Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (42)
  • Open Access

    ARTICLE

    A Novel Reversible Data Hiding Scheme Based on Lesion Extraction and with Contrast Enhancement for Medical Images

    Xingxing Xiao1, Yang1,*, Rui Li2, Weiming Zhang3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 101-115, 2019, DOI:10.32604/cmc.2019.05293

    Abstract The medical industry develops rapidly as science and technology advance. People benefit from medical resource sharing, but suffer from privacy leaks at the same time. In order to protect patients’ privacy and improve quality of medical images, a novel reversible data hiding (RDH) scheme based on lesion extraction and with contrast enhancement is proposed. Furthermore, the proposed scheme can enhance the contrast of medial image's lesion area directly and embed high-capacity privacy data reversibly. Different from previous segmentation methods, this scheme first adopts distance regularized level set evolution (DRLSE) to extract lesion and targets at… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding Based on Pixel-Value-Ordering and Pixel Block Merging Strategy

    Wengui Su1,2, Xiang Wang3,*, Yulong Shen1

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 925-941, 2019, DOI:10.32604/cmc.2019.04842

    Abstract With the reversible data hiding method based on pixel-value-ordering, data are embedded through the modification of the maximum and minimum values of a block. A significant relationship exists between the embedding performance and the block size. Traditional pixel-value-ordering methods utilize pixel blocks with a fixed size to embed data; the smaller the pixel blocks, greater is the embedding capacity. However, it tends to result in the deterioration of the quality of the marked image. Herein, a novel reversible data hiding method is proposed by incorporating a block merging strategy into Li et al.’s pixel-value-ordering method,… More >

  • Open Access

    ARTICLE

    A HEVC Video Steganalysis Algorithm Based on PU Partition Modes

    Zhonghao Li1, Laijin Meng1, Shutong Xu1, Zhaohong Li1,2,*, Yunqing Shi3, Yuanchang Liang1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 563-574, 2019, DOI:10.32604/cmc.2019.05565

    Abstract Steganalysis is a technique used for detecting the existence of secret information embedded into cover media such as images and videos. Currently, with the higher speed of the Internet, videos have become a kind of main methods for transferring information. The latest video coding standard High Efficiency Video Coding (HEVC) shows better coding performance compared with the H.264/AVC standard published in the previous time. Therefore, since the HEVC was published, HEVC videos have been widely used as carriers of hidden information.
    In this paper, a steganalysis algorithm is proposed to detect the latest HEVC video steganography… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding in Encrypted Image Based on Block Classification Permutation

    Qun Mo1, Heng Yao1, Fang Cao2, Zheng Chang3, Chuan Qin1,*

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 119-133, 2019, DOI:10.32604/cmc.2019.05770

    Abstract Recently, reversible data hiding in encrypted image (RDHEI) has attracted extensive attention, which can be used in secure cloud computing and privacy protection effectively. In this paper, a novel RDHEI scheme based on block classification and permutation is proposed. Content owner first divides original image into non-overlapping blocks and then set a threshold to classify these blocks into smooth and non-smooth blocks respectively. After block classification, content owner utilizes a specific encryption method, including stream cipher encryption and block permutation to protect image content securely. For the encrypted image, data hider embeds additional secret information… More >

  • Open Access

    ARTICLE

    Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method

    Yang Wu1, Weiping Shang2,*, Jiahao Chen3

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 199-214, 2019, DOI:10.32604/cmc.2019.05194

    Abstract Robust data hiding techniques attempt to construct covert communication in a lossy public channel. Nowadays, the existing robust JPEG steganographic algorithms cannot overcome the side-information missing situation. Thus, this paper proposes a new robust JPEG steganographic algorithm based on the high tense region location method which needs no side-information of lossy channel. First, a tense region locating method is proposed based on the Harris-Laplacian feature point. Then, robust cover object generating processes are described. Last, the advanced embedding cost function is proposed. A series of experiments are conducted on various JPEG image sets and the More >

  • Open Access

    ARTICLE

    On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography

    Sahib Khan1,*, M A Irfan1, Arslan Arif1, Syed Tahir Hussain Rizvi2, Asma Gul3, Muhammad Naeem4, Nasir Ahmad5

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.3, pp. 529-546, 2019, DOI:10.31614/cmes.2019.06179

    Abstract This work presents a new method of data hiding in digital images, in discrete cosine transform domain. The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding the secret information, while the low and high frequency coefficients are kept unaltered. The unaltered low frequency DCT coefficients preserves the quality of the smooth region of the cover image, while no changes in the high DCT coefficient preserve the quality of the edges. As the medium frequency components have less contribution towards energy and image details, so the… More >

  • Open Access

    ARTICLE

    High Capacity Data Hiding in Encrypted Image Based on Compressive Sensing for Nonequivalent Resources

    Di Xiao1,*, Jia Liang1, Qingqing Ma1, Yanping Xiang1, Yushu Zhang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 1-13, 2019, DOI:10.32604/cmc.2019.02171

    Abstract To fulfill the requirements of data security in environments with nonequivalent resources, a high capacity data hiding scheme in encrypted image based on compressive sensing (CS) is proposed by fully utilizing the adaptability of CS to nonequivalent resources. The original image is divided into two parts: one part is encrypted with traditional stream cipher; the other part is turned to the prediction error and then encrypted based on CS to vacate room simultaneously. The collected non-image data is firstly encrypted with simple stream cipher. For data security management, the encrypted non-image data is then embedded More >

  • Open Access

    ARTICLE

    Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography

    Sahib Khan1, *, Arslan Arif1, Syed Tahir Hussain Rizvi2, Nasir Ahmad3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.1, pp. 1-16, 2018, DOI:10.31614/cmes.2018.04141

    Abstract Cryptography and steganography are two important and related fields of infor- mation security. But, steganography is slightly different in the sense that it hides the ex- istence of secret information from unauthorized users. It is one of the most appealing research domains, have applications like copyright protection, data integrity protection and manipulation detection. Several steganography techniques have been proposed in literature. But, in this work a new information hiding algorithm is presented. The proposed technique de-correlates frequency components of cover image using discrete cosine transform and uses the least significant bits of frequency components for… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding in Classification-Scrambling Encrypted-Image Based on Iterative Recovery

    Yuyu Chen1, Bangxu Yin2, Hongjie He2, Shu Yan2, Fan Chen2,*, Hengming Tai3

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 299-312, 2018, DOI:10.3970/cmc.2018.03179

    Abstract To improve the security and quality of decrypted images, this work proposes a reversible data hiding in encrypted image based on iterative recovery. The encrypted image is firstly generated by the pixel classification scrambling and bit-wise exclusive-OR (XOR), which improves the security of encrypted images. And then, a pixel-type-mark generation method based on block-compression is designed to reduce the extra burden of key management and transfer. At last, an iterative recovery strategy is proposed to optimize the marked decrypted image, which allows the original image to be obtained only using the encryption key. The proposed More >

  • Open Access

    ARTICLE

    On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing

    Lizhi Xiong1,*, Yunqing Shi2

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 523-539, 2018, DOI:10.3970/cmc.2018.01791

    Abstract Advanced cloud computing technology provides cost saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. In this paper, two reversible data hiding… More >

Displaying 31-40 on page 4 of 42. Per Page