scholarly journals HBF-DH: An Enhanced Payload Hybrid Data Hiding Method Based on a Hybrid Strategy and Block Features

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 148439-148452 ◽  
Author(s):  
Zhan Yu ◽  
Chia-Chen Lin ◽  
Chin-Chen Chang ◽  
Guo-Dong Su
Symmetry ◽  
2019 ◽  
Vol 11 (10) ◽  
pp. 1314 ◽  
Author(s):  
Chin-Chen Chang ◽  
Xu Wang ◽  
Ji-Hwei Horng

With the rapid development of smartphones, cloud storage, and wireless communications, protecting the security of compressed images through data transmission on the Internet has become a critical contemporary issue. A series of data hiding methods for AMBTC compressed images has been proposed to solve this problem. However, most of these methods either change the file size of the final compressed code or exchange the order of two quantization values in some blocks. To reverse this situation, this paper proposes a data hiding method for strict AMBTC format images using a hybrid strategy: replacement, matrix encoding, and symmetric quantization value embedding for three block types i.e., smooth blocks, less complex blocks and highly complex blocks. According to the hybrid strategy, an efficient data hiding order is designed to achieve higher-fidelity. Experimental results show that our proposed method provides an excellent balance between image quality and hiding capacity and has no error blocks in the final stego-compressed code.


Symmetry ◽  
2016 ◽  
Vol 8 (6) ◽  
pp. 41 ◽  
Author(s):  
Mehdi Hussain ◽  
Ainuddin Abdul Wahab ◽  
Noman Javed ◽  
Ki-Hyun Jung

2014 ◽  
Vol 63 (3) ◽  
pp. 174-181 ◽  
Author(s):  
K. S. Wu ◽  
W. D. Liao ◽  
C-N. Lin ◽  
T-S. Chen
Keyword(s):  

2020 ◽  
Vol 10 (15) ◽  
pp. 5336 ◽  
Author(s):  
Cheonshik Kim ◽  
Dong-Kyoo Shin ◽  
Ching-Nung Yang ◽  
Lu Leng

The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment Block Truncation Coding (AMBTC) is one of several compression methods and is appropriate for embedding data due to its very low complexity and acceptable distortion. However, since there is not enough redundant data compared to grayscale images, the research to embed data in the compressed image is a very challenging topic. That is the motivation and challenge of this research. Meanwhile, the Hamming codes are used to embed secret bits, as well as a block code that can detect up to two simultaneous bit errors and correct single bit errors. In this paper, we propose an effective data hiding method for two quantization levels of each block of AMBTC using Hamming codes. Bai and Chang introduced a method of applying Hamming (7,4) to two quantization levels; however, the scheme is ineffective, and the image distortion error is relatively large. To solve the problem with the image distortion errors, this paper introduces a way of optimizing codewords and reducing pixel distortion by utilizing Hamming (7,4) and lookup tables. In the experiments, when concealing 150,000 bits in the Lena image, the averages of the Normalized Cross-Correlation (NCC) and Mean-Squared Error (MSE) of our proposed method were 0.9952 and 37.9460, respectively, which were the highest. The sufficient experiments confirmed that the performance of the proposed method is satisfactory in terms of image embedding capacity and quality.


2016 ◽  
Vol 2016 (1) ◽  
pp. 213-218
Author(s):  
Kazushige Banzawa ◽  
Kazuma Shinoda ◽  
Madoka Hasegawa

Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


Sign in / Sign up

Export Citation Format

Share Document