Affiliation:
1. Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan 62107, R.O.C.
2. Department of Computer Science and Information Management, Providence University, Taichung, Taiwan 433, R.O.C.
Abstract
The improving technology and the ubiquity of the Internet have allowed more and more people to transmit data via the Internet. The contents of the transmission can be in the form of words, voices, images, or even computer animation. To protect the contents from interceptors' attention, the image hiding technology thus emerged. Some contents transmitted via the Internet can be confidential data such as highly valued product design blueprints or war plans, so it is important to pay more attention to the security of the transmitted data, or what we called secret image in this paper. The point of this paper is to enhance the security of the secret image without causing too much distortion to the host image and in the meantime to shorten the image hiding process time. For better protection, we adopted encryption process DES. In addition, we used greedy algorithm to shorten hiding process and to protect the host image from being severely distorted. To test our proposed method to see whether it indeed achieved its objective, we used two sets of images in our experiment. The results of the experiments showed, when k = 2, our PSNR is close to that of Wang et al.'s optimal LSB substitution, but is not significantly different from that of simple LSB substitution. However, our method took approximately only 1/7 of the time consumed by Wang et al. When k = 3, our PSNR is significantly higher than that of simple LSB substitution. The experimental results confirmed that our method could effectively protect host image quality and shorten the overall hiding time when it enhanced the security of the secret image.
Publisher
World Scientific Pub Co Pte Lt
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Software
Cited by
68 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献