A private-distributing Technique For Verification Of Grayscale Text Pictures With the Use of the PNG Image
|
|
- Noah Allen
- 5 years ago
- Views:
Transcription
1 A private-distributing Technique For Verification Of Grayscale Text Pictures With the Use of the PNG Image N.DILEEP M. Tech Student, IMAGE PROCESSSING, kmm Engineering College, Andhrapradesh, India, Abstract A novel screen verification scheme support on the private distribution method with a information mend capacity for grayscale text images via the utilize of the PNG image is designed. An confirmation indication is produce for every lump of a grayscale text image, which, jointly with the binarized lump substance, is changed into more than a few distribute utilize the Shamir private distribution method. The concerned limitations are suspiciously select so that as several distribute as achievable are produced and entrenched into an alpha control plane. The alpha control plane is then shared with the novel grayscale image to shape a PNG image. Through the implant method, the compute distribute standards are map into a collection of alpha control standards near their highest significance of 255 to capitulate a clear stego-picture with a cover achieve. In the method of image confirmation, an image lump is noticeable as tamper if the confirmation indicator compute from the present lump satisfied do not equal that pull out from the distribute entrenched in the alpha control plane. Information renovate is then functional to each tamper lump by a annul Shamir method after gather two distribute from intact lumps. Procedures for shielding the safety of the information secret in the alpha control are also planned. Good trial results establish the efficiency of the planned scheme for actual apps. K. KHAMARTAJ Assosiate Professor, IMAGE PROCESSSING, kmm Engineering College, Andhrapradesh, India, pictures, which embrace texts, table, line arts, etc. as key inside, are frequently digitized into grayscale picture with two main older values, one creature of the environment and the extra of the forefront. It is distinguished that such picture, although gray-valued in environment, appear similar to binary. The two most important gray values in the text picture. It appear that such binary-like grayscale text picture may be threshold into binary ones for afterward dispensation, excluding such a thresholding process regularly destructs the velvetiness of the limitations of transcript font, ensuing in visually horrible caress facade with meander curve. Consequently, in realistic apps content files are regularly digitized and reserved as grayscale picture for afterward image check up. Keywords: Private Distribution; lumps; binarized lump; I. INTRODUCTION Digital picture is a shape for protect essential data. Though, among the quick proceed of digital equipment, it is simple to create visually indiscernible alteration to the inside of digital picture. To guarantee the reliability and accuracy of a digital picture is consequently a face. It is attractive to plan effectual scheme to explain this type of picture verification difficulty, particularly for picture of records whose protection should be secured. It is as well expectation to if element of an article picture is established to have been changed illegitimately; the destructed contented can be fix. Such picture contented confirmation and self-repair ability are helpful for protection of digital records in a lot of countryside, such as essential record, sign papers, scanned checks, circuit figure, art picture, blueprint sketch, final will and verification, and so on. text Fig. 1. A binary-like grayscale text picture with two key gray values. 2025
2 Universal, the picture confirmation trouble is hard for a binary text picture for the reason that of its easy binary environment which show the way to detectable modifications later than confirmation indication are entrenched in the picture pixels. Such modifications will stimulate probable qualms from attacker. A high-quality explanation to such binary picture confirmation consequently be supposed to obtain into explanation not simply the protection matter of avoiding picture interfere, but also the need of observance the illustration excellence of the resultant picture. We recommend an confirmation technique which deal with binary-like grayscale text picture as an alternative of uncontaminated binary ones, and solve concurrently the harms of picture interfere discovery and image worth observance. A number of ways for binary picture confirmation have be projected in the precedent control the so-called flappable pixels to make exact associations to entrench information for confirmation and explanation of binary pictures. Yang and Kot projected a two-layer binary picture confirmation scheme in which one cover is worn for inspection the picture loyalty and the other for examination picture reliability. In the scheme, connectivity protect conversion standard for influential the flippability of a pixel is utilize for embed the cryptographic name and lump identifier. afterward, Yang and Kot projected a pattern-based information thrashing scheme for binary picture confirmation in which three change criterion are worn to decide the flippabilities of pixels in every lump, and the watermark is adaptively entrenched into embeddable lump to agreement through the jagged embed ability situation in the mass picture. In the scheme projected by Kim et al, a situate of pseudo-random pixels in a binary or halftone picture are selected and clean, and confirmation code are calculate consequently and introduce into select arbitrary pixels. In Tzeng and Tsai s scheme, randomly-generated confirmation regulations are entrenched into picture lump for utilize in picture confirmation, and a so-called regulations possessor is utilized to decrease picture deformation resultant from information embed. Lee et al, projected a Hamming-codebased information implant scheme which flippants one pixel in every binary picture lump for implant a watermark, compliant little warp and small counterfeit pessimistic charge. Lee et al, enhanced the system presently by utilize an perimeter procession parallel compute to chosen flappable pixels for the function of tumbling the deformation. elastic a binary description of I, which we represent as I information for confirmation and revamping then are calculate beginning and in use as contribution to Shamir s surreptitious distribution proposal to make n surreptitious allocate The distribute values are record consequently into a little collection of alpha control standards near the most intelligibility charge to create an imperceptibility consequence in conclusion, the record surreptitious contribute to are arbitrarily entrenched into the alpha control for the intention of encourage the protection safeguard and information refurbish capacity. Two lump diagrams unfolding the projected scheme are shown. Given that the alpha control plane is utilize for transportation information for confirmation and repair, no devastation will happen to the input picture in the procedure of confirmation. In dissimilarity, predictable picture verification techniques regularly forgo element of image filling, such as LSBs or flippable pixels, to provide somewhere to stay information utilize for confirmation. In adding, once a stego-picture make from a predictable scheme similar to an LSB-based one is accidentally compacted by a lossy density method, the stego-image strength reason false optimistic sound the alarm in the confirmation scheme. In compare, the projected system yields a stego-picture in the PNG arrangement which in usual belongings will not be compacted extra, tumbling the opportunity of incorrect confirmation cause by impressive undesired density process on the stego picture. + = Fig. 2. creation of a PNG image from a grayscale text picture and an extra alpha control plane. II. PICTURE CONFIRMATION AND DATA REVAMP In the projected scheme, a PNG picture is formed from a binary-type grayscale text picture I with an alpha control plane. The novel picture I might be consideration as a grayscale control plane of the PNG picture. An picture of this development of PNG picture formation is shown, after that, I is binarized by moment-preserving thresholding, 2026
3 Algorithm for age group of a stego-picture A comprehensive algorithm for telling the making of astego-picture in the PNG arrangement of the projected technique is obtainable in the following. Algorithm : production of a stego-picture in the PNG format beginning a given grayscale picture. Input: a grayscale text picture I with two main gray standards, and a private key K. Output: a stego-picture I' in the PNG design with applicable information entrenched, as well as the verification indicator and the information utilize for revamping. III. QUALITIES OF THE PROJECTED SCHEME In accumulation to creature proficient of information revamp and organism visor in environment, the projected scheme has more than a few other qualities, which are illustrated in the following. (1) pixel-level maintenance of tampered picture part As extended as two untampered incomplete distributed can be collectively, a interfere lump can be revamp at the pixel level by the projected scheme. This defer a enhanced revamp significance for texts in pictures since wording characters or letters are less significant in range with various warped stroke and require better pixel-level maintenance when interfere with. (2) Having advanced prospect to endure picture substance offence By jointing competently the Shamir proposal, verification indicator production, and arbitrary implant of several distributes, the projected scheme can endure malevolent offences of general substance adjustments, such as superimposition, work of art, etc., as will be established by new outcome illustrate consequently. (3) Utilize of a novel kind of picture control for information hiding Dissimilar from general kind of picture, a PNG picture has the additional alpha control plane which usually is utilize to generate intelligibility to the picture. It is utilized another way by the projected scheme for the first instance as a shipper with a great space for thrashing distribute information As a evaluation, many extra schemes utilize LSBs as the carrier of secreted information. inescapably reason devastation to the picture substance to a convinced coverage. Dissimilar from such schemes, the projected scheme utilizes the pixels values of the alpha channel for the reason of picture verification and information revamp, departure the inventive picture undamaged and so reasoning no deformation to it. The alpha control plane may be detached later than the verification procedure to get the novel picture. illustrate the structure of the projected scheme in this portion; and made known for evaluation, illustrate a straight picture verification scheme. (5)Improving information protection by private distribution as an alternative of thrashing information straight into text picture pixels, the projected scheme implants information in the form of distribute into the alpha control of the PNG image. The consequence of this may be regard as doublefold safety guard, one crease contribute by the distribute as a form of costume of the novel picture information and the verification indication, and the other fold donate by the use of the alpha control plane which is produced to be almost obvious, as declared before. Fig. 4. Framework of projected text picture verification scheme. Fig. 5. Framework of a predictable picture verification scheme (4) Causing no deformation to the input picture predictable picture verification schemes which regularly implant confirmation signals into the wrap picture itself will 2027
4 IV. PROCEDURES FOR PROTECTION DEVELOPMENT The private key K, which is utilize to randomize the pixel point for implanting the mapped incomplete shares q3 through q6 declared in Algorithm, offer a calculate to save from harm the distribute. More specially, as describe in Algorithm, every lump in the alpha control plane may be consider to consist of two parts, the first part with the first two pixels and the second with the outstanding four. The first part of every lump is utilize for maintenance the primary two incomplete distribute q1and q2and the subsequent part for keeping the last four incomplete distributes q3through q6 of other lump positioned at arbitrary location. Therefore, the prospect of properly guessing the position of all the implanted incomplete distributes in a stego-picture is 1/[(m n) (m n/6) 2]! where m n is the volume of the wrap image; m n/6 is the whole number of lumps, every with six pixels; and (m n) (m n/6) 2 is the whole number of pixels in the lumps extra than persons in the first part of all the lumps. This prospect clearly is very small for ordinary picture sizes, significance that a approved guess of the entrenched incomplete distribute is almost impracticable To improve more the protection of the information entrenched in the stego-picture, one additional compute is approve in the projected method. It is randomization of the stable principles of through used in tread of Algorithm. Exclusively, in Step in Algorithm we can see that the contribution distribute into Algorithm, (1, q) and (2, q), can be copied simply, primary to the prospect of build false verification indication. To preparation this weak point, with the assist of one more covert key we might decide these values of x through x for each lump to b accidental inside the permitted digit range of 0 x < p (= 17). Then, the prospect of supposition properly all these standards for all the m n/6 lump in a stego-picture can be shape out, which is also very little for ordinary picture magnitude m n. V. EXPERIMENTAL RESULTS AND COMPARISON WITH OTHER METHODS The primary outcome we illustrate here approach from our research utilize a text picture of a indication paper. The outcomes of applying Algorithm to implant distribute information into is shown. As can be seen, the stegopicture shown in the final is visually approximately matching to the wrap picture exposed in the previous even though the alpha control contented of the final picture embrace the entrenched information. As a comparison, a result produced equally but devoid of conduct of Algorithm which records the novel incomplete distributes standards into the little space of alpha control values collection from 238 through 254. An noticeable not clear consequence show (a) (c) Fig. 6.Reserch outcome of a text picture of a signed document. (a) novel wrap picture. (b) A stego-picture with entrenched information. (c) a different stego-picture shaped without conduct incomplete distribute significance mapping. We have also conducted image-modification attacks to the stego-images using two common image editing operations namely, superimposing and painting. Tampered images yielded by the superimposing operation are presented in Figs. 7 through 10. It was observed from these experimental results that the superimposing operation, like that provided by the image editing software Adobe Photoshop or Corel Photo Impact, destroys the content of the alpha channel values by replacing all the original alpha channel values at the attacked part with the new values of 255. Since the largest alpha channel values created by the proposed method is 254 (see Step 7 of Algorithm 3), all pixels with the unique values of 255 in the alpha channel plane may be easily detected as tampered by a modified version of Step 3 of Algorithm 4, which we describe as follows: 2028
5 A evaluation of the capacity of the projected scheme with those of four obtainable schemes is shown in Table. All but the projected technique will produce twist in the stegopicture through the verification procedure. More significantly, only the projected technique has the ability of revamp the interfere parts of an reliable picture. Fig. 7. verification result of a PNG text picture of a sign document assault by superimpose a white rectangular form on the autograph in Fig. 6(b). (a) Interfere picture defer by the overlay process. (b) outcome with interfere lump detect and noticeable as gray. (c) information revamp outcome. (d) information revamp outcome with red dots representative unrepaired tampered lumps. (e) Mistaken information revamp outcome obtain with a mistaken key. In below illustrate the outcome of overlay a fair rectangular outline with a false autograph Simo on the authentic autograph C. W. Lee in the stego-picture of Fig. shows the verification outcome capitulate by Algorithm, with the ancient lump representative the detect tamper picture parts. As can be observe the overlay rectangular element on the autograph C. W. Lee has be detect entirely. For every of the notice interfere lump, if at slightest two untampered distribute of it can be together, its creative contented can be revamp, compliant the outcome shown in Fig. or else, the interfere lump is absent unrepaired as exposed by the red dots in Fig. moreover, we demonstrate the information revamp outcome acquire with a incorrect key In Fig. As can be seen, the revamp vocation cannot be proficient properly; the outcome is just noise. A manuscript procession below the autograph in the indication document moved out behind a fair rectangular group was superimposed on it. The outcome of picture verification and revamp are shown in Figs. and, correspondingly. although some lump are not repair as indicate by the scarlet dots in, the revamp outcome of the transcript line is visually well identifiable. To test extra the presentation of the projected scheme, we distended tamper areas throughout assault and a outcome is shown. It can be seen from the shape that the information revamp outcome becomes inferior when the tamper region grows. This is practical since when the tamper region becomes superior, fewer incomplete distribute for information revamp will continue to exist. evaluation of performance with Other schemes Moreover, along with the techniques with interfere localization ability at the lump stage similar to Yang and Kot Tzeng and Tsai, and the projected scheme, the projected scheme afford a finer verification exactitude with the block size of 2 3. specially, the technique in wants large macro-lumps to capitulate pixel flip abilities for implant verification information. In the case of utilize lesser block, Tzengand Tsai s technique has a high opportunity to produce sound pixels as mention in, and so they demeanor research outcome with the superior lump size Table. evaluation of text picture verification schemea. As to the distribution of authentic picture element, because there survive no flappable pixel for utilize by the techniques of to implant information in all-white constituency of a text picture, the sharing of authentic picture fraction be liable to be constrained to be on appearance or caress in the text, while the projected technique does not have this constraint. However, in the dependability of an picture part together with such all-white region can be still guarantee by the utilize of cryptographic signature entrenched in other region of the picture. At previous, the schemes of control pixel flip capability and the scheme of implement pixel substitution for the aspire of information implant. The projected technique is the only one which create utilize of the alpha control plane as an alternative of the bit plane. 2029
6 VI. CONCLUSIONS A novel shaded picture confirmation scheme with a information revamp ability for binary-like grayscale text pictures support on privacy of distribution has been projected. Both the produced confirmation indication and the substance of a lump are changed into incomplete distribution by the Shamir technique, which are then spread in a well-made method into an alpha control plane to produce a stego-picture in the PNG format. The undesired thick effect observable in the stegoimage approaching from embedding the incomplete distribute is remove by mapping the distribute values into a little series of alpha control values close to their highest precision value of 255. In the development of picture lump confirmation, a lump in the stego-picture is regard as have been interfere with if the calculate verification indication does not equal that extract from equivalent incomplete distributed in the alpha control plane. For self-repairing of the substance of a tamper lump, the repeal Shamir method is utilize to calculate the novel contented of the lump from some two untampered distribute. Procedures for ornamental the protections of the information entrenched in the alpha control plane were also projected. Experimental outcome have been exposed to confirm the efficiency of the projected scheme. prospect study may be aimed at to alternative of other lump sizes and associated constraint. To progress information revamp possessions. Apps of the projected technique to confirmation and revamp of assault color pictures may also be aimed. [7] H. Y. Kim and A. Afif, Secure authentication waterm for halftone and binary images, Int l Journal of imaging Systems and Technology, vol. 14, no. 4, pp , 2004 [8] C. H. Tzeng and W. H. Tsai. A new approach to authentiction f binary images for multimedia communication with distortion reduction and security enhancement, IEEE com munications Letters, vol. 7, no. 9, pp [9] Y. Lee, J. Hur, H. Kim, Y. Park and H. Yoon, A new binary image authentication scheme with small distortion and low false negative rates, IEICE Trans. on Communications, vol E90-B, no. 11, Nov [10] Y. Lee, H. Kim, and Y. Park, A new data hiding scheme for binary image authentication with small image distortion. Information Sci., vol. 179, no. 22, pp , Nov REFERENCES [1] C. S. Lu and H. Y. M. Liao, Multipurpose watermarking forimage authentication and protection, IEEE Trans. on ImageProcessing, vol. 10, no. 10, pp , Oct [2] M. U. Celik, G. Sharma, E. Saber and A. M. Tekalp, Hier archical watermarking for secure image authentication with localization, IEEE Trans.on Image Processing, vol. 11, no. 6, pp , June 2002 [3] Z. M. Lu, D. G. Xu and S. H. Sun, Multipurpose image watermarking algorithm based on multistage vector quantiza tion IEEE Trans. on Image Proc., vol. 14, pp , June 2005 [4] M. Wu and B. Liu, Data hiding in binary images for authenication and annotation, IEEE Trans.on Multimedia, vol. 6, no. 4, pp , Aug [5] H. Yang and A. C. Kot, Binary image authentication with tampering localization by embedding cryptographic signature and block identifier, I EEE signal processing letters vol. 13 no. 12, pp , Dec [6] H. Yang and A. C. Kot, Pattern-based data hiding for binary images authentication by connectivitypreserving, IEEE Trans. on Multimedia, vol. 9, no. 3, p p , April
Passport Authentication Using PNG Image with Data Repair Capability
Passport Authentication Using PNG Image with Data Repair Capability Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P Abstract The system Passport Authentication Using PNG Image with Data Repair
More informationAuthentication of grayscale document images using shamir secret sharing scheme.
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VII (Mar-Apr. 2014), PP 75-79 Authentication of grayscale document images using shamir secret
More informationAn Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images
An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images Ishwarya.M 1, Mary shamala.l 2 M.E, Dept of CSE, IFET College of Engineering, Villupuram, TamilNadu, India 1 Associate Professor,
More informationAn Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*
An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction* Che-Wei Lee 1 and Wen-Hsiang Tsai 1, 2, 1 Department of Computer Science
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationLocal prediction based reversible watermarking framework for digital videos
Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,
More informationWatermarking patient data in encrypted medical images
Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation
More informationDigital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media
1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College
More informationIEEE Signal Processing Letters: SPL Distance-Reciprocal Distortion Measure for Binary Document Images
IEEE SIGNAL PROCESSING LETTERS, VOL. X, NO. Y, Z 2003 1 IEEE Signal Processing Letters: SPL-00466-2002 1) Paper Title Distance-Reciprocal Distortion Measure for Binary Document Images 2) Authors Haiping
More informationREVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING
REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT
More informationFragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang
1490 IEEE TRANSACTIONS ON MULTIMEDIA, VOL 10, NO 8, DECEMBER 2008 Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang Abstract This paper proposes a novel fragile
More informationAn Enhanced Least Significant Bit Steganography Technique
An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationReversible data hiding based on histogram modification using S-type and Hilbert curve scanning
Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using
More informationImproved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2
Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India
More informationAN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney
26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney
More informationDigital Image Sharing using Encryption Processes
Digital Image Sharing using Encryption Processes Taniya Rohmetra 1, KshitijAnil Naik 2, Sayali Saste 3, Tejan Irla 4 Graduation Student, Department of Computer Engineering, AISSMS-IOIT, Pune University
More informationExploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise
Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect
More informationREVERSIBLE data hiding, or lossless data hiding, hides
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,
More informationReversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method
ISSN (e): 2250 3005 Vol, 04 Issue, 10 October 2014 International Journal of Computational Engineering Research (IJCER) Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption
More informationLSB Encoding. Technical Paper by Mark David Gan
Technical Paper by Mark David Gan Chameleon is an image steganography software developed by Mark David Gan for his thesis at STI College Bacoor, a computer college of the STI Network in the Philippines.
More informationPrinted Document Watermarking Using Phase Modulation
1 Printed Document Watermarking Using Phase Modulation Chabukswar Hrishikesh Department Of Computer Engineering, SBPCOE, Indapur, Maharastra, India, Pise Anil Audumbar Department Of Computer Engineering,
More informationA Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1265-1282 (2011) A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * CHE-WEI
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationAnalysis of Secure Text Embedding using Steganography
Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science
More informationA NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME
Volume 119 No. 15 2018, 135-140 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME M.Jagadeeswari,
More informationLossless Image Watermarking for HDR Images Using Tone Mapping
IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar
More informationAn Integrated Image Steganography System. with Improved Image Quality
Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality
More informationHistogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences
Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Ankita Meenpal*, Shital S Mali. Department of Elex. & Telecomm. RAIT, Nerul, Navi Mumbai, Mumbai, University, India
More informationISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,
FPGA IMPLEMENTATION OF LSB REPLACEMENT STEGANOGRAPHY USING DWT M.Sathya 1, S.Chitra 2 Assistant Professor, Prince Dr. K.Vasudevan College of Engineering and Technology ABSTRACT An enhancement of data protection
More informationPerformance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography
Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Pratima M. Nikate Department of Electronics & Telecommunication Engineering, P.G.Student,NKOCET,
More informationDIGITAL WATERMARKING GUIDE
link CREATION STUDIO DIGITAL WATERMARKING GUIDE v.1.4 Quick Start Guide to Digital Watermarking Here is our short list for what you need BEFORE making a linking experience for your customers Step 1 File
More informationHigh-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction
High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract
More informationVarious Visual Secret Sharing Schemes- A Review
Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse
More informationInternational Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page
Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology
More informationVISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION
VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati
More informationWebpage: Volume 4, Issue VI, June 2016 ISSN
4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering
More informationInternational Journal of Scientific & Engineering Research, Volume 8, Issue 4, April ISSN
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 324 FPGA Implementation of Reconfigurable Processor for Image Processing Ms. Payal S. Kadam, Prof. S.S.Belsare
More informationDigital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)
Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on
More informationLOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD
LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,
More informationHiding Image in Image by Five Modulus Method for Image Steganography
Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another
More informationDigital Watermarking Using Homogeneity in Image
Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar
More informationSTEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE
STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE www.technicalpapers.co.nr ABSTRACT : Steganography is the process of hiding secret information in a cover image. Our aim is to test a set
More informationChapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS
44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING
More informationEnhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing
Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology
More informationA Visual Cryptography Based Watermark Technology for Individual and Group Images
A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,
More informationA new seal verification for Chinese color seal
Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558
More informationA Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2
A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,
More informationZero-Based Code Modulation Technique for Digital Video Fingerprinting
Zero-Based Code Modulation Technique for Digital Video Fingerprinting In Koo Kang 1, Hae-Yeoun Lee 1, Won-Young Yoo 2, and Heung-Kyu Lee 1 1 Department of EECS, Korea Advanced Institute of Science and
More informationReversible Watermarking on Histogram Pixel Based Image Features
Reversible Watermarking on Histogram Pixel Based Features J. Prisiba Resilda (PG scholar) K. Kausalya (Assistant professor) M. Vanitha (Assistant professor I) Abstract - Reversible watermarking is a useful
More informationExploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme
Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme Surbhi Gupta 1, Parvinder S. Sandhu 2 Abstract Steganography means covered writing. It is the concealment of information
More informationDigital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers
Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,
More informationA Copyright Information Embedding System
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 11 April 2015 ISSN (online): 2349-6010 A Copyright Information Embedding System Sreeresmi T.S Assistant Professor
More informationA New Compression Method for Encrypted Images
Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen
More informationInvestigation of Various Image Steganography Techniques in Spatial Domain
Volume 3, Issue 6, June-2016, pp. 347-351 ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Investigation of Various Image Steganography
More informationBasic concepts of Digital Watermarking. Prof. Mehul S Raval
Basic concepts of Digital Watermarking Prof. Mehul S Raval Mutual dependencies Perceptual Transparency Payload Robustness Security Oblivious Versus non oblivious Cryptography Vs Steganography Cryptography
More informationVisual Secrete Sharing by Diverse Image Media
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 4 April 2015, Page No. 11615-11620 Visual Secrete Sharing by Diverse Image Media Aparna Bhosale 1, Jyoti
More informationColor PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret
More informationRobust Invisible QR Code Image Watermarking Algorithm in SWT Domain
Robust Invisible QR Code Image Watermarking Algorithm in SWT Domain Swathi.K 1, Ramudu.K 2 1 M.Tech Scholar, Annamacharya Institute of Technology & Sciences, Rajampet, Andhra Pradesh, India 2 Assistant
More informationImplementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise
International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 4, Jul - Aug 2016 RESEARCH ARTICLE OPEN ACCESS Implementation of Block based Mean and Median Filter for Removal of
More informationIntroduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio
Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of
More informationEnhance Image using Dynamic Histogram and Data Hiding Technique
_ Enhance Image using Dynamic Histogram and Data Hiding Technique 1 D.Bharadwaja, 2 Y.V.N.Tulasi 1 Department of CSE, Gudlavalleru Engineering College, Email: bharadwaja599@gmail.com 2 Department of CSE,
More informationIntroduction to Coding Theory
Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared
More informationSterilization of Stego-images through Histogram Normalization
Sterilization of Stego-images through Histogram Normalization Goutam Paul 1 and Imon Mukherjee 2 1 Dept. of Computer Science & Engineering, Jadavpur University, Kolkata 700 032, India. Email: goutam.paul@ieee.org
More informationWatermarking System Using LSB
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 3, Ver. II (May.-June. 2017), PP 75-79 www.iosrjournals.org Watermarking System Using LSB Hewa Majeed
More informationRGB Intensity Based Variable-Bits Image Steganography
RGB Intensity Based Variable-Bits Image Steganography Mohammad Tanvir Parvez and Adnan Abdul-Aziz Gutub College of Computer Sciences & Engineering King Fahd University of Petroleum & Minerals, Dhahran
More informationAn Implementation of LSB Steganography Using DWT Technique
An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication
More informationCommutative reversible data hiding and encryption
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication
More informationA STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME
International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi
More informationAn Overview of Visual Cryptography Schemes for Encryption of Images
An Overview of Visual Cryptography Schemes for Encryption of Images Moumita Pramanik 1, Kalpana Sharma 2 1 Sikkim Manipal Institute of Technology, Majitar, India, Email: moumita.pramanik@gmail.com 2 Sikkim
More informationA New Steganographic Method for Palette-Based Images
A New Steganographic Method for Palette-Based Images Jiri Fridrich Center for Intelligent Systems, SUNY Binghamton, Binghamton, NY 13902-6000 Abstract In this paper, we present a new steganographic technique
More informationPattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition
Pattern Recognition 41 (2008) 3497 -- 3506 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Dual watermark for image tamper detection and recovery
More informationMedical Image Watermarking using a Perceptual Similarity Metric
MIT International Journal Electrical and Instrumentation Engineering Vol. 1, No. 1, Jan. 2011, pp. 29-34 29 Medical Image Watermarking using a Perceptual Similarity Metric Janani Natarajan Engineering
More informationAn Improvement for Hiding Data in Audio Using Echo Modulation
An Improvement for Hiding Data in Audio Using Echo Modulation Huynh Ba Dieu International School, Duy Tan University 182 Nguyen Van Linh, Da Nang, VietNam huynhbadieu@dtu.edu.vn ABSTRACT This paper presents
More informationENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY
Cell, Manjari Road,Hadapsar,Pune-412307. India,Chief Editor:Dr.K.R.Harne,Editors:Prof R V Patil,Prof Niraja Jain ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY AbhishekShinde,
More informationBackground Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia
Information Hiding Phil Regalia Department of Electrical Engineering and Computer Science Catholic University of America Washington, DC 20064 regalia@cua.edu Baltimore IEEE Signal Processing Society Chapter,
More informationDWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON
DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.
More informationA Novel Approach for Hiding Huge Data in Image
EUROPEAN ACADEMIC RESEARCH Vol. III, Issue 2/ May 2015 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Novel Approach for Hiding Huge Data in Image ZAINALABIDEEN ABDUAL
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationBlind Image Fidelity Assessment Using the Histogram
Blind Image Fidelity Assessment Using the Histogram M. I. Khalil Abstract An image fidelity assessment and tamper detection using two histogram components of the color image is presented in this paper.
More informationA COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE
A COMPARATIVE STUDY ON IMAGE COMPRESSION USING HALFTONING BASED BLOCK TRUNCATION CODING FOR COLOR IMAGE Meharban M.S 1 and Priya S 2 1 M.Tech Student, Dept. of Computer Science, Model Engineering College
More informationA Novel Technique in Visual Cryptography
International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 10 [May. 2014] PP: 57-61 A Novel Technique in Visual Cryptography B. Ravi Kumar 1, P.Srikanth 2 1,2
More informationHYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM
International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING
More informationIDMA Technology and Comparison survey of Interleavers
International Journal of Scientific and Research Publications, Volume 3, Issue 9, September 2013 1 IDMA Technology and Comparison survey of Interleavers Neelam Kumari 1, A.K.Singh 2 1 (Department of Electronics
More informationVARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES
VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information
More informationFixed Unmitigated Image Cryptography Schemes
IJCST Vo l. 3, Is s u e 3, Ju l y - Se p t 2012 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fixed Unmitigated Image Cryptography Schemes 1 V. Redya Jadav, 2 Jonnalagadda Sravani 1,2 Dept. of CSE,
More informationEmbedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking
3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017) April 19-20, 2017 Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based
More informationarxiv: v1 [cs.mm] 31 Mar 2014
arxiv:1404.1313v1 [cs.mm] 31 Mar 2014 Color to Gray and Back transformation for distributing color digital images V.N. Gorbachev, E.M. Kaynarova, I.K. Metelev, E.S. Yakovleva. North -Western Institute
More informationHigh capacity robust audio watermarking scheme based on DWT transform
High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com
More informationIMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM
IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM Shyam Shukla 1, Aparna Dixit 2 1 Information Technology, M.Tech, MBU, (India) 2 Computer Science, B.Tech, GGSIPU, (India) ABSTRACT The main goal of steganography
More informationTampering Detection Algorithms: A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.82-86 Tampering Detection Algorithms: A Comparative Study
More informationAn Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images
An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images Linju P.S, Sophiya Mathews Abstract: Visual cryptography is a technique of cryptography in
More informationSpread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression
Spread Spectrum Watermarking Using HVS Model and Wavelets in JPEG 2000 Compression Khaly TALL 1, Mamadou Lamine MBOUP 1, Sidi Mohamed FARSSI 1, Idy DIOP 1, Abdou Khadre DIOP 1, Grégoire SISSOKO 2 1. Laboratoire
More informationDESIGN & IMPLEMENTATION OF FIXED WIDTH MODIFIED BOOTH MULTIPLIER
DESIGN & IMPLEMENTATION OF FIXED WIDTH MODIFIED BOOTH MULTIPLIER 1 SAROJ P. SAHU, 2 RASHMI KEOTE 1 M.tech IVth Sem( Electronics Engg.), 2 Assistant Professor,Yeshwantrao Chavan College of Engineering,
More informationQUICK START (See following pages for detailed instructions.)
REATING GRAPHIS for use in books and journals QUIK START (See following pages for detailed instructions.) GENERAL GUIDELINES reate graphics at 100% of the size at which they will be printed. Do not use
More informationA Study on Steganography to Hide Secret Message inside an Image
A Study on Steganography to Hide Secret Message inside an Image D. Seetha 1, Dr.P.Eswaran 2 1 Research Scholar, School of Computer Science and Engineering, 2 Assistant Professor, School of Computer Science
More informationLocal Binary Pattern (LBP) of Image Tampering Fragile Watermarking Algorithm
Local Binary Pattern (LBP) of Image Tampering Fragile Watermarking Algorithm Kodavanti Venkata Pratyush Department of CSE, Gitam University, Visakhapatnam, AP, India. Abstract In this paper we portray
More informationENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY
ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY Ranjan Kumar H S 1, Prasanna Kumar H R 1, Sudeepa K B 2 and Ganesh Aithal 2 1 Dept of CSE, NMAMIT, Nitte, Karnataka, India 2
More informationReversible Data Hiding in Encrypted Images based on MSB. Prediction and Huffman Coding
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding Youzhi Xiang 1, Zhaoxia Yin 1,*, Xinpeng Zhang 2 1 School of Computer Science and Technology, Anhui University 2 School
More information