Image Hiding by Square Fully Exploiting Modification Directions

@inproceedings{Kuo2013ImageHB,
  title={Image Hiding by Square Fully Exploiting Modification Directions},
  author={Wen-Chung Kuo},
  year={2013}
}
In order to quick embedding secret and improve the data hiding capacity from 1 bpp to 4.5 bpp, a new data hiding scheme by square fully exploiting modification directions method will be proposed in this paper. According to experiment results, we can prove that proposed scheme not only to enhance the embedding rate and good embedding capacity but also to keep stego-image quality. 

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-8 of 8 extracted citations

Steganography based on the hadamard transform and modification of the DEMD

2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM) • 2017
View 9 Excerpts
Highly Influenced

A new watermark algorithm resistance to geometric transformations

2015 23nd Signal Processing and Communications Applications Conference (SIU) • 2015
View 1 Excerpt

On Extreme Learning Machine for Watermarking of an Images in Discrete Wavelet Transform Domain

2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing • 2014
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Efficient Steganographic Embedding by Exploiting Modification Direction

IEEE Communications Letters • 2006
View 11 Excerpts
Highly Influenced

A data hiding scheme based on square formula fully exploiting modification directions

W. C. Kuo
Smart Innovation, Systems and Technologies, vol. 21, springer, pp.131-139 • 2013
View 4 Excerpts
Highly Influenced

A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction

Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) • 2007
View 6 Excerpts
Highly Influenced

New images watermarking scheme based on singular value decomposition

A. Benhocine, L. Laouamer, L. Nana, A. C. Pascu
Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 9-18 • 2013
View 3 Excerpts

Data hiding based on generalised exploiting modification direction method

W. C. Kuo, C. C. Wang
Journal of Imaging Science Journal, available at http://www.ingentaconnect.com/content/ maney/isj/pre-prints/1743131X12Y.0000000011 • 2012
View 2 Excerpts

LSB matching revisited

IEEE Signal Processing Letters • 2006
View 1 Excerpt

Image steganographic scheme based on pixel-value differencing and LSB replacement methods

H. C. Wu, N. I. Wu, C. S. Tsai, M. S. Hwang
IEE Proceedings. Vision, Image, and Signal Processing, vol. 152, no. 5, pp. 611-615 • 2005

Similar Papers

Loading similar papers…