TY - JOUR
T1 - Histogram-based multilayer reversible data hiding method for securing secret data
AU - Islamy, Chaidir Chalaf
AU - Ahmad, Tohari
N1 - Publisher Copyright:
© 2019 Institute of Advanced Engineering and Science. All rights reserved.
PY - 2019/9
Y1 - 2019/9
N2 - In this modern age, data can be easily transferred within networks. This condition has brought the data vulnerable; so they need protection at all times. To minimize this threat, data hiding appears as one of the potential methods to secure data. This protection is done by embedding the secret into various types of data, such as an image. In this case, histogram shifting has been proposed; however, the amount of secret and the respective stego image are still challenging. In this research, we offer a method to improve its performance by performing some steps, for example removing the shifting process and employing multilayer embedding. Here, the embedding is done directly to the peak of the histogram which has been generated by the cover. The experimental results show that this proposed method has a better quality of stego image than existing ones. So, it can be one of possible solutions to protect sensitive data.
AB - In this modern age, data can be easily transferred within networks. This condition has brought the data vulnerable; so they need protection at all times. To minimize this threat, data hiding appears as one of the potential methods to secure data. This protection is done by embedding the secret into various types of data, such as an image. In this case, histogram shifting has been proposed; however, the amount of secret and the respective stego image are still challenging. In this research, we offer a method to improve its performance by performing some steps, for example removing the shifting process and employing multilayer embedding. Here, the embedding is done directly to the peak of the histogram which has been generated by the cover. The experimental results show that this proposed method has a better quality of stego image than existing ones. So, it can be one of possible solutions to protect sensitive data.
KW - Data hiding
KW - Data protection
KW - Histogram
KW - Information security
UR - http://www.scopus.com/inward/record.url?scp=85071370246&partnerID=8YFLogxK
U2 - 10.11591/eei.v8i3.1321
DO - 10.11591/eei.v8i3.1321
M3 - Article
AN - SCOPUS:85071370246
SN - 2089-3191
VL - 8
SP - 1128
EP - 1134
JO - Bulletin of Electrical Engineering and Informatics
JF - Bulletin of Electrical Engineering and Informatics
IS - 3
ER -