Distortion less Reversible Data Hiding based on Dual Repeat Accumulate Coding Technique

被引:0
作者
Vanmathi, C. [1 ]
Prabu, S. [2 ]
机构
[1] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore, Tamil Nadu, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, Tamil Nadu, India
来源
2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC) | 2014年
关键词
histogram modification; stego image; cover image; steganography; reversible data hiding; IMAGE; STEGANOGRAPHY; PERFORMANCE; SCHEME;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The reversible data hiding hides the secret data into an image and the secret data, the original image is recovered without data loss. In this paper, we proposed a reversible steganographic method using repeat accumulate coding. The secret information is embedded using compression codes. This paper presents a dual tree repeat accumulate coding based image-hiding scheme that embeds secret data into compression codes during image compression. The proposed algorithm is implemented in two phases, an embedding stage and extracting stage. The secret data is embedded into the difference values of a given image after the calculation stage is performed. The proposed scheme effectively provides a lossless hiding mechanism in the compression domain. During the repeat accumulate coding stage the hiding tree is used to embed the secret information. Secret data can be extracted by referring to the same hiding-tree. The cover image can be recovered during the repeat accumulate decoding stage. It is shown that the peak signal-to-noise ratio (PSNR) obtained in the proposed algorithm is above 50 dB. The results achieved in this method are higher when compared to the other latest reversible data hiding techniques mentioned in the literature. The proposed method has been tested with benchmarked images used to test. This method improves data hiding performance in terms of hiding capacity and visual perceptibility. The performance comparison is done with other reversible data hiding methods to prove the proposed method.
引用
收藏
页码:331 / 334
页数:4
相关论文
共 40 条
  • [31] Perez-Gonzalez F., 2000, SIGNAL PROC IN PRESS
  • [32] Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism
    Qin, Chuan
    Chang, Chin-Chen
    Chen, Yen-Chang
    [J]. SIGNAL PROCESSING, 2013, 93 (09) : 2687 - 2695
  • [33] Qin Chuan, 2013, SIGNAL PROCESSING
  • [34] Rodriguez-Colin R, 2007, 17 IEEE INT C EL COM, P33
  • [35] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [36] A high-performance reversible data-hiding scheme for LZW codes
    Wang, Zhi-Hui
    Yang, Hai-Rui
    Cheng, Ting-Fang
    Chang, Chin-Chen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (11) : 2771 - 2778
  • [37] Wang Zhi-Hui, 2012, MULTIMEDIA SECURITY
  • [38] Wayner Peter., 2002, DISAPPEARING CRYPTOG
  • [39] A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
    Wu, Xiaotian
    Ou, Duanhao
    Liang, Qiming
    Sun, Wei
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (08) : 1852 - 1863
  • [40] Improvements of image sharing with steganography and authentication
    Yang, Ching-Nung
    Chen, Tse-Shih
    Yu, Kun Hsuan
    Wang, Chung-Chun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1070 - 1076