• 沒有找到結果。

Adaptive data hiding in palette images by color ordering and mapping with security protection

N/A
N/A
Protected

Academic year: 2022

Share "Adaptive data hiding in palette images by color ordering and mapping with security protection"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

題名: Adaptive data hiding in palette images by color ordering and mapping with security protection

作者: C. H. Tzeng;Z. F. Yang;W. H. Tsai

貢獻者: Department of Information Communication

關鍵詞: data encapsulation;feature extraction;security of data;image colour

analysis;adaptive data hiding;palette images;color ordering;color mapping;security protection;parameter randomization;embed secret data;data embeddable

pixel;stego image 日期: 2004

上傳時間: 2009-11-25T02:31:14Z 出版者: Asia University

摘要: Palette images are widely used in multimedia and Internet applications. In this paper, a new method for data hiding in palette images with security protection by color ordering and mapping, as well as parameter randomization, is proposed.

First, image pixels are classified as data embeddable or nonembeddable, and only the former ones are used to embed secret data. The proposed idea of data hiding is based on the use of a new type of color-ordering relationship, from which a color- mapping function is defined with binary values as output. When a secret data bit is to be embedded, a data-embeddable pixel is selected, and its color is adjusted to make the output of the color-mapping function equal to the secret bit value. The embedded secret data can be extracted correctly and quickly from the resulting stego-image by merely inspecting the outputs of the color-mapping function.

Indetectability of the secret information embedded by the proposed method is also analyzed and confirmed. Furthermore, a number of possible security enhancement measures based on parameter randomization in the data-embedding process are proposed to protect the hidden data in the stego-image. The randomization effect is created by the use of a secret key and a number of random number-generating functions. The proposed data hiding method was tested with a variety of palette images. The experimental results show that secret data can be embedded and extracted successfully without producing visual artifacts inthe cover image. A good balance between stego-image quality and data-embedding capacity can be achieved, which proves the efficiency and feasibility of the proposed method for practical applications.

參考文獻

相關文件

Following the supply by the school of a copy of personal data in compliance with a data access request, the requestor is entitled to ask for correction of the personal data

Teacher / HR Data Payroll School email system Exam papers Exam Grades /.

Classifying sensitive data (personal data, mailbox, exam papers etc.) Managing file storage, backup and cloud services, IT Assets (keys) Security in IT Procurement and

 Service Level Agreement – ensure at least 99.7% availability of the WiFi service, support four-hour response time and four-hour service recovery with active monitoring,

For a 4-connected plane triangulation G with at least four exterior vertices, the size of the grid can be reduced to (n/2 − 1) × (n/2) [13], [24], which is optimal in the sense

To improve the quality of reconstructed full-color images from color filter array (CFA) images, the ECDB algorithm first analyzes the neighboring samples around a green missing

manufacturing operation in the past and no direct link with customer to get continuous feedback.. Although design chain as well as customer chain has been suggested in recent years

The aim of this study is to investigate students in learning in inequalities with one unknown, as well as to collect corresponding strategies and errors in problem solving..