咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Data Hiding in AMBTC Images Us... 收藏

Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme

作     者:Yung-Yao Chen Yu-Chen Hu Ting-Kai Yang You-An Wang 

作者机构:Department Electronic and Computer EngineeringNational Taiwan U.Science and TechnologyTaipei106Taiwan Department Computer Science and Information ManagementProvidence UniversityTaichung433Taiwan Grad.Inst.Automation TechnologyNational Taipei University of TechnologyTaipei106Taiwan 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2022年第71卷第6期

页      面:5167-5182页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:This work is funded in part by the Ministry of Science and Technology Taiwan under grant MOST 108-2221-E-011-162-MY2 

主  题:Content protection technology security for image data absolute moment block truncation coding(AMBTC) direct binary search(DBS) 

摘      要:Nowadays since the Internet is ubiquitous,the frequency of data transfer through the public network is *** secure data in these transmitted data has emerged broad security issue,such as authentication and copyright *** the other hand,considering the transmission efficiency issue,image transmission usually involves image compression in Internet-based *** address both issues,this paper presents a data hiding scheme for the image compression method called absolute moment block truncation coding(AMBTC).First,an image is divided into nonoverlapping blocks through AMBTC compression,the blocks are classified four types,namely smooth,semi-smooth,semi-complex,and *** secret data are embedded into the smooth blocks by using a simple replacement *** proposed method respectively embeds nine bits(and five bits)of secret data into the bitmap of the semi-smooth blocks(and semicomplex blocks)through the exclusive-or(XOR)*** secret data are embedded into the complex blocks by using a hidden *** the embedding phase,the direct binary search(DBS)method is performed to improve the image qualitywithout damaging the secret *** experimental results demonstrate that the proposed method yields higher quality and hiding capacity than other reference methods.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分