A New Method for Image Security and Data Hiding in Image

被引:0
|
作者
Ahmadi, Kaveh
Zanjani, Maral Mohamadi
机构
来源
BUSINESS, ECONOMICS AND TOURISM MANAGEMENT | 2011年 / 24卷
关键词
Image Hiding; Image Coding; Secret Image; Cover Image;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
For image security the cryptography algorithm should be applied to every pixels of image and in the receiver side all of the pixels must be decoded. Coding and decoding image, therefore, takes a lot of time because of its huge number of pixels. A common and faster solution for image security is image-hiding instead of image coding. In fact in this method, pixels of the image will be hidden in another image called cover image and in the network cover image distribute, in the receiver side image will be extracted from cover image. Commonly image-hiding algorithms work in frequency-domain, make a lot of changes to the cover image and they are time consuming. In this paper an image-hiding algorithm is introduced that works in spatial-domain. Our algorithm is faster and makes a little change to the cover image indistinguishable by human eyes. Our method uses the difference of pixels instead of the color of pixels.
引用
收藏
页码:52 / 56
页数:5
相关论文
共 50 条
  • [21] Line-Based Cubism-Like Image-A New Type of Art Image and its Application to Lossless Data Hiding
    Liu, Shan-Chun
    Tsai, Wen-Hsiang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (05) : 1448 - 1458
  • [22] AN AGENT-BASED LSB SUBSTITUTION IMAGE HIDING METHOD
    Huang, Der-Chen
    Chan, Yung-Kuan
    Wu, Jhin-Han
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (3A): : 1023 - 1038
  • [23] Grayscale Image Hiding Based on Modulus Function and Greedy Method
    Hu, Yu-Chen
    Tsou, Chih-Chiang
    Su, Bing-Hwang
    FUNDAMENTA INFORMATICAE, 2008, 86 (1-2) : 113 - 126
  • [24] Grey Scale Image Hiding Method Based on Decomposition Operation
    Wadi, Salim Muhsin
    Zainal, Nasharuddin
    Abdulgader, Ali
    2013 IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED 2013), 2013, : 315 - 318
  • [26] Hiding image with inception transformer
    Dong, Yunyun
    Wei, Ping
    Wang, Ruxin
    Song, Bingbing
    Wei, Tingchu
    Zhou, Wei
    IET IMAGE PROCESSING, 2024, 18 (13) : 3961 - 3975
  • [27] Joint compressive autoencoders for full-image-to-image hiding
    Liu, Xiyao
    Ma, Ziping
    Guo, Xingbei
    Hou, Jialu
    Wang, Lei
    Zhang, Jian
    Schaefer, Gerald
    Fang, Hui
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 7743 - 7750
  • [28] Improved BEMD data hiding Scheme Data hiding Binary Exploitation Modification Direction Scheme Using Image Steganography
    Agarwal, Shuchi
    Bisht, Jaipal Singh
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 206 - 211
  • [29] An image hiding scheme based on Du's disk allocation method
    Lin, Chia-Chen
    Chang, Chin-Chen
    IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 617 - +
  • [30] A robust image hiding method based on sign embedding and fuzzy classification
    Li, Qingzhong
    Yu, Chen
    Chu, Dongsheng
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 622 - 622