29 research outputs found

    A Brief Review of RIDH

    Get PDF
    The Reversible image data hiding (RIDH) is one of the novel approaches in the security field. In the highly sensitive domains like Medical, Military, Research labs, it is important to recover the cover image successfully, Hence, without applying the normal steganography, we can use RIDH to get the better result. Reversible data hiding has a advantage over image data hiding that it can give you double security surely

    Best Fit Method of Sample Selection in Data Hiding and Extraction

    Get PDF
    Today data security and its transmission over the wireless network need special attention. Intruder always has a watch on sensitive data transmitted over a wireless network. This work proposes an approach that minimizes the quantization error between the original and result carrier by selecting optimize samples during Data Hiding. Propose work find out best matching carrier components during the data hiding process. Results also imply that achieved results are far better than any other steganographic method

    Acta Cybernetica : Volume 24. Number 4.

    Get PDF

    New Framework for Code-Mapping-based Reversible Data Hiding in JPEG Images

    Full text link
    Code mapping (CM) is an efficient technique of reversible data hiding (RDH) in JPEG images, which embeds data by constructing the mapping relationship between used codes and unused codes in JPEG bitstream. In this paper, we present a new framework to design the CM-based RDH method. Firstly, to suppress the file size expansion and improve the applicability, a new code mapping strategy is proposed. Based on the proposed strategy, the mapped codes are redefined by customizing a new Huffman table thoroughly rather than selected from the unused codes in the original Huffman table. Afterwards, the key issue of designing the CM-based RDH method, i.e., constructing the code mapping, is converted into solving a combinatorial optimization problem. As a realization, a novel CM-based RDH method is introduced by employing the genetic algorithm (GA). Experimental results show that the efficacy of the proposed method with high embedding capacity and no signal distortion while suppressing file size expansion

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification
    corecore