Learn More
—Many researchers have studied reversible data hiding techniques in recent years and most have proposed reversible data hiding schemes that guarantee only that the original cover image can be reconstructed completely. Once the secret data are embedded in the compression domain and the receiver wants to store the cover image in a compression mode to save(More)
Steganalysis detects the possible existence of secret messages embedding in a suspicious media. In general, secret data hiding techniques take the advantage of the weakness of human senses to embed secret messages into a common media and transmit them to the receivers. Because the change of the cover media is insensible to human visual systems, the cover(More)
A novel steganographic method by exploiting modification direction in digital images was proposed by Zhang et al, in which each secret digit in a (2n+1)- ary notational system is carried by n cover pixels, and only one cover pixel increases or decreases by 1 at most. In other words, the (2n+1) possible values of a secret digit correspond to (2n+1) possible(More)
Lossless data hiding enables the embedding of messages in a host image without any loss of content. In this paper, we present a lossless data hiding technique based on histogram modification for image authentication that is lossless in the sense that if the marked image is deemed authentic, the embedding distortion can be completely removed from the marked(More)
To address copyright protection and content authentication, researchers have proposed various digital watermarking methods. In this paper, an improved, multipurpose method is proposed where the authentication watermark and the robust watermark are embedded in the wavelet transform domain. Through a series of experiment, supportive evidence is provided to(More)
Indices are modified so that the secret data can be hidden into the index-based cover image, and thereby the problem of the stego-image quality degradation occurs. If the stego-image quality degradation problem can be solved enabling the receiver to reconstruct the original indices after extracting the hidden secret data from the index-based stego-image,(More)