Learn More
—Many researchers have studied reversible data hiding techniques in recent years and most have proposed reversible data hiding schemes that guarantee only that the original cover image can be reconstructed completely. Once the secret data are embedded in the compression domain and the receiver wants to store the cover image in a compression mode to save(More)
Steganalysis detects the possible existence of secret messages embedding in a suspicious media. In general, secret data hiding techniques take the advantage of the weakness of human senses to embed secret messages into a common media and transmit them to the receivers. Because the change of the cover media is insensible to human visual systems, the cover(More)
Data hiding encompasses a wide range of applications for embedding messages in content. However, hiding data inevitably destroys the host image, even though the distortion is imperceptible. To enhance the hiding capacity and maintain the quality of the host image after embedding hidden data, in this paper, we present a high payload reversible data hiding(More)
A novel steganographic method by exploiting modification direction in digital images was proposed by Zhang et al, in which each secret digit in a (2n+1)- ary notational system is carried by n cover pixels, and only one cover pixel increases or decreases by 1 at most. In other words, the (2n+1) possible values of a secret digit correspond to (2n+1) possible(More)
Lossless data hiding enables the embedding of messages in a host image without any loss of content. In this paper, we present a lossless data hiding technique based on histogram modification for image authentication that is lossless in the sense that if the marked image is deemed authentic, the embedding distortion can be completely removed from the marked(More)
To address copyright protection and content authentication, researchers have proposed various digital watermarking methods. In this paper, an improved, multipurpose method is proposed where the authentication watermark and the robust watermark are embedded in the wavelet transform domain. Through a series of experiment, supportive evidence is provided to(More)
In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we(More)