High capacity data hiding with absolute moment block truncation coding image based on interpolation.

Math Biosci Eng

Department of Computer Science and Information Engineering, National Dong Hwa University, No. 1, Sec. 2, Da Hsueh Rd., Shoufeng, Hualien 97401, Taiwan.

Published: September 2019

Data hiding is a way of hiding secret data on cover-media and it is used for a variety of applications. An important of the data hiding is to conceal the data in a secret way without loss of cover-media. Until now, continuous research on absolute moment block truncation coding based data hiding methods have improved a performance on data concealment and image quality. However, the current absolute moment block truncation coding based data hiding technology has a limitation in deriving a method that significantly surpasses existing performance. In this paper, we propose a new method to overcome this problem. To do this, first the original image is transformed to the cover image using absolute moment block truncation coding and is expanded the image using neighbor average interpolation algorithm. The proposed three data hiding methods are based on the generated cover image. The first method is to directly replace the pixel value, which is a component of each block, with the same secret value. The second method is to replace the pixels to match the secret bits only for the extended pixels in each block of the cover image. The third method is to apply Hamming code to each block to minimize the number of replacement pixels for data hiding. Experimental results show that our method is superior in terms of efficiency compared to traditional absolute moment block truncation coding based data hiding methods.

Download full-text PDF

Source
http://dx.doi.org/10.3934/mbe.2020009DOI Listing

Publication Analysis

Top Keywords

data hiding
32
absolute moment
20
moment block
20
block truncation
20
truncation coding
20
coding based
12
based data
12
hiding methods
12
cover image
12
data
11

Similar Publications

Background: Women living with HIV bear a disproportionate burden of stigma, especially in countries where gender discrimination is more common. A result is widespread domestic violence against women. This violence is itself stigmatized, but the intersectional stigma of HIV and domestic violence has not been well studied.

View Article and Find Full Text PDF

Three-Month Polysubstance Use Patterns Among People Enrolled in Outpatient Treatment for Methamphetamine Use.

Subst Use Misuse

January 2025

National Centre for Youth Substance Use Research (NCYSUR), School of Psychology, The University of Queensland, Brisbane, Australia.

Background: Polysubstance use is common among people who use methamphetamine. This prospective study examined the three-month polysubstance use profiles among people enrolled in outpatient treatment for methamphetamine use and associated substance use, mental health, and treatment correlates.

Method: The present study used routinely collected client-reported outcome measures data from  = 1,507 clients enrolled in outpatient treatment who reported methamphetamine as their primary drug of concern ( = 34.

View Article and Find Full Text PDF

A DNA Data Storage Method Using Spatial Encoding Based Lossless Compression.

Entropy (Basel)

December 2024

Computer Engineering Department, Düzce University, 81620 Düzce, Turkey.

With the rapid increase in global data and rapid development of information technology, DNA sequences have been collected and manipulated on computers. This has yielded a new and attractive field of bioinformatics, DNA storage, where DNA has been considered as a great potential storage medium. It is known that one gram of DNA can store 215 GB of data, and the data stored in the DNA can be preserved for tens of thousands of years.

View Article and Find Full Text PDF

Pangenome indexes are promising tools for many applications, including classification of nanopore sequencing reads. Move structure is a compressed-index data structure based on the Burrows-Wheeler Transform (BWT). It offers simultaneous O(1)-time queries and O(r) space, where r is the number of BWT runs (consecutive sequence of identical characters).

View Article and Find Full Text PDF

Steganography is used to hide sensitive types of data including images, audio, text, and videos in an invisible way so that no one can detect it. Image-based steganography is a technique that uses images as a cover media for hiding and transmitting sensitive information over the internet. However, image-based steganography is a challenging task due to transparency, security, computational efficiency, tamper protection, payload, etc.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!