Reference Hub2
High Performance Reversible Data Hiding for Mobile Applications and Human Interaction

High Performance Reversible Data Hiding for Mobile Applications and Human Interaction

Fong-Hao Liu, Hsiang-Fu Lo, Chun-Te Su, Der-Chyuan Lou, Wei-Tsong Lee
Copyright: © 2013 |Volume: 9 |Issue: 4 |Pages: 17
ISSN: 1548-3908|EISSN: 1548-3916|EISBN13: 9781466635746|DOI: 10.4018/ijthi.2013100103
Cite Article Cite Article

MLA

Liu, Fong-Hao, et al. "High Performance Reversible Data Hiding for Mobile Applications and Human Interaction." IJTHI vol.9, no.4 2013: pp.41-57. http://doi.org/10.4018/ijthi.2013100103

APA

Liu, F., Lo, H., Su, C., Lou, D., & Lee, W. (2013). High Performance Reversible Data Hiding for Mobile Applications and Human Interaction. International Journal of Technology and Human Interaction (IJTHI), 9(4), 41-57. http://doi.org/10.4018/ijthi.2013100103

Chicago

Liu, Fong-Hao, et al. "High Performance Reversible Data Hiding for Mobile Applications and Human Interaction," International Journal of Technology and Human Interaction (IJTHI) 9, no.4: 41-57. http://doi.org/10.4018/ijthi.2013100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Reversible data hiding with predictive error-based difference expansion to conceal personal and sensitive information in mobile applications and human interaction activities through hand-held devices recently has drawn lots of interest. It can not only completely restore the original image after extraction, but also keep the protected privacy information imperceptible against the eavesdroppers. A reversible data hiding method based on prediction-error and pixel-value difference was proposed in this paper. The suitable situations for reversible algorithms and embedded value are selected depended on the differences between image regions and the characteristics of embedded data. Experimental results show that our proposed scheme provides a 57956 bits (0.24 ppb) hiding capacity and a 53.81dB PSNR on F16 image without generating noticeable visual artifacts. The proposed method is additionally applied with different predictors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.