An Information Hiding Scheme Based on Pixel-Value-Ordering and Prediction-Error Expansion with Reversibility
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 8
Abstract
This paper proposes a data hiding scheme based on pixel-value-ordering and predication-error expansion. In a natural image, most neighboring pixels have similar pixel values, i.e. the difference between neighboring pixels is small. Based on the observation, we may predict a pixel’s value according its neighboring pixels. The proposed scheme divides an image into non-overlapping blocks each of which consists of three pixels, and pixels in a block are sorted in a descending order. Messages are embedded into two difference values, where one is between the largest and medium pixels and the other is between the smallest and medium ones. In the embedding process, difference values equal to 0 or greater than 1 are unchanged or increased by 1, respectively, and those equal to 1 are also unchanged or increased by 1 if the message bit to be embedded is equal to 0 or 1, respectively. Calculating the difference value, one may extract a message bit of 0 or 1 if it is equal to 1 or 2, respectively. Recovering pixels is done by decreasing those difference values by 1 if they are equal to or larger than 2. Experimental results demonstrate that the proposed scheme may provide much larger embedding capacity, comparing to existing study, and a satisfied image quality.
Authors and Affiliations
Ching Lin, Shih-Chieh Chen, Kuo Hwang
Passive Clustering for Efficient Energy Conservation in Wireless Sensor Network
A wireless sensor network is a set of miniature nodes that consume little energy and route information to a base station. It will enable reliable monitoring of a wide variety of phenomena for civilian, military and medic...
Introducing Time based Competitive Advantage in IT Sector with Simulation
Incompletion of projects in time leads to project failure which is the major dilemma of the software industry. Different strategies are used to gain a competitive advantage over competitors in business. In software persp...
Integrated Approach to Conceptual Modeling
Conceptual modeling is supporting understanding and communication of the requirements in developing the information system (IS). The nature of requirements is usually divided into the functional (FRs) and non-functional...
A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix
In this paper, we have developed a block cipher by modifying the Feistel cipher. In this, the plaintext is taken in the form of a pair of matrices. In one of the relations of encryption the plaintext is multiplied...
Optimization based Approach for Content Distribution in Hybrid Mobile Social Networks
This paper presents the new strategy for smooth content distribution in the mobile social network. We proposed a new method, hybrid mobile social network architecture scheme considered as one node of a social community c...