2020
DOI: 10.3390/sym12101659
|View full text |Cite
|
Sign up to set email alerts
|

A Modulo Function-Based Robust Asymmetric Variable Data Hiding Using DCT

Abstract: This work presents a new asymmetric data hiding technique that hides a variable number of secret message bits in the discrete cosine transform (DCT) coefficients of a cover image using a modular distance technique. Prior to data hiding, the proposed framework transforms a cover image from a spatial domain to various frequency coefficients using DCT. The DCT coefficients are arranged in two groups: one with low-frequency coefficient, and the other with the medium and high-frequency coefficients. The medium and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 51 publications
0
8
0
Order By: Relevance
“…The main process of the Huffman algorithm depends on reducing frequent letters and giving them priority codes or short paths in a Huffman tree. Khan et al [13] illustrate strategies for reducing text frequency (redundancy) through HC.…”
Section: Huffman Codingmentioning
confidence: 99%
See 4 more Smart Citations
“…The main process of the Huffman algorithm depends on reducing frequent letters and giving them priority codes or short paths in a Huffman tree. Khan et al [13] illustrate strategies for reducing text frequency (redundancy) through HC.…”
Section: Huffman Codingmentioning
confidence: 99%
“…The steganography technique has been applied in the field of medical diagnoses [8], military and defense [9], [10], multimedia biometric data security [11], and cloud computing [12]. On the next page, Figure 1 exposes the fundamental issues and difficulties concerning the performance of the existing steganography schemes related to the payload capacity, imperceptibility, and security [12], [13].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations