The visible differences predictor: an algorithm for the assessment of image fidelity
Digital images and human vision
IBM Systems Journal
Cryptography and Secure Communications
Cryptography and Secure Communications
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
Spread spectrum image steganography
IEEE Transactions on Image Processing
Proceedings of the 2nd international conference on Ubiquitous information management and communication
A novel image hiding approach based on correlation analysis for secure multimodal biometrics
Journal of Network and Computer Applications
Image hiding by using genetic algorithm and LSB substitution
ICISP'10 Proceedings of the 4th international conference on Image and signal processing
Hiding image in image using iterated function system (IFS)
ECS'10/ECCTD'10/ECCOM'10/ECCS'10 Proceedings of the European conference of systems, and European conference of circuits technology and devices, and European conference of communications, and European conference on Computer science
A module-based LSB substitution method with lossless secret data compression
Computer Standards & Interfaces
Data hiding method based on local image features
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Hi-index | 0.01 |
This paper presents a novel image-hiding method that exhibits a high hiding capacity that allows the embedded important image to be larger than the cover image, a facility that is seldom described in the literature. In the proposed method, the entire important image is divided into many nonoverlapping blocks. For each block of the important image, a block-matching procedure is used to search for the best similar block from a series of numbered candidate blocks. The obtained indices of the best-matching blocks are encoded using Huffman coding scheme, and then recorded in the least-significant-bit planes of the cover image through a monoalphabetic transposition cipher. The proposed method exhibits the following advantages over existing methods: (1) a high hiding capacity such that the embedded important image can be larger than the cover image; (2) a stego-image with a high quality, which improves the secrecy of the hidden image; and (3) a small error between the extracted important image and the original important image indicating that the extracted important image is of acceptable quality.