2020
DOI: 10.1016/j.jksuci.2018.09.016
|View full text |Cite
|
Sign up to set email alerts
|

Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Furthermore, the GA finds the best path to follow during the dissimulation; it allows hiding each fragment of data in the most suited interpolated pixel in order to achieve a minimal error, thus a better imperceptibility. This explains how the GA could ameliorate remarkably the PSNR values of our precedent work [12]. The values of IF, NCC and Q-index in table 2 obtained by the proposed approaches are closer to their optimal value 1 than the three other methods.…”
Section: Evaluation Of the Proposed Embedding Algorithmmentioning
confidence: 56%
See 1 more Smart Citation
“…Furthermore, the GA finds the best path to follow during the dissimulation; it allows hiding each fragment of data in the most suited interpolated pixel in order to achieve a minimal error, thus a better imperceptibility. This explains how the GA could ameliorate remarkably the PSNR values of our precedent work [12]. The values of IF, NCC and Q-index in table 2 obtained by the proposed approaches are closer to their optimal value 1 than the three other methods.…”
Section: Evaluation Of the Proposed Embedding Algorithmmentioning
confidence: 56%
“…We accomplish a comparison to the NMI, INP and CRS methods, the earliest interpolation methods used in steganography. Tables 1 and 2 show the values of the capacity and the metrics of the imperceptibility by the NMI [1], INP [2], CRS [11],IBLBS [12] and the proposed GA. We used the images Lena(a), Mandrill(b), Airplane(c), Peppers(d), Lake(e) and Tiffany(f), they have different level of texture which is a crucial parameter in steganographybased on interpolation. Results in tables 1 and 2 indicate that the proposed approaches provide the larger capacity; and at the same time, they have the highest imperceptibility.…”
Section: Evaluation Of the Proposed Embedding Algorithmmentioning
confidence: 99%
“…As shown in Figures 6 and 7, there are some anomalies of simulation results in the SPOT-7 and Pleiades-1A test images. In the SPOT-7 test image, when a block size of 22  22 occurs, an extracted-bit error of 1 bit occurs in the block position y (3,12). Based on the fluctuation calculation results, at the position of block y (3,12), the proposed fluctuation function extracts the wrong information bit, "0," while only the Zhang fluctuation function correctly extracts the embedded information bit into the image, which is bit "1."…”
Section: A Performance Analysis Of Proposed Hybrid Rdh System With Mmentioning
confidence: 99%
“…In the SPOT-7 test image, when a block size of 22  22 occurs, an extracted-bit error of 1 bit occurs in the block position y (3,12). Based on the fluctuation calculation results, at the position of block y (3,12), the proposed fluctuation function extracts the wrong information bit, "0," while only the Zhang fluctuation function correctly extracts the embedded information bit into the image, which is bit "1." In the Pleiades-1A test image, when a block size is 21  21, there is an extracted-bit error of 1 bit in the block position y (4,8).…”
Section: A Performance Analysis Of Proposed Hybrid Rdh System With Mmentioning
confidence: 99%
See 1 more Smart Citation