{"title":"Encoding with Combination Orientation Technique for RDH in Dual Stego Images","authors":"C Shaji, I Shatheesh Sam","doi":"10.1093/comjnl/bxac178","DOIUrl":null,"url":null,"abstract":"Abstract In this paper, initially, message intensities are used to create two encoding tables: an index and a code sequence. The table is then updated with $n$ secret data encoded into it. If the code sequence of the second encoding table matches the code sequence of the preceding or succeeding half of the two encoding tables, the second encoding table is folded. The folding is done when maximum intensity occurs in the utmost succeeding part of the two encoding tables. Finally, using the combination orientation approach, the encoded indices are embedded in the stego images. In the extraction phase, using the two stego images and the encoding with the combination orientation method, the encoded indices are obtained. The decoding is performed to extract the secret message as well as the cover image and there is no occurrence of overflow and underflow problems. It has a high visual quality and a high embedding capacity. The proposed technique achieved a maximum $\\mathrm{PSNR}$ of $49.49$dB and a $648\\ 242$-bit embedding capacity. When compared to traditional techniques, the experimental results show that the proposed method outperforms them.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"42 1","pages":"0"},"PeriodicalIF":1.5000,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/comjnl/bxac178","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Abstract In this paper, initially, message intensities are used to create two encoding tables: an index and a code sequence. The table is then updated with $n$ secret data encoded into it. If the code sequence of the second encoding table matches the code sequence of the preceding or succeeding half of the two encoding tables, the second encoding table is folded. The folding is done when maximum intensity occurs in the utmost succeeding part of the two encoding tables. Finally, using the combination orientation approach, the encoded indices are embedded in the stego images. In the extraction phase, using the two stego images and the encoding with the combination orientation method, the encoded indices are obtained. The decoding is performed to extract the secret message as well as the cover image and there is no occurrence of overflow and underflow problems. It has a high visual quality and a high embedding capacity. The proposed technique achieved a maximum $\mathrm{PSNR}$ of $49.49$dB and a $648\ 242$-bit embedding capacity. When compared to traditional techniques, the experimental results show that the proposed method outperforms them.
期刊介绍:
The Computer Journal is one of the longest-established journals serving all branches of the academic computer science community. It is currently published in four sections.