Text compression
Arithmetic coding for data compression
Communications of the ACM
Introduction to data compression (2nd ed.)
Introduction to data compression (2nd ed.)
Cryptography: Theory and Practice
Cryptography: Theory and Practice
IEEE Transactions on Computers
Lossless data embedding--new paradigm in digital watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reliable information bit hiding
IEEE Transactions on Circuits and Systems for Video Technology
Joint security and robustness enhancement for quantization based data embedding
IEEE Transactions on Circuits and Systems for Video Technology
Reversible Data Hiding Based on Three-Circular-Pixel Difference Expansion
Fundamenta Informaticae
A New Approach in Reversible Watermarking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Reversible data hiding based on block median preservation
Information Sciences: an International Journal
Reversible Data Hiding Based on Three-Circular-Pixel Difference Expansion
Fundamenta Informaticae
Hi-index | 0.00 |
This paper proposes a lossless data embedding scheme of great payload capacity and good image quality, which is based on difference expansion. In this scheme, every pixel in a host image is divided into two nibbles and each nibble pair between two adjacent pixels can be used to hide a secret message. In order to completely recover the host image, the arithmetic coding is adopted based on prediction by partial matching (PPM) model to compress the restored information. This proposed scheme has been successfully applied to different images. According to the experimental results, embedded information can be extracted correctly and quickly from the embedded image. In addition, the proposed scheme can not only hide a large amount of information in a host image without making noticeable distortion, but can also completely restore the host image from the embedded image.