TY - GEN
T1 - Enhancing DE-based data hiding method by controlling the expansion
AU - Angreni, Dwi S.
AU - Ahmad, Tohari
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/9/26
Y1 - 2016/9/26
N2 - Communication by transferring data using computer networks have an important role nowadays. There are many activities which require sending or receiving data from one host to another. However, it can be a problem if the data is compromised during the transmission. In order to resolve the problem, steganography is used to secure the data. It is a data hiding method which can hide sensitive data in media so that unauthorized parties may not be suspicious or interested in attack. The previous reversible data hiding methods have been able to recover the image data and to improve the capacity of embedding. However, there are some problems that cannot be resolved such as overflow and underflow which result to decreasing the quality. In this paper, we propose a method which is able to overcome these problems that each pixel value on the cover image is expandable. The experimental results show that the PSNR and the capacity is higher than existing methods.
AB - Communication by transferring data using computer networks have an important role nowadays. There are many activities which require sending or receiving data from one host to another. However, it can be a problem if the data is compromised during the transmission. In order to resolve the problem, steganography is used to secure the data. It is a data hiding method which can hide sensitive data in media so that unauthorized parties may not be suspicious or interested in attack. The previous reversible data hiding methods have been able to recover the image data and to improve the capacity of embedding. However, there are some problems that cannot be resolved such as overflow and underflow which result to decreasing the quality. In this paper, we propose a method which is able to overcome these problems that each pixel value on the cover image is expandable. The experimental results show that the PSNR and the capacity is higher than existing methods.
UR - http://www.scopus.com/inward/record.url?scp=84994144980&partnerID=8YFLogxK
U2 - 10.1109/CITSM.2016.7577530
DO - 10.1109/CITSM.2016.7577530
M3 - Conference contribution
AN - SCOPUS:84994144980
T3 - Proceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016
BT - Proceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Cyber and IT Service Management, CITSM 2016
Y2 - 26 April 2016 through 27 April 2016
ER -