TY - JOUR
T1 - High quality PVM based reversible data hiding method for digital images
AU - Maniriho, Pascal
AU - Ahmad, Tohari
N1 - Publisher Copyright:
© 2019 ICIC International.
PY - 2019/4
Y1 - 2019/4
N2 - In recent years, transmitting and sharing multimedia data across the Internet have raised up many data security issues such as copyright and contents protection due to the communication channel (network) which is often insecure. Therein, the need for new data hiding security mechanisms like steganography has become a necessity. Steganography is the art and science of veiling the existence of the private message while keeping the communication invisible. To exploit this feature, a new reversible data hiding method based on pixel value modification (PVM) that allows secret data to be veiled into the carrier image is introduced in this paper. The proposed method employs the logarithmic predictor and the reference pixel to control the embedding process while the key indicator is used to record the position and the operations performed on each pixel. The embedded confidential data and the original carrier image can be reconstructed without any degradation. Besides, the experimental results, analysis and comparisons demonstrate that the quality of the stego image is better than those of existing methods.
AB - In recent years, transmitting and sharing multimedia data across the Internet have raised up many data security issues such as copyright and contents protection due to the communication channel (network) which is often insecure. Therein, the need for new data hiding security mechanisms like steganography has become a necessity. Steganography is the art and science of veiling the existence of the private message while keeping the communication invisible. To exploit this feature, a new reversible data hiding method based on pixel value modification (PVM) that allows secret data to be veiled into the carrier image is introduced in this paper. The proposed method employs the logarithmic predictor and the reference pixel to control the embedding process while the key indicator is used to record the position and the operations performed on each pixel. The embedded confidential data and the original carrier image can be reconstructed without any degradation. Besides, the experimental results, analysis and comparisons demonstrate that the quality of the stego image is better than those of existing methods.
KW - Data hiding
KW - Data protection
KW - Information security
KW - Pixel value modification
UR - http://www.scopus.com/inward/record.url?scp=85066803892&partnerID=8YFLogxK
U2 - 10.24507/ijicic.15.02.667
DO - 10.24507/ijicic.15.02.667
M3 - Article
AN - SCOPUS:85066803892
SN - 1349-4198
VL - 15
SP - 667
EP - 680
JO - International Journal of Innovative Computing, Information and Control
JF - International Journal of Innovative Computing, Information and Control
IS - 2
ER -