Data hiding is a way of hiding secret data on cover-media and it is used for a variety of applications. An important of the data hiding is to conceal the data in a secret way without loss of cover-media. Until now, continuous research on absolute moment block truncation coding based data hiding methods have improved a performance on data concealment and image quality. However, the current absolute moment block truncation coding based data hiding technology has a limitation in deriving a method that significantly surpasses existing performance. In this paper, we propose a new method to overcome this problem. To do this, first the original image is transformed to the cover image using absolute moment block truncation coding and is expanded the image using neighbor average interpolation algorithm. The proposed three data hiding methods are based on the generated cover image. The first method is to directly replace the pixel value, which is a component of each block, with the same secret value. The second method is to replace the pixels to match the secret bits only for the extended pixels in each block of the cover image. The third method is to apply Hamming code to each block to minimize the number of replacement pixels for data hiding. Experimental results show that our method is superior in terms of efficiency compared to traditional absolute moment block truncation coding based data hiding methods.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.3934/mbe.2020009 | DOI Listing |
BMC Glob Public Health
January 2025
Institute for Global Health, University College London, 30 Guilford Street, London, WC1N 1EH, UK.
Background: Women living with HIV bear a disproportionate burden of stigma, especially in countries where gender discrimination is more common. A result is widespread domestic violence against women. This violence is itself stigmatized, but the intersectional stigma of HIV and domestic violence has not been well studied.
View Article and Find Full Text PDFSubst Use Misuse
January 2025
National Centre for Youth Substance Use Research (NCYSUR), School of Psychology, The University of Queensland, Brisbane, Australia.
Background: Polysubstance use is common among people who use methamphetamine. This prospective study examined the three-month polysubstance use profiles among people enrolled in outpatient treatment for methamphetamine use and associated substance use, mental health, and treatment correlates.
Method: The present study used routinely collected client-reported outcome measures data from = 1,507 clients enrolled in outpatient treatment who reported methamphetamine as their primary drug of concern ( = 34.
Entropy (Basel)
December 2024
Computer Engineering Department, Düzce University, 81620 Düzce, Turkey.
With the rapid increase in global data and rapid development of information technology, DNA sequences have been collected and manipulated on computers. This has yielded a new and attractive field of bioinformatics, DNA storage, where DNA has been considered as a great potential storage medium. It is known that one gram of DNA can store 215 GB of data, and the data stored in the DNA can be preserved for tens of thousands of years.
View Article and Find Full Text PDFiScience
December 2024
Department of Computer Science, Johns Hopkins University, Baltimore, MD 21218, US.
Pangenome indexes are promising tools for many applications, including classification of nanopore sequencing reads. Move structure is a compressed-index data structure based on the Burrows-Wheeler Transform (BWT). It offers simultaneous O(1)-time queries and O(r) space, where r is the number of BWT runs (consecutive sequence of identical characters).
View Article and Find Full Text PDFSci Rep
January 2025
Universidad Europea del Atlántico. Isabel Torres 21, Santander, 39011, Spain.
Steganography is used to hide sensitive types of data including images, audio, text, and videos in an invisible way so that no one can detect it. Image-based steganography is a technique that uses images as a cover media for hiding and transmitting sensitive information over the internet. However, image-based steganography is a challenging task due to transparency, security, computational efficiency, tamper protection, payload, etc.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!