scholarly journals Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

Author(s):  
Kohei Arai ◽  
Yuji Yamada
2012 ◽  
Vol 2012 ◽  
pp. 1-9 ◽  
Author(s):  
Ching-Yu Yang

This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS) algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR) performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.


2017 ◽  
Vol 31 (19-21) ◽  
pp. 1740056
Author(s):  
Zhuoqian Liang ◽  
Xiaotian Wu

A novel data hiding method in halftone images with authentication ability was proposed in this paper. A secret image and an authentication image were simultaneously encoded into two halftone images. The secret image was visually reconstructed by stacking the two halftone images together. To verify the validity of the secret, one halftone image was shifted down for several units and stacked with the other one to reveal the authentication image. Experimental results were provided, demonstrating that the proposed method is effective and outperforms existing methods.


2011 ◽  
Vol 9 (2) ◽  
pp. 139-148 ◽  
Author(s):  
Chin-Feng Lee ◽  
Chi-Yao Weng ◽  
Aneesh Sharma

Sign in / Sign up

Export Citation Format

Share Document