Data Hiding Based on Histogram Modification of Pixel Differences with known binary tree levels
In this paper we first hide the data in the histogram peak points. We use the binary tree structure to represent the peak points. After representing the peak points in the binary tree .The level of the binary tree is calculated and is sent to the receiver as a predetermined agreement. Image authenti...
Gespeichert in:
Veröffentlicht in: | International journal of advanced research in computer science 2012-01, Vol.3 (1) |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In this paper we first hide the data in the histogram peak points. We use the binary tree structure to represent the peak points. After representing the peak points in the binary tree .The level of the binary tree is calculated and is sent to the receiver as a predetermined agreement. Image authentication is possible only when the information of level is known. We also perform histogram shifting to prevent overflow and underflow as well. The best of this paper is large hiding capacity along with the main objective of proper image transfer. |
---|---|
ISSN: | 0976-5697 |