Reference Hub17
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion

A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion

Subhadip Mukherjee, Biswapati Jana
Copyright: © 2019 |Volume: 8 |Issue: 4 |Pages: 15
ISSN: 1947-928X|EISSN: 1947-9298|EISBN13: 9781522566359|DOI: 10.4018/IJNCR.2019100102
Cite Article Cite Article

MLA

Mukherjee, Subhadip, and Biswapati Jana. "A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion." IJNCR vol.8, no.4 2019: pp.13-27. http://doi.org/10.4018/IJNCR.2019100102

APA

Mukherjee, S. & Jana, B. (2019). A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion. International Journal of Natural Computing Research (IJNCR), 8(4), 13-27. http://doi.org/10.4018/IJNCR.2019100102

Chicago

Mukherjee, Subhadip, and Biswapati Jana. "A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion," International Journal of Natural Computing Research (IJNCR) 8, no.4: 13-27. http://doi.org/10.4018/IJNCR.2019100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data hiding techniques are very significant in the research area of information security. In this article, the authors propose a new reversible data hiding (RDH) scheme using difference expansion. At first, the original image is partitioned into 3 × 3 pixel blocks, then marked Type-one and Type-two pixels based on their coordinate values. After that, the authors find correlated pixels by computing correlation coefficients and the median of Type-one pixels. Next, secret data bits are embedded within Type-two pixels based on correlated pixels and Type-one pixels based on the stego Type-two pixels. The data extraction process successfully extracts secret data as well as recovers the cover image. The authors observed the effects of the proposed method by performing experiments on some standard cover images and found significantly better result in terms of data hiding capacity compared with existing data hiding schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.