Enhancing DE-based data hiding method by controlling the expansion

Dwi S. Angreni*, Tohari Ahmad

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Communication by transferring data using computer networks have an important role nowadays. There are many activities which require sending or receiving data from one host to another. However, it can be a problem if the data is compromised during the transmission. In order to resolve the problem, steganography is used to secure the data. It is a data hiding method which can hide sensitive data in media so that unauthorized parties may not be suspicious or interested in attack. The previous reversible data hiding methods have been able to recover the image data and to improve the capacity of embedding. However, there are some problems that cannot be resolved such as overflow and underflow which result to decreasing the quality. In this paper, we propose a method which is able to overcome these problems that each pixel value on the cover image is expandable. The experimental results show that the PSNR and the capacity is higher than existing methods.

Original languageEnglish
Title of host publicationProceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467384414
DOIs
Publication statusPublished - 26 Sept 2016
Event4th International Conference on Cyber and IT Service Management, CITSM 2016 - Bandung, India
Duration: 26 Apr 201627 Apr 2016

Publication series

NameProceedings of 2016 4th International Conference on Cyber and IT Service Management, CITSM 2016

Conference

Conference4th International Conference on Cyber and IT Service Management, CITSM 2016
Country/TerritoryIndia
CityBandung
Period26/04/1627/04/16

Fingerprint

Dive into the research topics of 'Enhancing DE-based data hiding method by controlling the expansion'. Together they form a unique fingerprint.

Cite this