Learn More
To enhance the hiding capacity of Chang et al.'s reversible DCT-based data hiding scheme, in this paper we propose another method called a layer-1 data embedding strategy. Our proposed layer-1 strategy considers some areas not used by Chang et al.'s scheme, which we call layer-2 data embedding. To achieve our objective, we applied Tian's pixel expansion(More)
Research in the field of watermarking is flourishing providing techniques to protect copyright of intellectual property. Among the various methods that exploit the characteristics of the Human Visual System (HVS) for more secure and effective data hiding, wavelet-based watermarking techniques showed to be immune to attacks; adding the quality of robustness(More)
In 2008 Lin et al. proposed a reversible steganographic method with a high payload for JPEG images. Because modifying the quantized DCT coefficients may lead to serious image distortion, Lin et al. embedded the secrets into the middle frequency of the quantized DCT coefficients. Moreover, they limited the number of nonzero values of the quantized DCT(More)
In this paper, we combine absolute moment block truncation coding (AMBTC) and Shamir's secret sharing scheme to propose a verifiable secret sharing scheme. Shares construction is based on the compression codes generated by AMBTC; therefore, the shadow size is about one third of the original secret image. During the shares construction phase, the compression(More)
  • 1