The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2018
DOI: 10.1016/j.jvcir.2018.02.005
|View full text |Cite
|
Sign up to set email alerts
|

Lossless data hiding in JPEG bitstream using alternative embedding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 26 publications
0
21
0
Order By: Relevance
“…Experimental results are shown in Table 8, [insert Table 8] In Table 8, compared with papers [30] [33], this approach outperforms them in EC. In [30], an alternative data hiding algorithm was proposed that in each category the maximum hiding capacity could be obtained. In category C i with i bits, mapping efficiency was improved greatly that an used VLC was mapped to a specific unused VLC.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Experimental results are shown in Table 8, [insert Table 8] In Table 8, compared with papers [30] [33], this approach outperforms them in EC. In [30], an alternative data hiding algorithm was proposed that in each category the maximum hiding capacity could be obtained. In category C i with i bits, mapping efficiency was improved greatly that an used VLC was mapped to a specific unused VLC.…”
Section: Resultsmentioning
confidence: 99%
“…Qian and Zhang [28] proposed the mapping algorithm to relate used VLCs to unused VLCs, and modified the Huffman Table in JPEG header. Hu [29] improved the algorithm of Qian and Zhang [28] to calculate occurrence frequencies in used VLCs and map VLCs according to frequencies, thus further improved hiding capacity. Qiu [30] constructed an optimal mapping between used and unused VLCs in each category to achieve a high embedding rate, while it was quite complex. Chang [33] proposed a scheme that in framework of reserving-room-before-encryption by Ma [34], a part of JPEG bitstreams was compressed and encrypted to leave spare space to embed secret data.…”
Section: Introductionmentioning
confidence: 99%
“…For the advantages of low complexity and high efficiency, Joint Photographic Experts Group (JPEG) is used as a major image compression technique [15] [16]. Four kinds of RDH methods are established independently in JPEG images, VLC mapping [17][18][19][20], quantified DCT coefficients modification [21][22][23][24][25] and concealment in encrypted JPEG bitstreams [26] [27].…”
Section: Introductionmentioning
confidence: 99%
“…In the improved method, mapping is sorted in occurrence frequencies, so in a category the most used VLC is mapped to several unused VLCs, while others are mapped to only one unused VLC. Qiu et al [20] proposed a RDH scheme in JPEG images, and established an alternative embedding algorithm using code mapping and reordering. In such method, different combination of unused VLCs and used VLCs remapping will increase hiding capacity, but marked images can be recovered only after secret data is fully extracted.…”
Section: Introductionmentioning
confidence: 99%
“…The cryptography deals with techniques that change the original secret message into another form of data to make it incomprehensible to unauthorized users [12,13]. The steganography hides the data of a secret message into cover media to prevent drawing any suspicion to the secret data [14,15]. In the literature, there are many researches in the cryptography field.…”
Section: Introductionmentioning
confidence: 99%