A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Invertible Authentication Watermark for JPEG Images
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
Reversible hiding in DCT-based compressed images
Information Sciences: an International Journal
Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes
Journal of Systems and Software
A reversible data hiding scheme for VQ indices using locally adaptive coding
Journal of Visual Communication and Image Representation
Matrix factorizations for reversible integer mapping
IEEE Transactions on Signal Processing
Steganalysis of Embedding in Two Least-Significant Bits
IEEE Transactions on Information Forensics and Security
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
A data hiding scheme based upon DCT coefficient modification
Computer Standards & Interfaces
Hi-index | 0.00 |
In this paper, we propose a reversible data hiding scheme based on the varieties of coefficients of discrete cosine transformation of an image. Cover images are decomposed into several different frequencies, and the high-frequency parts are embedded with secret data. We use integer mapping to implement our 2-dimensional discrete cosine transformation. Thus, the image recovered from the modified coefficients can be transformed back to the correct data-hidden coefficients. Since the distribution of 2-dimensional DCT coefficients looks close to Gaussian distribution centralized at zero, it is a natural candidate for embedding secret data using the histogram shifting approach. Thus, our approach shifts the positive coefficients around zero to the right and the negative coefficients around zero to the left in order to leave a space to hide the secret data. The experimental comparisons show that, compared to Chang et al. and Lin et al.'s method, the embedding capacity and quality of the stego-image of the proposed method is a great improvement.