2008
DOI: 10.1016/j.patcog.2008.03.021
|View full text |Cite
|
Sign up to set email alerts
|

A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…The Vector Quantization (VQ) technique [22] was first developed for image processing to compress the images [13,14]. Codebook is a 2D array which is initialized randomly by the vectors of some of the training images.…”
Section: Vector Quantizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The Vector Quantization (VQ) technique [22] was first developed for image processing to compress the images [13,14]. Codebook is a 2D array which is initialized randomly by the vectors of some of the training images.…”
Section: Vector Quantizationmentioning
confidence: 99%
“…These patterns are the major and common curves on the faces of different people. At second step, it uses Vector Quantization (VQ) [11,13,14,15,16,19] on the classified vectors of each pattern. The selection of the predefined patters significantly affects the performance of this approach.…”
Section: Introductionmentioning
confidence: 99%
“…Since d' i~1 91{210 j j19 is located in the middle level, the readjustment procedure is then executed. According to the requirement that d' i and d i need to be in the same level and equation (5), p' i~1 91 and p' iz1~2 10{8~202 can be obtained after readjusting. It can be seen that d' i~1 91{202 j j11 is situated at the lower level, which is the same as d i .…”
Section: The Embedding and Extracting Proceduresmentioning
confidence: 99%
“…Substitution-based schemes directly replace the k least significant bits of the cover image with the secrets to complete the embedding action; 4,8-10 modulus-based schemes use the modulus operations to hide k bit secrets in the LSB planes of each pixel. 5,[11][12][13] Both concepts are relatively simple. Unfortunately, these LSB-based methods may show perceptible distortions to the smooth areas of the stego-image, due to the fact that all pixels hide the same amount of secrets.…”
Section: Introductionmentioning
confidence: 99%
“…Even though only the intended receiver who has the secret key can decrypt the sensitive information, the meaningless form of the encrypted codes may easily attract the suspicion and incur attacks on it. To overcome the drawback of the Cryptographic methods, another technology named steganography [13,7,6] has been proposed to distract opponents' attention. The steganography schemes are aimed at embedding secret information as much as possible, while retaining the high quality of the cover image.…”
Section: Introductionmentioning
confidence: 99%