共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, a data hiding scheme by simple LSB substitution is proposed. By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stego-image can be greatly improved with low extra computational complexity. The worst case mean-square-error between the stego-image and the cover-image is derived. Experimental results show that the stego-image is visually indistinguishable from the original cover-image. The obtained results also show a significant improvement with respect to a previous work. 相似文献
2.
This paper introduces a novel lossless binary data compression scheme that is based on the error correcting Hamming codes, namely the HCDC scheme. In this scheme, the binary sequence to be compressed is divided into blocks of n bits length. To utilize the Hamming codes, the block is considered as a Hamming codeword that consists of p parity bits and d data bits (n=d+p). Then each block is tested to find if it is a valid or a non-valid Hamming codeword. For a valid block, only the d data bits preceded by 1 are written to the compressed file, while for a non-valid block all n bits preceded by 0 are written to the compressed file. These additional 1 and 0 bits are used to distinguish the valid and the non-valid blocks during the decompression process. An analytical formula is derived for computing the compression ratio as a function of block size, and fraction of valid data blocks in the sequence. The performance of the HCDC scheme is analyzed, and the results obtained are presented in tables and graphs. Finally, conclusions and recommendations for future works are pointed out. 相似文献
3.
Capacity and invisibility are two targets of the methods for information hiding. Because these two targets contradict each other, to hide large messages into the cover image and remain invisible is an interesting challenge. The simple least-significant-bit (LSB) substitution approach, which embeds secret messages into the LSB of pixels in cover images, usually embeds huge secret messages. After a large message is embedded, the quality of the stego-image will be significantly degraded. In this paper, a new LSB-based method, called the inverted pattern (IP) LSB substitution approach, is proposed to improve the quality of the stego-image. Each section of secret images is determined to be inverted or not inverted before it is embedded. The decisions are recorded by an IP for the purpose of extracting data and the pattern can be seen as a secret key or an extra data to be re-embedded. The experimental results show that our proposed method runs fast and has better results than that of previous works. 相似文献
4.
This paper presents a lossless robust data hiding scheme. The original cover image can be recovered without any distortion after the hidden data have been extracted if the stego-image remains intact, and on the other hand, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. The proposed scheme divides a cover image into a number of non-overlapping blocks and calculates the arithmetic difference of each block. Bits are embedded into blocks by shifting the arithmetic difference values. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, owing to the separation of bit-0-zone and bit-1-zone as well as the particularity of arithmetic difference, minor alteration applying to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0-zone and the bit-1-zone to overlap, and robustness is achieved. Experimental results show that, compared with previous works, the performance of the proposed scheme is significantly improved. 相似文献
5.
With the development of Internet communications, the security of message sending on the Internet has become very important. This article proposes a new adaptive data hiding method with a large data-embedding capacity for gray-scale images to raise the security of sending a message between sender and receiver in networks. At first, the image is divided into some blocks consisting of two consecutive pixels. If the values of both pixels are small, fewer secret bits will be embedded within the two pixels, otherwise, the difference value of two pixels is calculated, and according to the obtained difference value, the method will estimate the number of embedding bits into LSBs of two pixels. This number is adaptive and depends on the range to which the difference value belongs. A readjusting phase is presented to keep the difference of value pixels in the same range before and after embedding. Experimental results show that our method has increased the capacity of embedding bits in comparison with the several other methods. 相似文献
6.
Jun-Xiang Wang 《Information Sciences》2009,179(19):3332-139
Data hiding is an important technique for covert communication that embeds secret data into a cover image with minimal perceptible degradation. Lossless data hiding is a special type of data hiding technique that guarantees not only the secret data but the cover media can be reconstructed without any distortion. In this paper, a novel path optional lossless data hiding scheme based on the joint neighboring coding (JNC) of the vector quantization (VQ) index table is proposed. The proposed scheme generates a VQ index table based on the cover image first. Next, according to an initial key and secret data content, different adjacent indices may be chosen to perform joint neighboring coding for each index and hide secret data. Finally, an appropriate output codestream is generated based on the minimal length principle. Our main contributions lie in three aspects: (1) the method combines the novel path_based shift method with the traditional JNC method to improve the capacity and stego image quality simultaneously. (2) The secret data extraction and cover image recovering processes are separated and both can be publicized to users. (3) The method is path optional to meet various users’ requirements. To testify the superiority of the proposed method, we compare it with the side match VQ (SMVQ)-based and modified fast correlation VQ (MFCVQ)-based algorithms. According to the experimental results, the proposed scheme outperforms the SMVQ-based and MFCVQ-based algorithms in four aspects, i.e., hiding capacity, stego image quality, transmission efficiency and security level. 相似文献
7.
Zhe-Ming Lu Author Vitae Jun-Xiang Wang Author Vitae Bei-Bei Liu Author Vitae 《Journal of Systems and Software》2009,82(6):1016-1024
Copyright protection and information security have become serious problems due to the ever growing amount of digital data over the Internet. Reversible data hiding is a special type of data hiding technique that guarantees not only the secret data but also the cover media can be reconstructed without any distortion. Traditional schemes are based on spatial, discrete cosine transformation (DCT) and discrete wavelet transformation (DWT) domains. Recently, some vector quantization (VQ) based reversible data hiding schemes have been proposed. This paper proposes an improved reversible data hiding scheme based on VQ-index residual value coding. Experimental results show that our scheme outperforms two recently proposed schemes, namely side-match vector quantization (SMVQ)-based data hiding and modified fast correlation vector quantization (MFCVQ)-based data hiding. 相似文献
8.
Zhi-Hui Wang Author Vitae Kuo-Nan Chen Author Vitae 《Journal of Systems and Software》2010,83(11):2073-2082
Reversible image data hiding technology means the cover image can be totally recovered after the embedded secret data is extracted. In this paper, we propose a reversible image data hiding scheme based on vector quantization (VQ) compressed images. The secret bits are embedded into the VQ index table by modifying the index value according to the difference of neighboring indices. The data hiding capacity and the size of the final codestream (embedded result) are a trade-off, and it can be decided by users. In other words, the proposed scheme has flexible hiding capacity ability. To estimate the performance, the proposed scheme was compared with the scheme proposed by Wang and Lu (2009). The results of the comparison showed that our proposed scheme is superior to the scheme proposed by Wang and Lu in both data hiding capacity and bit rate. 相似文献
9.
10.
Shogo Ohyama Michiharu Niimi Kazumi Yamawaki Hideki Noda 《通讯和计算机》2009,6(2):35-39
We have proposed a reversible information hiding for binary images. In this paper, we present a Iossless data hiding method for JPEG2000 compressed data based on the reversible information hiding. In JPEG2000 compression, wavelet coefficients of an image are quantized, therefore, the least significant bit plane (LSB) can be extracted. The proposed method recovers the quantized wavelet coefficients of cover images from Stego images. To realize this, we embed not only secret data and the JBIG2 bit-stream of a part of the LSB plane but also the bit-depth of the quantized coefficients on some code-blocks. Experimental results demonstrate the feasibility of application of the proposed method to image alteration detection for JPEG2000 compressed data. 相似文献
11.
Chin-Feng Lee S. Wesley Changchien Wei-Tse Wang Jau-Ji Shen 《Information Systems Frontiers》2006,8(3):147-161
Data mining can dig out valuable information from databases to assist a business in approaching knowledge discovery and improving
business intelligence. Database stores large structured data. The amount of data increases due to the advanced database technology
and extensive use of information systems. Despite the price drop of storage devices, it is still important to develop efficient
techniques for database compression. This paper develops a database compression method by eliminating redundant data, which
often exist in transaction database. The proposed approach uses a data mining structure to extract association rules from
a database. Redundant data will then be replaced by means of compression rules. A heuristic method is designed to resolve
the conflicts of the compression rules. To prove its efficiency and effectiveness, the proposed approach is compared with
two other database compression methods.
Chin-Feng Lee is an associate professor with the Department of Information Management at Chaoyang University of Technology, Taiwan, R.O.C.
She received her M.S. and Ph.D. degrees in 1994 and 1998, respectively, from the Department of Computer Science and Information
Engineering at National Chung Cheng University. Her current research interests include database design, image processing and
data mining techniques.
S. Wesley Changchien is a professor with the Institute of Electronic Commerce at National Chung-Hsing University, Taiwan, R.O.C. He received a
BS degree in Mechanical Engineering (1989) and completed his MS (1993) and Ph.D. (1996) degrees in Industrial Engineering
at State University of New York at Buffalo, USA. His current research interests include electronic commerce, internet/database
marketing, knowledge management, data mining, and decision support systems.
Jau-Ji Shen received his Ph.D. degree in Information Engineering and Computer Science from National Taiwan University at Taipei, Taiwan
in 1988. From 1988 to 1994, he was the leader of the software group in Institute of Aeronautic, Chung-Sung Institute of Science
and Technology. He is currently an associate professor of information management department in the National Chung Hsing University
at Taichung. His research areas focus on the digital multimedia, database and information security. His current research areas
focus on data engineering, database techniques and information security.
Wei-Tse Wang received the B.A. (2001) and M.B.A (2003) degrees in Information Management at Chaoyang University of Technology, Taiwan,
R.O.C. His research interests include data mining, XML, and database compression. 相似文献
12.
通过对CCSDS(国际空间数据系统咨询委员会)建议的无损数据压缩标准的研究,以及对目前常用压缩算法的调查,它阐述了一种具有延迟小速度快抗差错能力强等特点的无损数据压缩算法,即Rice压缩算法,压缩率超过50%以上,而且对多种类型的数据都会达到满意的效果.它对算法中的零值块部分作了较为详细地阐述,因为经过预处理过的数据通常都很小,对于图像来说有相当多的零值.因此,对零值较多的情况下采取零值块压缩处理,效果很好,经过软件测试,结果符合CCSDS的要求标准. 相似文献
13.
一种适合于传感器网络的新型压缩算法研究 总被引:1,自引:0,他引:1
数据压缩可以高效节约网络能量,有效延长网络寿命。针对B-LZW算法的缺陷,提出了一种新型的可以直接应用于传感器网络的改进算法—MC-B-LZW;在设计中引入了miniCache,完善了算法的操作性,可使该算法嵌入到现有的各类传感节点中;测试B-LZW及其改进算法MC8,MC16,MC32和MC64的性能;通过比较压缩率和执行时间2个指标,得出结论:MC16算法性能最优,压缩率较B-LZW平均提高13.6%,执行时间较B-LZW几乎没有延长,是一种比较理想的压缩算法。 相似文献
14.
提出了新的二进制(位级)无损图像压缩方法——将错误纠正BCH码引入到图像压缩算法中;将图像的二进制分为大小为7的码字,这些块进入到BCH解码器,消除了校验位后,使得原来的块的大小减少到4位。实验结果表明,此压缩算法是有效的,并给出了一个很好的压缩比,而且不丢失数据。BCH码的使用在提高压缩比方面比单纯霍夫曼压缩的结果要好。 相似文献
15.
Progressive coding is a desirable feature for image database telebrowsing or image transmissions over low bandwidth channels. Furthermore, for some applications, exact image reconstruction is required. In this paper, we show that most of the lossless and progressive coders can be described by a common nonlinear subband decomposition scheme. This unifying framework provides useful guidelines for the analysis and improvement of the considered decomposition methods. Finally, we compare the respective performances of these methods in terms of Shannon entropy for several images and also evaluate their compression ability when combined with a hierarchical coding technique. 相似文献
16.
A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function 总被引:3,自引:0,他引:3
This study presents a simple method for high-hiding capacity. The basic concept uses a modulus operation. The proposed method has the following advantages: (1) the proposed method outperforms the simple LSB substitution method given the same range (0–m−1) of data digits in the embedded data; (2) the proposed method achieves good image vision quality without the need for post-processing; (3) the proposed method is almost as simple as the LSB method in both coding and decoding; (4) the smaller error advantage over the simple LSB substitution method can also be mathematically verified; (5) the error is smaller than (m−1)/2 for almost every pixel; (6) the proposed method has high-hiding capacity (for example, the proposed method can hide a 256×256 or 256×512 image in a 512×512 host image). 相似文献
17.
Information hiding methods are currently exploited by many researchers for various applications. Proposing an efficient and feasible information hiding method is valuable. This paper presents a new reversible information hiding method for vector quantization (VQ)-compressed grayscale images by using joint neighboring coding (JNC) technique. The proposed method embeds secret data by using the difference values between the current VQ-compressed index and left or upper neighboring indices. The experimental results show that the proposed method achieves the best visual quality of reconstructed images compared with the two related works. In addition, the proposed method obtains as high embedding capacity as Lin and Chang's method, followed by Yang et al.'s method. As for execution speed, Yang et al.'s method is fastest, followed by the proposed method, and then Lin and Chang's method. With respect to bit rate, the proposed method has a little higher bit rate in comparison with the two related works. 相似文献
18.
Practical data compression in wireless sensor networks: A survey 总被引:1,自引:0,他引:1
Tossaporn Srisooksai Kamol KeamarungsiPoonlap Lamsrichan Kiyomichi Araki 《Journal of Network and Computer Applications》2012,35(1):37-59
Power consumption is a critical problem affecting the lifetime of wireless sensor networks. A number of techniques have been proposed to solve this issue, such as energy-efficient medium access control or routing protocols. Among those proposed techniques, the data compression scheme is one that can be used to reduce transmitted data over wireless channels. This technique leads to a reduction in the required inter-node communication, which is the main power consumer in wireless sensor networks. In this article, a comprehensive review of existing data compression approaches in wireless sensor networks is provided. First, suitable sets of criteria are defined to classify existing techniques as well as to determine what practical data compression in wireless sensor networks should be. Next, the details of each classified compression category are described. Finally, their performance, open issues, limitations and suitable applications are analyzed and compared based on the criteria of practical data compression in wireless sensor networks. 相似文献
19.
20.
This paper presents a novel and efficient diagnostically lossless compression for 3D medical image sets. This compression scheme provides the 3D medical image sets with a progressive transmission capability. An automated filter-and-threshold based preprocessing technique is used to remove noise outside the diagnostic region. Then a wavelet decomposition feature vector based approach is applied to determine the reference image for the entire 3D medical image set. The selected reference image contains the most discernible anatomical structures within a relative large diagnostic region. It is progressively encoded by a lossless embedded zerotree wavelet method so the validity of an entire set can be determined early. This preprocessing technique is followed by an optimal predictor plus a 1st-level integer wavelet transform to de-correlate the 3D medical image set. Run-length and arithmetic coding are used to further remove coding redundancy. This diagnostically lossless compression method achieves an average compression of 2.1038, 2.4292, and 1.6826 bits per pixel for three types of 3D magnetic resonance image sets. The integrated progressive transmission capability degrades the compression performance by an average of 7.25%, 6.60%, and 4.49% for the above three types. Moreover, our compression without and with progressive transmission achieves better compression than the state-of-the-art. 相似文献