Reversible data hiding method by extending reduced difference expansion
To keep hiding secret data in multimedia files, such as video, audio, and image considers essential for information security. Image, for instance, as the media aids data insertion securely. The use of insertion technique must ensure a reliable process on retaining data quality and capacity. However,...
Saved in:
Main Authors: | , |
---|---|
Format: | EJournal Article |
Published: |
Universitas Ahmad Dahlan,
2019-07-25.
|
Subjects: | |
Online Access: | Get Fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01966 am a22002773u 4500 | ||
---|---|---|---|
001 | IJAIN_351_ijain_v5i2_p101-112 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Syahlan, Zainal |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Ahmad, Tohari |e author |
245 | 0 | 0 | |a Reversible data hiding method by extending reduced difference expansion |
260 | |b Universitas Ahmad Dahlan, |c 2019-07-25. | ||
500 | |a https://ijain.org/index.php/IJAIN/article/view/351 | ||
520 | |a To keep hiding secret data in multimedia files, such as video, audio, and image considers essential for information security. Image, for instance, as the media aids data insertion securely. The use of insertion technique must ensure a reliable process on retaining data quality and capacity. However, a trade-off between the resulted image quality and the embedded payload capacity after the embedding process often occurs. Therefore, this research aims at extending the existing method of integrating confidential messages using the Reduced Difference Expansion (RDE), transform into a medical image by changing the base point, block size, and recalculating of difference. The results display that the proposed method enhances the quality of the stego image and capacity of the hidden message. | ||
540 | |a Copyright (c) 2019 Zainal Syahlan, Tohari Ahmad | ||
540 | |a https://creativecommons.org/licenses/by-sa/4.0 | ||
546 | |a eng | ||
690 | |a Steganography; Difference expansion; Reduced difference expansion; Hiding data; Secret data | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n International Journal of Advances in Intelligent Informatics; Vol 5, No 2 (2019): July 2019; 101-112 | |
786 | 0 | |n 2548-3161 | |
786 | 0 | |n 2442-6571 | |
787 | 0 | |n https://ijain.org/index.php/IJAIN/article/view/351/ijain_v5i2_p101-112 | |
856 | 4 | 1 | |u https://ijain.org/index.php/IJAIN/article/view/351/ijain_v5i2_p101-112 |z Get Fulltext |