双隐写图像中RDH的组合方向编码

IF 1.5 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computer Journal Pub Date : 2023-02-06 DOI:10.1093/comjnl/bxac178
C Shaji, I Shatheesh Sam
{"title":"双隐写图像中RDH的组合方向编码","authors":"C Shaji, I Shatheesh Sam","doi":"10.1093/comjnl/bxac178","DOIUrl":null,"url":null,"abstract":"Abstract In this paper, initially, message intensities are used to create two encoding tables: an index and a code sequence. The table is then updated with $n$ secret data encoded into it. If the code sequence of the second encoding table matches the code sequence of the preceding or succeeding half of the two encoding tables, the second encoding table is folded. The folding is done when maximum intensity occurs in the utmost succeeding part of the two encoding tables. Finally, using the combination orientation approach, the encoded indices are embedded in the stego images. In the extraction phase, using the two stego images and the encoding with the combination orientation method, the encoded indices are obtained. The decoding is performed to extract the secret message as well as the cover image and there is no occurrence of overflow and underflow problems. It has a high visual quality and a high embedding capacity. The proposed technique achieved a maximum $\\mathrm{PSNR}$ of $49.49$dB and a $648\\ 242$-bit embedding capacity. When compared to traditional techniques, the experimental results show that the proposed method outperforms them.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"42 1","pages":"0"},"PeriodicalIF":1.5000,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Encoding with Combination Orientation Technique for RDH in Dual Stego Images\",\"authors\":\"C Shaji, I Shatheesh Sam\",\"doi\":\"10.1093/comjnl/bxac178\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In this paper, initially, message intensities are used to create two encoding tables: an index and a code sequence. The table is then updated with $n$ secret data encoded into it. If the code sequence of the second encoding table matches the code sequence of the preceding or succeeding half of the two encoding tables, the second encoding table is folded. The folding is done when maximum intensity occurs in the utmost succeeding part of the two encoding tables. Finally, using the combination orientation approach, the encoded indices are embedded in the stego images. In the extraction phase, using the two stego images and the encoding with the combination orientation method, the encoded indices are obtained. The decoding is performed to extract the secret message as well as the cover image and there is no occurrence of overflow and underflow problems. It has a high visual quality and a high embedding capacity. The proposed technique achieved a maximum $\\\\mathrm{PSNR}$ of $49.49$dB and a $648\\\\ 242$-bit embedding capacity. When compared to traditional techniques, the experimental results show that the proposed method outperforms them.\",\"PeriodicalId\":50641,\"journal\":{\"name\":\"Computer Journal\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2023-02-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/comjnl/bxac178\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/comjnl/bxac178","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

在本文中,首先使用消息强度创建两个编码表:索引和代码序列。然后用编码到表中的$n$ secret数据更新表。如果第二编码表的编码序列与两个编码表的前一半或后一半的编码序列匹配,则折叠第二编码表。当两个编码表的最大后续部分出现最大强度时,就进行折叠。最后,采用组合取向方法,将编码后的索引嵌入到隐写图像中。在提取阶段,利用两幅隐写图像,采用组合取向法进行编码,得到编码后的索引。进行解码,提取密文和封面图像,不存在溢出和下溢问题。它具有高视觉质量和高嵌入能力。该技术实现了49.49美元dB的最大PSNR和648美元242美元比特的嵌入容量。实验结果表明,该方法优于传统方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Encoding with Combination Orientation Technique for RDH in Dual Stego Images
Abstract In this paper, initially, message intensities are used to create two encoding tables: an index and a code sequence. The table is then updated with $n$ secret data encoded into it. If the code sequence of the second encoding table matches the code sequence of the preceding or succeeding half of the two encoding tables, the second encoding table is folded. The folding is done when maximum intensity occurs in the utmost succeeding part of the two encoding tables. Finally, using the combination orientation approach, the encoded indices are embedded in the stego images. In the extraction phase, using the two stego images and the encoding with the combination orientation method, the encoded indices are obtained. The decoding is performed to extract the secret message as well as the cover image and there is no occurrence of overflow and underflow problems. It has a high visual quality and a high embedding capacity. The proposed technique achieved a maximum $\mathrm{PSNR}$ of $49.49$dB and a $648\ 242$-bit embedding capacity. When compared to traditional techniques, the experimental results show that the proposed method outperforms them.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Journal
Computer Journal 工程技术-计算机:软件工程
CiteScore
3.60
自引率
7.10%
发文量
164
审稿时长
4.8 months
期刊介绍: The Computer Journal is one of the longest-established journals serving all branches of the academic computer science community. It is currently published in four sections.
期刊最新文献
Correction to: Automatic Diagnosis of Diabetic Retinopathy from Retinal Abnormalities: Improved Jaya-Based Feature Selection and Recurrent Neural Network Eager Term Rewriting For The Fracterm Calculus Of Common Meadows An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model Enhancing Auditory Brainstem Response Classification Based On Vision Transformer Leveraging Meta-Learning To Improve Unsupervised Domain Adaptation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1