Adaptive reversible data hiding with pyramidal structure
نویسندگان
چکیده
منابع مشابه
Adaptive Image Steganography by Reversible Data Hiding
An adaptive steganographic scheme is proposed in this paper. The adaptive quantization embedder is introduced and employed by block-wised fashion. We also constructed contrast-correlation distortion metric to optimally choose quantization steps for image blocks to guarantee more data being embedded in busy areas. Different form existing methods, our scheme embeds the AQE parameters together wit...
متن کاملReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Recently, a novel reversible data hiding scheme is proposed for contrast enhancement by Wu (IEEE Signal Process Lett 22.1:81–85, 2015). Instead of pursuing the traditional high PSNR value, he designs the message embedding algorithm to enhance the contrast of the host image. In this paper, an extended scheme is proposed to not only adaptively enhance the contrast of the image, but also to keep t...
متن کاملAdvanced reversible Data Hiding With Encrypted Data
The advanced RDH work focuses on both data encryption and image encryption which makes it more secure and free of errors. All previous methods embed data without encrypting the data which may subject to errors on the data extraction or image recovery. The proposed work provides a novel RDH scheme in which both data and image can be encrypted and extracted reversibly without any errors. In the p...
متن کاملEnsemble Reversible Data Hiding
The conventional reversible data hiding (RDH) algorithms often consider the host as a whole to embed a payload. In order to achieve satisfactory rate-distortion performance, the secret bits are embedded into the noise-like component of the host such as prediction errors. From the rate-distortion view, it may be not optimal since the data embedding units use the identical parameters. This motiva...
متن کاملReversible Data Hiding
Reversible data hiding, in which the stago-media can be reversed to the original cover media exactly, has attracted increasing interests from the data hiding community. In this study, the existing reversible data hiding algorithms, including some newest schemes, have been classified into three categories: 1) Those developed for fragile authentication; 2) Those developed for achieving high data ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vietnam Journal of Computer Science
سال: 2014
ISSN: 2196-8888,2196-8896
DOI: 10.1007/s40595-014-0020-y