TITLE

USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION

AUTHOR(S)
Rudder, Andrew; Goodridge, Wayne; Mohammed, Shareeda
PUB. DATE
March 2013
SOURCE
International Journal of Network Security & Its Applications;Mar2013, Vol. 5 Issue 2, p65
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.
ACCESSION #
86938542

 

Related Articles

  • Compression: Making thin pipes fat.  // Telephony;3/14/94, Vol. 226 Issue 11, p18 

    Discusses the advances in digital compression in video delivery. Asymmetrical digital subscriber line (ADSL) and high-bit-rate digital subscriber line (HDSL); Channel compression; Motion Pictures Experts Groups (MPEG); Quadrature amplitude modulation (QAM) and vestigial sideband (VSB).

  • A New Evolutionary Algorithm for Cluster Analysis. Firouzi, B. Bahmani; Niknam, T.; Nayeripour, M. // Proceedings of World Academy of Science: Engineering & Technolog;Dec2008, Vol. 48, p594 

    Clustering is a very well known technique in data mining. One of the most widely used clustering techniques is the k-means algorithm. Solutions obtained from this technique depend on the initialization of cluster centers and the final solution converges to local minima. In order to overcome...

  • Research on improved genetic algorithm. Xiaoyu Wang; Yonghui Yang; Shuo Li; Chuang Gao // Applied Mechanics & Materials;2014, Issue 630-642, p1760 

    An improved genetic algorithm for the function optimization of multi-core embedded system is proposed. A number of chromosomes that distribute uniformly in space are generated by the algorithm randomly. Each chromosome is randomly coded and a new one will be generated by mutual calculation....

  • FIFO Controller Design Technique in JPEG 2000 Encoder Using Weibull Distribution. Srivastava, Sumit; Sharma, Nameeta // Proceedings of World Academy of Science: Engineering & Technolog;Nov2008, Vol. 47, p465 

    In this paper we have introduced the concept and design architecture for FIFO Controller, which is a module of JPEG2000 Encoder. JPEG2000 stands for Joint Photographic Experts Group 2000 which is an international standard for still image compression application in lossy or lossless environment....

  • A digital picture is worth... Webb, Warren // EDN;09/01/2000, Vol. 45 Issue 18, p71 

    Discusses how the digital imaging technique works. Advantages of using digital imaging for embedded systems; Transformation of visual information into a format the a computer program can process. INSET: FOR MORE INFORMATION....

  • Ant colony metaphor in a new clustering algorithm. Boryczka, Urszula // Control & Cybernetics;2010, Vol. 39 Issue 2, p343 

    Among the many bio-inspired techniques, ant clustering algorithms have received special attention, especially because they still require much investigation to improve performance, stability and other key features that would make such algorithms mature tools for data mining. Clustering with...

  • Efficient data hiding scheme using lossless data compression and image steganography. Jain, Rahul; Kumar, Naresh // International Journal of Engineering Science & Technology;Aug2012, Vol. 4 Issue 8, p3908 

    Steganography is an art of hidden communication in which secret message is embedded into a cover image. It has many applications like Online transactions, military communication etc. In this paper, we have proposed a data hiding scheme using image steganography and compression. This scheme can...

  • Embedded-system design: Exploring trade-offs. Levy, Markus // EDN;05/25/2000, Vol. 45 Issue 11, p58 

    Evaluates the performance of several embedded-computer evaluation boards in the United States as of May 25, 2000. Integrated Device Technology's IDT79 board; Use of the `Electronic Design News' periodical's Embedded Microprocessor Benchmark Consortium benchmarks in the tests; Examination of...

  • A Simple Mechanism for Type Security Across Compilation Units. Scott, Michael L.; Finkel, Raphael A. // IEEE Transactions on Software Engineering;Aug88, Vol. 14 Issue 8, p1238 

    A simple technique detects structural type clashes across compilation units with an arbitrarily high degree of confidence. The type of each external object is described in canonical form. A hash function compresses the description into a short code. lithe code is embedded in a symbol-table name,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics