Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wu, DC | en_US |
dc.contributor.author | Tsai, WH | en_US |
dc.date.accessioned | 2014-12-08T15:47:25Z | - |
dc.date.available | 2014-12-08T15:47:25Z | - |
dc.date.issued | 1998-11-01 | en_US |
dc.identifier.issn | 0098-3063 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/30.735844 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/31778 | - |
dc.description.abstract | A novel and easy method to embed any form of secret messages into a cover image with controlled distortion is proposed. Any lossy image compressor may be applied first to a cover image to produce a lossily-processed result as the basis for embedding data in the cover image. The stego-image is produced by embedding data in each pixel of a cover image by changing its gray value without excessing the range of the gray value difference of the corresponding pixels of the cover image and its lossily-processed one. The quantity of distortion that is caused by embedding data is never in excess of that is caused by the lossy compressor. A multiple-based number system is proposed to convert the information in the secret bit stream into values to be embedded in the choosing pixels of the cover image. Pseudo-random mechanisms may be used to achieve cryptography. It is found from experiments that the values of the peaks of the signal-to-noise ratio of the stego-images are larger than those yielded by the chosen compressor, which means that the distortion in the embedding result is more imperceptible than that in the compressed one. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | data hiding | en_US |
dc.subject | lossy compression | en_US |
dc.subject | stego-image | en_US |
dc.subject | security | en_US |
dc.subject | multiple-based number system | en_US |
dc.subject | multiple-based number conversion | en_US |
dc.subject | tolerable error range | en_US |
dc.title | Data hiding in images via multiple-based number conversion and lossy compression | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/30.735844 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON CONSUMER ELECTRONICS | en_US |
dc.citation.volume | 44 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 1406 | en_US |
dc.citation.epage | 1412 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.