A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Image Data Compression: Block Truncation Coding (Btc) Techniques
Image Data Compression: Block Truncation Coding (Btc) Techniques
A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Invertible Authentication Watermark for JPEG Images
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
Reversible hiding in DCT-based compressed images
Information Sciences: an International Journal
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization
IEEE Transactions on Circuits and Systems for Video Technology
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A DCT based reversible data embedding scheme for MPEG-4 video using HVS characteristics
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Region of interest signalling for encrypted JPEG images
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
To enhance the hiding capacity of Chang et al.'s reversible DCT-based data hiding scheme, in this paper we propose another method called a layer-1 data embedding strategy. Our proposed layer-1 strategy considers some areas not used by Chang et al.'s scheme, which we call layer-2 data embedding. To achieve our objective, we applied Tian's pixel expansion method to design our layer-1 data embedding strategy. Experimental results confirm that the hiding capacity provided by combining our strategy with Chang et al.'s is higher than that provided by the Chang et al. approach alone. Moreover, the image quality of stego-images with our proposed scheme remains above 30 dB for most test images, which is better than the best image quality offered by Chang et al.'s scheme. Finally, the security and reversibility of Chang et al.'s scheme is unaffected when their layer-2 scheme is combined with our proposed layer-1 scheme.