments' edges by a steganalyser, and it is more secure to carry the secret message than to use one-level non-uniform segmentation (EL-Emam and AL-Zubidy, 2013;Mali, Suresh N. et al, 2012).…”
Section: Definition 23mentioning
confidence: 99%
“…It is shown in Figure 18 that PSNR of six stego images are more than 33.2047 dB in the case of embedding intensity adjustment factor s≤ 8. Reference [16] hides one secret bit into two neighboring DCT mid frequency coefficients, so it can embed 77 824 bits if taking those coefficients, whose sequence number belongs in [6,42] after ZigZag scan as mid frequency coefficients, and it would get an acceptable image quality of stego image about 30 dB. Our proposed algorithm's capacity, robustness, and invisibility all improved compared with the algorithm proposed by [16], and meanwhile, it can achieve a good balance of invisibility, robustness, and capacity.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…The first type algorithms pay more attention to embedding capacity, such as those proposed by [11][12][13], the second type algorithms are absorbed in robustness, such as those proposed by [15][16][17][18]22], and the third type algorithms emphasize a compromise of capacity, robustness, and invisibility, such as those in [19][20][21]. It cannot say that the capacity of our proposed algorithm is as good as the first type and the robustness is as good as the second type because it belongs to the third type.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The IQM scores are computed from images and their Gaussian filtered versions with 5 . 0   and mask size 3×3 [25,26]. The variations in IQMs for proposed method, D. Wu, and B. Lai methods with embedding the 30000 bytes in cover images were considered.…”
Section: Security Analysis Of Proposed Methodsmentioning
confidence: 99%