Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.3390/app5041033
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Bit Data Hiding Scheme for Compressing Secret Messages

Abstract: The goal of data hiding techniques usually considers two issues, embedding capacity and image quality. Consequently, in order to achieve high embedding capacity and good image quality, a data hiding scheme combining run-length encoding (RLE) with multi-bit embedding is proposed in this paper. This work has three major contributions. First, the embedding capacity is increased 62% because the secret message is compressed before embedding into the cover image. Secondly, the proposed scheme keeps the multi-bit gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…PSNR and SSIM definitions are seen in Eq. (17) and Eq. (18), respectively, for two entire 8-bit images x and y with the same size N 1 × N 2 .…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…PSNR and SSIM definitions are seen in Eq. (17) and Eq. (18), respectively, for two entire 8-bit images x and y with the same size N 1 × N 2 .…”
Section: Resultsmentioning
confidence: 99%
“…We can also use the proposed approach for magnifying some multispectral images such as IKONOS and Quick-Bird images or images related to high-resolution optical remote sensing sensors [11][12][13]. In addition, there are many other applications for interpolation algorithms, e.g., data hiding [14][15][16][17][18], interpolation-based image denoising and demosaicking [19][20][21], SDTV to HDTV conversion (SD2HD) [2] in video processing, color processing [22], information fusion [8,9], and shadow detection [23] which can be assisted by ALMMSE algorithm. As we mentioned, the main focus of this research is towards interpolation-based image/video compression [10,24].…”
Section: Introductionmentioning
confidence: 99%
“…Usually, in LSB-based methods, the secret data bits are substituted in k-least significant bits of each pixel. In the literature, various types of LSB-based techniques have been proposed [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] targeted at high capacity, visual quality and security.…”
Section: Related Workmentioning
confidence: 99%
“…Wings to the Research help to resist modern steganalysis attacks [9]. The all above discussed does not meet robustness up to the level.…”
Section: Crimson Publishersmentioning
confidence: 99%