A New Method for Image Security and Data Hiding in Image

被引:0
作者
Ahmadi, Kaveh
Zanjani, Maral Mohamadi
机构
来源
BUSINESS, ECONOMICS AND TOURISM MANAGEMENT | 2011年 / 24卷
关键词
Image Hiding; Image Coding; Secret Image; Cover Image;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
For image security the cryptography algorithm should be applied to every pixels of image and in the receiver side all of the pixels must be decoded. Coding and decoding image, therefore, takes a lot of time because of its huge number of pixels. A common and faster solution for image security is image-hiding instead of image coding. In fact in this method, pixels of the image will be hidden in another image called cover image and in the network cover image distribute, in the receiver side image will be extracted from cover image. Commonly image-hiding algorithms work in frequency-domain, make a lot of changes to the cover image and they are time consuming. In this paper an image-hiding algorithm is introduced that works in spatial-domain. Our algorithm is faster and makes a little change to the cover image indistinguishable by human eyes. Our method uses the difference of pixels instead of the color of pixels.
引用
收藏
页码:52 / 56
页数:5
相关论文
共 50 条
  • [31] A robust image hiding method based on sign embedding and fuzzy classification
    Li, Qingzhong
    Yu, Chen
    Chu, Dongsheng
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 622 - 622
  • [32] An image hiding scheme based on Du's disk allocation method
    Lin, Chia-Chen
    Chang, Chin-Chen
    IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 617 - +
  • [33] A new image-hiding scheme based on blending in DCT domain
    Zhang, GC
    Zhang, YJ
    SECOND INTERNATION CONFERENCE ON IMAGE AND GRAPHICS, PTS 1 AND 2, 2002, 4875 : 141 - 145
  • [34] A Triangular Algorithm of Image-Hiding
    Wang, Hongmei
    Qu, Limin
    Wang, Fengru
    2010 8TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2010, : 1012 - 1016
  • [35] An authenticated secure image hiding scheme
    Lee, W-B
    Li, J-H
    Chen, S-C
    Chen, T-H
    IMAGING SCIENCE JOURNAL, 2009, 57 (02) : 109 - 117
  • [36] A novel adaptive image hiding algorithm
    College of Physics and Electronic Engineering, Taizhou University, Taizhou
    318017, China
    J. Commun., 5 (360-365): : 360 - 365
  • [37] Image hiding using optical interference
    Zhang, Yan
    Wang, Weining
    SPECKLE 2010: OPTICAL METROLOGY, 2010, 7387
  • [38] Image Hiding using Neighborhood Similarity
    Nickfarjam, A. M.
    Ebrahimpour-komleh, H.
    Najafabadi, A. Pourshabanan
    2014 6TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2014, : 79 - 82
  • [39] Novel Integer Reversible Charlier Transform for Image Reversible Data Hiding Application
    Yamni, Mohamed
    Daoui, Achraf
    Plawiak, Pawel
    Alfarraj, Osama
    Abd El-Latif, Ahmed A.
    IEEE ACCESS, 2024, 12 : 98480 - 98491
  • [40] Separable Reversible Data Hiding in Encryption Image with Two-Tuples Coding
    Wang, Jijun
    Tan, Soo Fun
    COMPUTERS, 2021, 10 (07)