A high payload data embedding scheme using dual stego-images with reversibility
Lee and Huang proposed a dual-image reversible data hiding method to protect the confidential data in 2011. The image quality obtained by the method is good because each pixel in the cover image is modified by only adding or subtracting one to generate the stego image. However, in their method, each...
Saved in:
Published in | 2013 9th International Conference on Information, Communications and Signal Processing (ICICS) pp. 1 - 5 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2013
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/ICICS.2013.6782790 |
Cover
Abstract | Lee and Huang proposed a dual-image reversible data hiding method to protect the confidential data in 2011. The image quality obtained by the method is good because each pixel in the cover image is modified by only adding or subtracting one to generate the stego image. However, in their method, each set of four cover pixels can only embed five confidential bits, thereby restricting the embedding rate. To overcome the above drawback, this work develops a reversible data hiding method based on the magic matrix. By using the proposed method, each set of two cover pixels can be used to embed at least three confidential bits. In the embedding procedure, the maximum modification level of the cover pixel is four. These features imply that the proposed method can embed a large amount of confidential data; in addition, our stego image can achieve good visual quality. Experimental results indicate that the embedding rate and the image quality of the proposed method are 1.55 bpp and 39.89 dB, which exceed those of recently presented methods. |
---|---|
AbstractList | Lee and Huang proposed a dual-image reversible data hiding method to protect the confidential data in 2011. The image quality obtained by the method is good because each pixel in the cover image is modified by only adding or subtracting one to generate the stego image. However, in their method, each set of four cover pixels can only embed five confidential bits, thereby restricting the embedding rate. To overcome the above drawback, this work develops a reversible data hiding method based on the magic matrix. By using the proposed method, each set of two cover pixels can be used to embed at least three confidential bits. In the embedding procedure, the maximum modification level of the cover pixel is four. These features imply that the proposed method can embed a large amount of confidential data; in addition, our stego image can achieve good visual quality. Experimental results indicate that the embedding rate and the image quality of the proposed method are 1.55 bpp and 39.89 dB, which exceed those of recently presented methods. |
Author | Yung-Ming Hsu Tzu-Chuen Lu Ying-Hsuan Huang Gwoboa Horng Chin-Chen Chang |
Author_xml | – sequence: 1 surname: Chin-Chen Chang fullname: Chin-Chen Chang email: alan3c@gmail.com organization: Dept. of Inf. Eng. & Comput. Sci., Feng Chia Univ., Taichung, Taiwan – sequence: 2 surname: Tzu-Chuen Lu fullname: Tzu-Chuen Lu email: tclu@cyut.edu.tw organization: Dept. of Inf. Manage., Chaoyang Univ. of Technol., Taichung, Taiwan – sequence: 3 surname: Gwoboa Horng fullname: Gwoboa Horng email: gbhorng@cs.nchu.edu.tw organization: Dept. of Comput. Sci. & Eng., Nat. Chung Hsing Univ., Taichung, Taiwan – sequence: 4 surname: Ying-Hsuan Huang fullname: Ying-Hsuan Huang email: phd9807@cs.nchu.edu.tw organization: Dept. of Comput. Sci. & Eng., Nat. Chung Hsing Univ., Taichung, Taiwan – sequence: 5 surname: Yung-Ming Hsu fullname: Yung-Ming Hsu email: persevere1104@gmail.com organization: Dept. of Inf. Manage., Chaoyang Univ. of Technol., Taichung, Taiwan |
BookMark | eNotj8tOwzAURI0EErT0B2DjH0iwfZ04XlYRj0qVugDWlR1fJ0Z5VHEKyt8TRFczszijmRW57oceCXngLOWc6adduSvfU8E4pLkqhNLsiqy4VFozCQC3ZBPjF2OMKyW4YHfksKVNqBt6MnM7GEedmQzFzqJzoa9prBrskJ7jX3Bn09I4YT0koTM1RvoTpoaO-I1jDDa0YZrvyY03bcTNRdfk8-X5o3xL9ofXXbndJ4GrbEq8815abQ0KydRiPMutkAqMhyq3oHNfVKIyyjNRQLYw3lr0yiFUErIM1uTxvzcg4vE0LoPG-Xj5DL9fR1Au |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICICS.2013.6782790 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1479904333 1479904341 9781479904341 9781479904334 |
EndPage | 5 |
ExternalDocumentID | 6782790 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-fdff4b9bae2407b9bf06b2473af3c6b396f8c2ca7f02835175fbbef7de3c43553 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 04:25:50 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-fdff4b9bae2407b9bf06b2473af3c6b396f8c2ca7f02835175fbbef7de3c43553 |
PageCount | 5 |
ParticipantIDs | ieee_primary_6782790 |
PublicationCentury | 2000 |
PublicationDate | 2013-Dec. |
PublicationDateYYYYMMDD | 2013-12-01 |
PublicationDate_xml | – month: 12 year: 2013 text: 2013-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2013 9th International Conference on Information, Communications and Signal Processing (ICICS) |
PublicationTitleAbbrev | ICICS |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001772120 |
Score | 1.6388148 |
Snippet | Lee and Huang proposed a dual-image reversible data hiding method to protect the confidential data in 2011. The image quality obtained by the method is good... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Computer science Data mining dual-image reversible data hiding method Educational institutions hiding capacity Histograms Image quality magic matrix Nickel PSNR |
Title | A high payload data embedding scheme using dual stego-images with reversibility |
URI | https://ieeexplore.ieee.org/document/6782790 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La8JAEF6sp55sq6Vv9tBjE5PdZGOORSpa6ANawZtkd2dFig80Htpf35kkKi099LYEhoSdZOeR7_uGsdtEaBq47TyZucSLIFakARl7IowgylJnQlsAZJ9Vfxg9juJRjd3tuDAAUIDPwKdl8S_fLsyGWmVtPFhFkmKBfoCvWcnV2vdTME0MRbDlxQRpe9AddN8IvCX9yvDHBJUigPQa7Gl76xI38uFvcu2br1-qjP99tiPW2lP1-OsuCB2zGsxPWGM7q4FXn26TvdxzUibmS6rQM8sJGcphpsGSHccaF2bACQU_4UTP4uj9ycKbzvC8WXPq1nISe1pVaNrPFhv2Ht67fa8apuBNMUPIPWedi3SqM6AaDhcuUFpECfpIGqVlqlzHCJMljjKOGG2c1uASC9JgShXLU1afL-ZwxriKbWCckcpmIspUoDsyxEJMSmEwubHBOWvS_oyXpV7GuNqai78vX7JD8lEJEbli9Xy1gWsM9Lm-KTz8DVCfqWs |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NTwIxEG0IHvSECsZve_DoLrttt8seDZGAApoICTeybaeEGD6CcNBfb2d3wWg8eGs2meymk3bezL55Q8htzBQO3LYeT23sCYgkakBGHgsFiDSxOjQZQbYv20PxOIpGJXK364UBgIx8Bj4us3_5ZqE3WCqru4uVxYlL0Pdc3BdR3q31XVFxQDFkwbYzJkjqnWan-Yr0Le4Xpj9mqGQhpFUhve3Lc-bIm79ZK19__tJl_O_XHZLad7MefdmFoSNSgvkxqWynNdDi8FbJ8z1FbWK6xBw9NRS5oRRmCgzaUZflwgwo8uAnFBu0qPP_ZOFNZ-7GeadYr6Uo97Qq-LQfNTJsPQyaba8Yp-BNHUZYe9ZYK1SiUsAszi1sIBUTsfMS11LxRNqGZjqNLWKOyNlYpcDGBrh2oCriJ6Q8X8zhlFAZmUBbzaVJmUhloBo8dKkY50w7eGOCM1LF_Rkvc8WMcbE1538_viH77UGvO-52-k8X5AD9lRNGLkl5vdrAlQv7a3WdefsLXdesuA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+9th+International+Conference+on+Information%2C+Communications+and+Signal+Processing+%28ICICS%29&rft.atitle=A+high+payload+data+embedding+scheme+using+dual+stego-images+with+reversibility&rft.au=Chin-Chen+Chang&rft.au=Tzu-Chuen+Lu&rft.au=Gwoboa+Horng&rft.au=Ying-Hsuan+Huang&rft.date=2013-12-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICICS.2013.6782790&rft.externalDocID=6782790 |