Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number 

Abstract

An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images which are embedded in circulation images is evaluated with the Root Mean Square difference between the original secret image and extracted one from the circulation images. Mean while the conventional Multi-Resolution Analysis (MRA) based data hiding is attempted with a variety of parameters, level of MRA and the frequency component location of which secret image is replaced to it and is compared to the proposed method. It is found that the proposed data hiding method is superior to the conventional method. Also the conventional data hiding method is not robust against circulation image processing. 

Authors and Affiliations

Kohei Arai, Yuji Yamada

Keywords

Related Articles

Error Analysis of Air Temperature Profile Retrievals with Microwave Sounder Data Based on Minimization of Covariance Matrix of Estimation Error

Error analysis of air temperature profile retrievals with microwave sounder data based on minimization of covariance matrix of estimation error is conducted. Additive noise is taken into account in the observation data w...

Authenticating Sensitive Speech-Recitation in Distance-Learning Applications using Real-Time Audio Watermarking

Thispaper focuses on audio-watermarking authentication and integrity-protection within the context of the speech-data transmitted over the Internet in a real-time learning environment.The Arabic Quran recitation through...

WOLF: a Research Platform to Write NFC Secure Applications on Top of Multiple Secure Elements (With an Original SQL-Like Interface)

This article presents the WOLF (Wallet Open Library Framework) platform which supports an original interface for NFC developers called “SE-QL”. SE-QL is a SQL-like interface which eases and optimizes NFC secure applicati...

Development of Copeland Score Methods for Determine Group Decisions

Voting method requires to determine group decision of decision by each decision maker in group. Determination of decisions by group of decision maker requires voting methods. Copeland score is one of voting method that h...

Context Switching Semaphore with Data Security Issues using Self-healing Approach

The main objective of a self healing scheme is to share and secure the information of any system at the same time. “Self-healing” techniques ultimately are dependable computing techniques. Specifically self-healing syst...

Download PDF file
  • EP ID EP108266
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

Kohei Arai, Yuji Yamada (2011). Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number . International Journal of Advanced Computer Science & Applications, 2(9), 33-40. https://europub.co.uk/articles/-A-108266