scholarly journals Literature Review of Dual Data Hiding and Image Compression and Digital Inpainting

2016 ◽  
Vol 5 (3) ◽  
pp. 1524-1527
2012 ◽  
Vol 263-266 ◽  
pp. 2510-2514 ◽  
Author(s):  
Mei Yi Wu

The commonly used JPEG and GIF images on Internet web sites have become more popular for steganographic applications. However, the use of lossy image compression will destroy the embedded message on the marked images. This article presents a novel data hiding method for palette images which can embed double messages, secret and robust messages, into palette images. The receivers can extract both the embedded two messages with no loss if the stego-image is not encountered any attack. If the stego-image is attacked, we can still extract the robust message with little distortion from the attacked images. The proposed method is based on parity check and statistical quantity histogram. Experiment results show the proposed method can achieve high performance in embedding capacity and robustness.


2015 ◽  
Vol 9 (1) ◽  
pp. 54-61 ◽  
Author(s):  
Xinpeng Zhang ◽  
Weiming Zhang

Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 1974 ◽  
Author(s):  
Yu-Hsiu Lin ◽  
Chih-Hsien Hsia ◽  
Bo-Yan Chen ◽  
Yung-Yao Chen

This study investigates combining the property of human vision system and a 2-phase data hiding strategy to improve the visual quality of data-embedded compressed images. The visual Internet of Things (IoT) is indispensable in smart cities, where different sources of visual data are collected for more efficient management. With the transmission through the public network, security issue becomes critical. Moreover, for the sake of increasing transmission efficiency, image compression is widely used. In order to respond to both needs, we present a novel data hiding scheme for image compression with Absolute Moment Block Truncation Coding (AMBTC). Embedding secure data in digital images has broad security uses, e.g., image authentication, prevention of forgery attacks, and intellectual property protection. The proposed method embeds data into an AMBTC block by two phases. In the intra-block embedding phase, a hidden function is proposed, where the five AMBTC parameters are extracted and manipulated to embed the secret data. In the inter-block embedding phase, the relevance of high mean and low mean values between adjacent blocks are exploited to embed additional secret data in a reversible way. Between these two embedding phases, a halftoning scheme called direct binary search is integrated to efficiently improve the image quality without changing the fixed parameters. The modulo operator is used for data extraction. The advantages of this study contain two aspects. First, data hiding is an essential area of research for increasing the IoT security. Second, hiding in compressed images instead of original images can improve the network transmission efficiency. The experimental results demonstrate the effectiveness and superiority of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document