Data hiding scheme based on edge detection and triangular mirroring

Tzu Chuen Lu, Chun Ya Tseng, Hui Shih Leng, Chun Chih Huang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Interpolation is a commonly used method of hiding data. In this approach, an image is expanded to a larger matrix as a prediction image and then hidden information is placed in the prediction image with high embedding capacity. Jung and Yoo (2009) presented an interpolation approach using neighbor mean interpolation for the prediction value. Lee and Huang (2012) improved Jung and Yoo's method, and the modified method provides high hidden capacity. In our research, we improve Lee and Huang's approach to reduce the jagged phenomena based on median edge detector and the triangular mirroring technique. In our experimental results, the proposed method provides efficiency, high quality, and hidden capacity.

Original languageEnglish
Title of host publicationProceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
EditorsJunzo Watada, Akinori Ito, Chien-Ming Chen, Jeng-Shyang Pan, Han-Chieh Chao
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages142-145
Number of pages4
ISBN (Electronic)9781479953905
DOIs
Publication statusPublished - 2014 Dec 24
Event10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014 - Kitakyushu, Japan
Duration: 2014 Aug 272014 Aug 29

Publication series

NameProceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014

Other

Other10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014
CountryJapan
CityKitakyushu
Period14-08-2714-08-29

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Artificial Intelligence
  • Signal Processing

Fingerprint Dive into the research topics of 'Data hiding scheme based on edge detection and triangular mirroring'. Together they form a unique fingerprint.

Cite this