2014
DOI: 10.1515/jisys-2014-0007
|View full text |Cite
|
Sign up to set email alerts
|

Data Hiding Based on Improved Exploiting Modification Direction Method and Huffman Coding

Abstract: The rapid growth of covert activities via communications network brought about an increasing need to provide an efficient method for data hiding to protect secret information from malicious attacks. One of the options is to combine two approaches, namely steganography and compression. However, its performance heavily relies on three major factors, payload, imperceptibility, and robustness, which are always in trade-offs. Thus, this study aims to hide a large amount of secret message inside a grayscale host ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
8

Relationship

7
1

Authors

Journals

citations
Cited by 34 publications
(25 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…It is always hard to compare results in the state of art due to a different setup and experimented data sets (Ahmad, Sulong, Rehman, & Saba, ; Sharif, Mehmood, Mahmood, Javid, & Rehman, ; Yousaf et al, ; Katuka, Mohamad, Saba, el‐Affendi, & Mohamed, ; Meethongjan, Dzulkifli, Rehman, Altameem, & Saba, ; Mundher, Muhamad, Rehman, Saba, & Kausar, ; Saba, Almazyad, & Rehman, ; Saba, ). However, results are compared with the latest reported techniques using the same data set.…”
Section: Discussionmentioning
confidence: 99%
“…It is always hard to compare results in the state of art due to a different setup and experimented data sets (Ahmad, Sulong, Rehman, & Saba, ; Sharif, Mehmood, Mahmood, Javid, & Rehman, ; Yousaf et al, ; Katuka, Mohamad, Saba, el‐Affendi, & Mohamed, ; Meethongjan, Dzulkifli, Rehman, Altameem, & Saba, ; Mundher, Muhamad, Rehman, Saba, & Kausar, ; Saba, Almazyad, & Rehman, ; Saba, ). However, results are compared with the latest reported techniques using the same data set.…”
Section: Discussionmentioning
confidence: 99%
“…To improve vessels breadth, filter's width is varied. Laplace kernel, multiple applications of 2D Gaussian smoothing and ridge detection are among other filter‐based approaches (Ahmad, Sulong, Rehman, Alkawaz, & Saba, ).…”
Section: Proposed Methodologymentioning
confidence: 99%
“…This period is the time when excited nuclei come back from high energy to the low energy. T1 and T2 are biological parameters that control the relaxation factor [27][28][29]. These parameters define the ability to separate different…”
Section: Figurementioning
confidence: 99%