English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90453/105672 (86%)
Visitors : 13223256      Online Users : 539
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/79783

    Title: A Reversible Steganographic Algorithm for BTC?compressed Images Based on Difference Expansion and Median Edge Detector
    Authors: 蔡淵裕;Tsai, Yuan-Yu;詹啟祥;Chan, Chi-Shiang;劉兆樑;Liu, Chao-Liang;蘇伯儒
    Contributors: 資訊多媒體應用學系
    Keywords: Steganography;Block truncation coding;Median edge detector;Reversibility;Difference expansion
    Steganography, Block truncation coding, Median edge detector, Reversibility, Difference expansion
    Date: 2014-01
    Issue Date: 2014-06-05 12:08:17 (UTC+8)
    Abstract: In this paper, we propose a reversible steganographic algorithm for compressed images. The algorithm firstly compresses the input image using block truncation coding. One binary map and two quantisation levels, called high and low levels, are then obtained for each block. Thereafter, we adopt a median edge detector to predict the high and low quantisation levels for neighbouring blocks. A secret message is then embedded into the predicted difference based on the difference expansion technique. Each block can be classified as embeddable and non-embeddable according to the order of two quantisation levels. Thus, the location map is unnecessary in our proposed algorithm. The experimental results show that our data-embedded compressed code can be the same file size compared with standard block truncation coding-compressed code. Our algorithm can also resist the RS steganalysis attack. Further, the embedding capacity can be varied according to the given embedding parameter. The feasibility of our proposed algorithm is validated by presenting comparisons with existing algorithms.
    Relation: IMAGING SCIENCE JOURNAL,62(1),48-55.
    Appears in Collections:[行動商務與多媒體應用學系] 期刊論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback