Preserve Robustness for Image Data Hiding

被引:0
|
作者
Satre, D. B. [1 ]
Pawar, R. V. [1 ]
机构
[1] Pune Univ, Vishwakarma Inst Technol, Dept Comp Engn, Pune, Maharashtra, India
来源
ISPRA '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, ROBOTICS AND AUTOMATION | 2010年
关键词
Data Hiding; Robust data hiding; embedded image; steganography; WATERMARKING;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have explained an algorithm for preserving robustness for image data hiding. Robust data hiding is the process of extraction the correct data after compression or any other alteration applied on the embedded image. Embedded image is the image that obtains after hiding some information on the original image. Our technique compare with the existing technique called Y. Q. Shi method. We are comparing results of both techniques, i.e., PSNR of the embedded image and the number of error bits introduced in the extracted data from the embedded image. Both the algorithm is implemented on all kind of images including aerial, texture, and miscellaneous image. It also successfully implemented on the medical images.
引用
收藏
页码:146 / +
页数:2
相关论文
共 50 条
  • [1] Security and robustness enhancement for image data hiding
    Liu, Ning
    Amin, Palak
    Subbalakshmi, K. P.
    IEEE TRANSACTIONS ON MULTIMEDIA, 2007, 9 (03) : 466 - 474
  • [2] Enhancing robustness in video data hiding against recompression with a wide parameter range
    Chen, Yanli
    Malik, Asad
    Wang, Hongxia
    He, Ben
    Zhou, Yonghui
    Wu, Hanzhou
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [3] Hiding data in halftone image using modified data hiding error diffusion
    Fu, MS
    Au, OC
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2000, PTS 1-3, 2000, 4067 : 1671 - 1680
  • [4] Image retrieval based on data hiding
    Chang, IS
    Park, RH
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 321 - 328
  • [5] On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding
    Cao, Hong
    Kot, Alex C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (09) : 1508 - 1518
  • [6] Image data hiding schemes based on metaheuristic optimization: a review
    Anna Melman
    Oleg Evsutin
    Artificial Intelligence Review, 2023, 56 : 15375 - 15447
  • [7] Image data hiding schemes based on metaheuristic optimization: a review
    Melman, Anna
    Evsutin, Oleg
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (12) : 15375 - 15447
  • [8] Data Hiding in Binary Image with High Payload
    Ding, Wenjia
    Wang, Yulin
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7737 - 7745
  • [9] Data hiding via steganographic image transformation
    Takano, S
    Tanaka, K
    Sugimura, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (02) : 311 - 319
  • [10] Data Hiding in Binary Image with High Payload
    Wenjia Ding
    Yulin Wang
    Arabian Journal for Science and Engineering, 2018, 43 : 7737 - 7745