Reversible Data hiding techniques reduce transmission cost as secret data is embedded into a cover image without increasing its size in such a way that at the receiving end, both secret data and the cover image can be extracted and recovered, respectively, to their original form. To further reduce the transmission cost, the secret data can be embedded in the compression codes by some popular reversible data hiding schemes. One of the popular and important reversible data hiding method is high- performance data-hiding Lempel–Ziv–Welch (HPDH-LZW) scheme which hides the secret data in LZW codes. In this paper, the HPDH-LZW scheme is modified in order to increase its hiding capacity and compression ratio. First, the proposed work modifies the Move to Front (MTF) encoding technique to hide the secret data and also to increase the similarity among the element of the cover media. Then, LZW encoding technique is applied on the resultant cover data to obtain LZW codes, which are used to hide further secret data. Experimental results show that the proposed scheme has significantly increased the data hiding capacity and have good embedding and extraction speed in comparison to other state of the art schemes.
相似文献Due to the popularity of smartphones, laptops and wireless communication technologies, compressed images have become widely used for such applications, because a smaller storage space is needed. Protecting the security of information transmission over the Internet while reducing file size (also called the size of the final coding stream) has become a critical issue. Three related works have proposed using the reversible data hiding (RDH) method on AMBTC-compressed images to reduce the final stego-coding stream. However, these approaches still have room for improvement. To further optimize the performance of the related works, in this paper, we present an efficient dual prediction–based reversible data hiding and reduced code method for AMBTC-compressed images that uses three significant techniques: the dual prediction strategy (DP), the reversible standardized parameters (RSP) and the improved error division technique (IED). We can thus embed more secret data while effectively reducing the length of the final coding stream. Experimental results show that the proposed method has both the lowest true bitrate and the highest embedding efficiency in broader usage scenarios when compared to other related methods.
相似文献A new high-capacity information hiding method for embedding secret messages into MIDI files is proposed. The method can preserve the original musical performance of the cover MIDI file. The property of the variable-length quantity, which expresses the magnitude of the delta time before every event in a MIDI file, is utilized for secret bit embedding. The embedding is accomplished by padding the delta times with different numbers of leading constant bytes of 8016 to represent the secret bits. The method is both reversible and blind because the original cover MIDI file can be restored completely from the stego-MIDI file by extracting the embedded data out from the resulting stego-MIDI file without referencing the original cover MIDI file. A capability of hiding a large amount of secret information is achieved since the delta time is a basic parameter that appears before every event in the MIDI file. Good experimental results yielded by the proposed method as well as a comparison of the method with five existing performance-preserving methods from the viewpoints of stego-file quality, payload capacity, and data security show the superiority and feasibility of the proposed method.
相似文献In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information from various sources, which brings the importance of securing the data. Many researchers implemented techniques to hide secret information to maintain the integrity and privacy of data. In order to protect confidential data, histogram-based reversible data hiding with other cryptographic algorithms are widely used. Therefore, in the proposed work, a robust method for securing digital video is suggested. We implemented histogram bit shifting based reversible data hiding by embedding the encrypted watermark in featured video frames. Histogram bit shifting is used for hiding highly secured watermarks so that security for the watermark symbol is also being achieved. The novelty of the work is that only based on the quality threshold a few unique frames are selected, which holds the encrypted watermark symbol. The optimal value for this threshold is obtained using the Firefly Algorithm. The proposed method is capable of hiding high-capacity data in the video signal. The experimental result shows the higher capacity and video quality compared to other reversible data hiding techniques. The recovered watermark provides better identity identification against various attacks. A high value of PSNR and a low value of BER and MSE is reported from the results.
相似文献VoIP is much in use these days as many applications over phone, tablet, and computers are available. The data in VoIP can be collected for further analysis or it can be intercepted. VoIP privacy and security is a major concern these days. This paper discusses an implementation of hiding a sound file in a digital image. This sound can be voice, VoIP data or a song. In this approach, an MP3 file was used with JPEG image for implementation. The rightmost k-LSB of pixels was utilized to embed MP3 bits into a pixel. The pixels are so chosen that the distortion in the image would be minimized due to embedding. This is implemented in such a way that makes it difficult to conclude about the existence of the hidden data inside the image. A metaheuristic technique Cuckoo Search was used to find most suitable solutions for minimization. The results are also compared with existing techniques of steganography.
相似文献Homomorphic public key technology effectively protects privacy, allowing algebraic operations directly in the cipher-text. Therefore, it has been extensively studied in the field of cloud computing. In this study, an encrypted image-based data hiding (EIRDH) algorithm with homomorphic public key cryptosystem is presented. The key contributions are these two sides. (1) An improved fast Paillier homomorphic public key cryptosystem system is proposed for encrypting image. It improves the efficiency of encryption operations greatly. (2) A difference expansion (DE) scheme is developed by exploiting the cover pixel to construct a new pair of pixels for data hiding. Compared with other methods, the experimental results show that, the proposed method has larger payload and higher stego-image quality. It accomplishes the image quality’s increasing instead of general decreasing.
相似文献In this paper, a framework to hide privacy in video is proposed based on data hiding principals. A novel data hiding technique is proposed and implemented to hide the original frame into the in-painted one. The proposed hiding technique is carried out in the discrete wavelet transform domain of the cover video. The proposed technique is embedding video into video. Furthermore, the proposed data hiding method can blindly reconstruct the original frame from the fake one. Experimental results showed that the proposed method can successfully hide the complete frames of the original video into their corresponding in-painted ones that are as large as themselves. Simple visual inspection of the results showed that the quality of the stego-frames maintain very high (above 45 dB) while providing an acceptable visual quality for the retrieved original frames.
相似文献To better protect the security of users’ private data in the cloud environment, the technology for separable reversible data hiding in encrypted images has been attracting increasing attention from researchers. In this paper, we propose a separable reversible data hiding scheme in encrypted images based on the flexible preservation of differences. This scheme has three parts: 1) For the content owner, the original image is divided into non-overlapping blocks, for which block-mean is computed. Then the differences between the values of every pixel and the block-mean are obtained and an initial label map is generated. Because most of the differences tend to concentrate around 0, we use two bits to dynamically record the range of the differences to vacate space for hiding. Further, introducing the block-mean differences also serves to vacate more space, for which the label map is amended accordingly. Finally, the image with free space is encrypted into the encrypted image using an encryption key. 2) For the data hider, the secret bits are embedded into the encrypted image by directly replacing the spare bits without obtaining any information of the original image. 3) For the receiver, he/she can achieve the desired information according to the key in his/her possession. Experimental results show that our proposed scheme is able to achieve an average embedding capacity as large as 1.785 bpp and 1.709 bpp when block size is set to 2?×?2 and 2?×?4, respectively. Comparison with those of previous schemes, the proposed scheme has excellent embedding capacity, especially for smoother images.
相似文献Reversible watermarking is a technique permitting lossless data hiding. In such a method, the lossless recovering of both watermark and host image is essential. For some applications, such as medical imaging and military systems, it is so vital not only to recover the host image exactly but also to increase security. To obtain these goals, a new reversible watermarking scheme is presented. Since embedding in a transform domain improves security, the proposed method uses Reversible Walsh-Hadamard Transform (RWHT) to commute the host image. Afterward, Singular Value Decomposition (SVD) technique is performed on the transformed image for watermark embedding. For a full recovery, additional information is encoded using Quick Response (QR) code, which is embedded by a prediction-based method. To evaluate the performance of the proposed method, a set of comparative experiments is done. The obtained results confirm the effectiveness of the proposed method in both visual quality and capacity.
相似文献