A Novel Reversible Data Hiding Based on Exploiting Modification Direction Algorithm

被引:1
|
作者
Chen, Kang-Kang [1 ]
Wang, Jian-Jun [1 ]
机构
[1] Fudan Univ, Dept Elect Engn, Shanghai 200433, Peoples R China
关键词
reversible data hiding; exploiting modification direction algorithm; integer wavelet transform; EXPANSION;
D O I
10.1109/MINES.2009.191
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel reversible data hiding technique based on exploiting modification direction algorithm is proposed. First, binary secret messages are converted into a sequence of data in a 5-ary notational system. Then two equal gray images are used as cover objects. In accordance with Human Visual System, the secret messages are embedded into each pair of the integer wavelet coefficients of the two gray images. Furthermore, to avoid overflow problem, histogram modification technology is used. Experiment results show that it can obtain I bit per pixel (bpp) in many images when the data is embedded in the single-layer. At the same time, each of the two images achieves high capacity while keeping low distortion.
引用
收藏
页码:514 / 518
页数:5
相关论文
共 50 条
  • [1] Reversible data hiding scheme based on exploiting modification direction with two steganographic images
    Chuan Qin
    Chin-Chen Chang
    Tai-Jung Hsu
    Multimedia Tools and Applications, 2015, 74 : 5861 - 5872
  • [2] Reversible data hiding scheme based on exploiting modification direction with two steganographic images
    Qin, Chuan
    Chang, Chin-Chen
    Hsu, Tai-Jung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (15) : 5861 - 5872
  • [3] An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification Direction
    Chen, Xiaofeng
    Hong, Chaoqun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [4] Data hiding based on generalised exploiting modification direction method
    Kuo, W-C
    Wang, C-C
    IMAGING SCIENCE JOURNAL, 2013, 61 (06): : 484 - 490
  • [5] Data hiding by an improved exploiting modification direction
    Kim, Cheonshik
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 69 (03) : 569 - 584
  • [6] Data hiding by an improved exploiting modification direction
    Cheonshik Kim
    Multimedia Tools and Applications, 2014, 69 : 569 - 584
  • [7] Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction
    Jiin-Chiou Cheng
    Wen-Chung Kuo
    Bo-Rong Su
    Journal of Electronic Science and Technology, 2018, (02) : 123 - 128
  • [8] Data-hiding based on sudoku and generalized exploiting modification direction
    Cheng J.-C.
    Kuo W.-C.
    Su B.-R.
    Journal of Electronic Science and Technology, 2018, 16 (02) : 123 - 128
  • [9] Data-Hiding Based on Sudoku and Generalized Exploiting Modification Direction
    JiinChiou Cheng
    WenChung Kuo
    BoRong Su
    Journal of Electronic Science and Technology, 2018, 16 (02) : 123 - 128
  • [10] Improved Data Hiding Method by Exploiting Modification Direction
    Byun, Jin-Yong
    Jung, Kl-Hyun
    Yoo, Kee-Young
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 264 - +