A novel information hiding scheme based on BTC

被引:0
|
作者
Lin, NH [1 ]
Chang, CC [1 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat Management, Taichung 433, Taiwan
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The general hiding strategy is to embed the confidential image such as a weaponry plan, called secret image in this paper, into an in-confidential image. However, we have found that sometimes people also transmit the compression codes generated by a compression technique, such as VQ or BTC, via the Internet in order to save the transmission time. The key point of this paper is to embed the secret image into the compression codes generated by the BTC algorithm, such as means and the bitmap of each block. The experimental results have confirmed that the proposed approach would indeed allow legal receivers to retrieve the secret images without distorting them. Although the original means and bilmaps are modified in order to hide the secret images, the difference between the PSNRs generated by original BTC and our scheme is insignificant.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 50 条
  • [31] Information Hiding Scheme Based on Replace Function and Wavelet Transform
    Lu, Tzu-Chuen
    Hsueh, Sue-Chen
    Tseng, Chun-Ya
    Chen, Pei-Lun
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 885 - 893
  • [32] Information Hiding Scheme Based on Quantum Generative Adversarial Network
    Luo J.
    Zhou R.
    Li Y.
    Liu G.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2021, 33 (07): : 983 - 990
  • [33] A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters
    Feng, Bin
    Wang, Zhi-Hui
    Wang, Duo
    Chang, Ching-Yun
    Li, Ming-Chu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (01): : 269 - 281
  • [34] Secured and Robust Information Hiding Scheme
    Abdul-mahdi, N. H.
    Yahya, A.
    Ahmad, R. B.
    Al-Qershi, O. M.
    MALAYSIAN TECHNICAL UNIVERSITIES CONFERENCE ON ENGINEERING & TECHNOLOGY 2012 (MUCET 2012), 2013, 53 : 463 - 471
  • [35] A Robust Watermarking Scheme for Information Hiding
    Ramani, K.
    Prasad, E. V.
    Varadarajan, S.
    Subramanyam, A.
    ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 58 - +
  • [36] A novel data hiding scheme based on multidimensional reference tensors
    Jason Lin
    Kuan-Hung Liu
    Cih-Lian Lin
    Multimedia Tools and Applications, 2024, 83 : 25695 - 25712
  • [37] A Novel Digital Image Hiding Scheme Based on Matrix Decomposition
    Ye, Ruisong
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 147 - 150
  • [38] A novel data hiding scheme based on multidimensional reference tensors
    Lin, Jason
    Liu, Kuan-Hung
    Lin, Cih-Lian
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (09) : 25695 - 25712
  • [39] An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
    Lu, Tzu-Chuen
    Chang, Chin-Chen
    Liu, Yi-Long
    FUNDAMENTA INFORMATICAE, 2009, 91 (3-4) : 597 - 610
  • [40] A Novel Terraced Field Block Based Scheme for Data Hiding
    Dong, Xiao-Juan
    Lyu, Wan-Li
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 757 - 761