An efficient and simplified data hiding technique based on 2's complement

Tzu Chuen Lu, Chun Ya Tseng, Chang Mu Chen, Hui Shih Leng, Ying Hsuan Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In recent years, several data hiding techniques have been developed. Hsiao and Chang proposed a data hiding scheme in 2011. This approach utilizes just noticeable distortion (JND) techniques to determine whether a pixel can be included in hidden information based on its value, but the calculation procedure is very complex. Therefore, our research seeks to improve Hsiao and Chang's method through the use of an alternate technique to replace JND techniques, specifically through the use of the 2's complement to embed hidden information in an image. Our experimental results demonstrate that our approach achieves high quality and hidden capacity without the need for JND techniques and their associated computational cost.

Original languageEnglish
Title of host publicationProceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
EditorsJunzo Watada, Akinori Ito, Chien-Ming Chen, Jeng-Shyang Pan, Han-Chieh Chao
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages126-129
Number of pages4
ISBN (Electronic)9781479953905
DOIs
Publication statusPublished - 2014 Dec 24
Event10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014 - Kitakyushu, Japan
Duration: 2014 Aug 272014 Aug 29

Publication series

NameProceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014

Other

Other10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
CountryJapan
CityKitakyushu
Period14-08-2714-08-29

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Artificial Intelligence
  • Signal Processing

Fingerprint Dive into the research topics of 'An efficient and simplified data hiding technique based on 2's complement'. Together they form a unique fingerprint.

Cite this