An Information Hiding Scheme Based on Pixel-Value-Ordering and Prediction-Error Expansion with Reversibility
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 8
Abstract
This paper proposes a data hiding scheme based on pixel-value-ordering and predication-error expansion. In a natural image, most neighboring pixels have similar pixel values, i.e. the difference between neighboring pixels is small. Based on the observation, we may predict a pixel’s value according its neighboring pixels. The proposed scheme divides an image into non-overlapping blocks each of which consists of three pixels, and pixels in a block are sorted in a descending order. Messages are embedded into two difference values, where one is between the largest and medium pixels and the other is between the smallest and medium ones. In the embedding process, difference values equal to 0 or greater than 1 are unchanged or increased by 1, respectively, and those equal to 1 are also unchanged or increased by 1 if the message bit to be embedded is equal to 0 or 1, respectively. Calculating the difference value, one may extract a message bit of 0 or 1 if it is equal to 1 or 2, respectively. Recovering pixels is done by decreasing those difference values by 1 if they are equal to or larger than 2. Experimental results demonstrate that the proposed scheme may provide much larger embedding capacity, comparing to existing study, and a satisfied image quality.
Authors and Affiliations
Ching Lin, Shih-Chieh Chen, Kuo Hwang
An Advanced Emergency Warning Message Scheme based on Vehicles Speed and Traffic Densities
In intelligent transportation systems, broadcasting Warning Messages (WMs) by Vehicular Ad hoc Networks (VANETs) communication is a significant task. Designing efficient dissemination schemes for fast and reliable delive...
Fish Image Segmentation Algorithm (FISA) for Improving the Performance of Image Retrieval System
The image features (local, global) pay vital role in image retrieval system. The effectiveness of these image features depends on the application domain, i.e., in some domains the global features generate better results...
Risk Propagation Analysis and Visualization using Percolation Theory
This article presents a percolation-based approach for the analysis of risk propagation, using malware spreading as a showcase example. Conventional risk management is often driven by human (subjective) assessment of how...
A Systematic Review of Cyber Security and Classification of Attacks in Networks
Cyber security plays an important role to secure the people who use internet via different electronic devices in their daily life. Some causes occurred all over world that people face problems when they connect their dev...
A Tentative Analysis of the Rectangular Horizontal-slot Microstrip Antenna
In this paper, we have presented a new type of microstrip antenna mentioned as rectangular horizontal-slot patch antenna. Our main motto is to design a novel antenna which has the simplicity in structure and higher retur...