English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90453/105671 (86%)
Visitors : 16021141      Online Users : 56
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 會議論文 >  Item 310904400/13508

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/13508

    Title: A Data Hiding Scheme for Color Image Using BTC Compression Technique
    Authors: 周永振;Chou, Yung-Chen;周永振;Chou, Yung-Chen;周永振;Chou, Yung-Chen
    Contributors: 資訊工程學系
    Date: 2010-07
    Issue Date: 2012-11-22 17:15:01 (UTC+8)
    Abstract: Data hiding technique is using a cover medium to conceal secret data and delivering it to receiver over public computer networks for secret data delivery. A color image is a good cover medium because a color image consists of more redundant space than a gray scale image or halftone image, that means, a color image can be used to carry more secret data. Block truncation coding (BTC) is a lossy compression technique that can significantly reduce the size of digital images with acceptable visual quality. Traditional color BTC compression method uses three bitmaps to compress a color image for saving the storage cost. Chang et al. proposed a data hiding method to conceal secret data into BTC compression code. Chang et al. use a genetic algorithm (GA) to generate a common bit-map to improve the compression rate then uses the common bit-map to increase embedding capacity in a color image. However, Chang et al.'s method is time consuming for generating a common bit-map. In this paper, a novel data hiding method is presented to save the computation cost for common bit-map generation and improve the visual quality of stego images. From the experimental results, the proposed method not only successfully conceals secret data into compression code but also saves the computation cost of common bit-map generation.
    Relation: The 9th IEEE International Conference on Cognitive Informatics
    Appears in Collections:[資訊工程學系] 會議論文

    Files in This Item:

    File Description SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback