A Visual Hiding Algorithm Based on Human Visual System

Article Preview

Abstract:

Image information hiding is a way of concealing secret information within another image or file. The previous researches of image information hiding extract secret by calculating. An algorithm based on HVS (Human Visual System) is proposed in this paper. We first decide the embedding region and embedding strength of secret image based on edge and texture information. Then, a pair of invert images is chosen as the cover images, and the stego images are constructed by modifying the pixels of the cover images through the proposed criterion. Correspondingly, the secret image can be recovered through overlaying the two stego images.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

2393-2397

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Naor, A. Sharmir, Visual Cryptography[C]/ Preproceeding of Eurocrypt 94. BerLin: Springer, 1994: 1-12.

Google Scholar

[2] K. H. Lee, P. L. Chiu, An extended visual cryptography algorithm for general access structures, IEEE Transactions on Information Forensics and Security, 2012, vol. 7(1): 219-229.

DOI: 10.1109/tifs.2011.2167611

Google Scholar

[3] Y. Yamaguchi, An extended visual cryptography algorithm for continuous-tone images, Lecture Notes in Computer Science(LNCS), 2012, vol. 7128, pp.228-242.

DOI: 10.1007/978-3-642-32205-1_19

Google Scholar

[4] Y. C. Hou, S. F. Du, Visual Cryptography Techniques for Color Images without Pixel Expansion[J]. Journal of Information. Technology and Society, 2004 (4): 95-110.

Google Scholar

[5] M. Nakajima and Y. Yamaguchi, Extended visual cryptography for natural images, in Proc. WSCG Conf. 2002, 2002, pp.303-412.

Google Scholar

[6] Y. C. Hou, C. F. Lin, C. Y. Chang, Visual cryptography for color images without pixel expansion. Journal of Technology. 2001, 16(4): 595-603.

Google Scholar

[7] Y. C. Hou, P. M. Chen, An asymmetric watermarking scheme based on visual cryptography. Proc. of ICSP, Vol. 2, 2000, pp.992-995.

Google Scholar

[8] R. W. Floyd, An adaptive algorithm for spatial gray-scale[C]/Proc. Soc. Inf. Disp. 1976, 17: 75-77.

Google Scholar

[9] C. I. Podilchuk, E. J. Delp, Digital watermarking: algorithms and applications[J]. IEEE Signal Processing Magazine, 2001, 18(4): 33-46.

DOI: 10.1109/79.939835

Google Scholar

[10] I. J. Cox, M. L. Miller, The first 50 years of electronic watermarking[J]. Journal of Applied Signal Processing, 2002(2): 126-132.

Google Scholar