Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (41)
  • Open Access


    Multiple Perspective of Multipredictor Mechanism and Multihistogram Modification for High-Fidelity Reversible Data Hiding

    Kai Gao1, Chin-Chen Chang1,*, Chia-Chen Lin2,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 813-833, 2024, DOI:10.32604/csse.2024.038308

    Abstract Reversible data hiding is a confidential communication technique that takes advantage of image file characteristics, which allows us to hide sensitive data in image files. In this paper, we propose a novel high-fidelity reversible data hiding scheme. Based on the advantage of the multipredictor mechanism, we combine two effective prediction schemes to improve prediction accuracy. In addition, the multihistogram technique is utilized to further improve the image quality of the stego image. Moreover, a model of the grouped knapsack problem is used to speed up the search for the suitable embedding bin in each sub-histogram. More >

  • Open Access


    Coverless Image Steganography System Based on Maze Game Generation

    Al Hussien Seddik Saad1, Mohammed S. Reda2, Gamal M. Behery2, Ahmed A. El-harby2, Mohammed Baz3, Mohamed Abouhawwash4,5,*, Ahmed Ismail Ebada6

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 125-138, 2023, DOI:10.32604/iasc.2023.032084

    Abstract The trend of digital information transformation has become a topic of interest. Many data are threatening; thus, protecting such data from attackers is considered an essential process. Recently, a new methodology for data concealing has been suggested by researchers called coverless steganography. Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image. This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the… More >

  • Open Access


    High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification

    Li Liu1, Jing Li1, Yingchun Wu1, Chin-Chen Chang2,*, Anhong Wang1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1415-1432, 2023, DOI:10.32604/csse.2023.040039

    Abstract Data hiding (DH) is an important technology for securely transmitting secret data in networks, and has increasing become a research hotspot throughout the world. However, for Joint photographic experts group (JPEG) images, it is difficult to balance the contradiction among embedded capacity, visual quality and the file size increment in existing data hiding schemes. Thus, to deal with this problem, a high-imperceptibility data hiding for JPEG images is proposed based on direction modification. First, this proposed scheme sorts all of the quantized discrete cosine transform (DCT) block in ascending order according to the number of… More >

  • Open Access


    Reversible Data Hiding with Contrast Enhancement Using Bi-histogram Shifting and Image Adjustment for Color Images

    Goma Tshivetta Christian Fersein Jorvialom1,2, Lord Amoah1,2,*

    Journal of Quantum Computing, Vol.4, No.3, pp. 183-197, 2022, DOI:10.32604/jqc.2022.039913

    Abstract Prior versions of reversible data hiding with contrast enhancement (RDHCE) algorithms strongly focused on enhancing the contrast of grayscale images. However, RDHCE has recently witnessed a rise in contrast enhancement algorithms concentrating on color images. This paper implies a method for color images that uses the RGB (red, green, and blue) color model and is based on bi-histogram shifting and image adjustment. Bi-histogram shifting is used to embed data and image adjustment to achieve contrast enhancement by adjusting the images resulting from each channel of the color images before combining them to generate the final… More >

  • Open Access


    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A… More >

  • Open Access


    An Efficient EMD-Based Reversible Data Hiding Technique Using Dual Stego Images

    Ahmad A. Mohammad*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1139-1156, 2023, DOI:10.32604/cmc.2023.035964

    Abstract Exploiting modification direction (EMD) based data hiding techniques (DHTs) provide moderate data hiding capacity and high-quality stego images. The overflow problem and the cyclic nature of the extraction function essentially hinder their application in several fields in which reversibility is necessary. Thus far, the few EMD reversible DHTs are complex and numerically demanding. This paper presents a novel EMD-based reversible DHT using dual-image. Two novel 2 × 4 modification lookup tables are introduced, replacing the reference matrix used in similar techniques and eliminating the numerically demanding search step in similar techniques. In the embedding step, one of… More >

  • Open Access


    A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation

    Al-Hussien Seddik1, Mohammed Salah2, Gamal Behery2, Ahmed El-harby2, Ahmed Ismail Ebada2, Sokea Teng3, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5087-5103, 2023, DOI:10.32604/cmc.2023.035364

    Abstract The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This system consists of two components. The first component contains two processes, encryption process,… More >

  • Open Access


    A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System

    Saima Kanwal1, Feng Tao1,*, Ahmad Almogren2, Ateeq Ur Rehman3, Rizwan Taj1, Ayman Radwan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 201-219, 2023, DOI:10.32604/cmes.2022.020255

    Abstract The authenticity and integrity of healthcare is the primary objective. Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads to covering image distortion and visual quality resulting in data security detection. A trade-off between robustness, imperceptibility, and embedded capacity is difficult to achieve with current algorithms due to limitations in their ability. Keeping this purpose insight, an improved reversibility watermarking methodology is proposed to maximize data embedding capacity and imperceptibility while maintaining data security as a primary concern. A key is generated by a… More >

  • Open Access


    Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction and Labeling

    Jiaohua Qin1,*, Zhibin He1, Xuyu Xiang1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3613-3628, 2022, DOI:10.32604/cmc.2022.030372

    Abstract Recently, reversible data hiding in encrypted images (RDHEI) based on pixel prediction has been a hot topic. However, existing schemes still employ a pixel predictor that ignores pixel changes in the diagonal direction during prediction, and the pixel labeling scheme is inflexible. To solve these problems, this paper proposes reversible data hiding in encrypted images based on adaptive prediction and labeling. First, we design an adaptive gradient prediction (AGP), which uses eight adjacent pixels and combines four scanning methods (i.e., horizontal, vertical, diagonal, and diagonal) for prediction. AGP can adaptively adjust the weight of the More >

  • Open Access


    Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy

    Chin-Feng Lee, Kuo-Chung Chan*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1551-1566, 2023, DOI:10.32604/csse.2023.026294

    Abstract Dual-image reversible data hiding (RDH) is a technique for hiding important messages. This technology can be used to safely deliver secret messages to the recipient through dual images in an open network without being easily noticed. The recipient of the image must receive the two stego-images before the secret message can be completely retrieved. Imperceptibility is one of the main advantages of data hiding technology; to increase the imperceptibility, the quality requirements of the stego-images are relatively important. A dual steganographic image RDH method, called a DS-CF scheme that can achieve a better steganographic image… More >

Displaying 1-10 on page 1 of 41. Per Page