Information Hiding and Recovery using Reversible Embedding
The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original conte...
Gespeichert in:
Veröffentlicht in: | International journal of computer applications 2011-01, Vol.24 (5), p.30-34 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 34 |
---|---|
container_issue | 5 |
container_start_page | 30 |
container_title | International journal of computer applications |
container_volume | 24 |
creator | Sonawane, A S Dhore, M L Mali, S N |
description | The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message. |
doi_str_mv | 10.5120/2957-3908 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_907946876</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2418489061</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1688-859fdc5e4c8dcac40ff067cc3f0d3c964ac6a556844db228585da1643852b0b43</originalsourceid><addsrcrecordid>eNpdkMtKAzEUhoMoWGoXvsHgRlyMJpPbiTsp1RYKQtF1yOQiU2YmNekIfXtn0IV4NufCx8_hQ-ia4HtOKvxQKS5LqjCcoRlWkpcAIM__zJdokfMej0VVJRSbocdNH2LqzLGJfbFuXNN_FKZ3xc7b-OXTqRjydNr5cclN3fpi1dXeTdwVugimzX7x2-fo_Xn1tlyX29eXzfJpW1oiAErgKjjLPbPgrLEMh4CFtJYG7KhVghkrDOcCGHN1VQEH7gwRjAKvalwzOke3P7mHFD8Hn4-6a7L1bWt6H4esFZaKCZBiJG_-kfs4pH58TgMQKskYP0J3P5BNMefkgz6kpjPppAnWk0Y9adSTRvoNxNpioA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>881371228</pqid></control><display><type>article</type><title>Information Hiding and Recovery using Reversible Embedding</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Sonawane, A S ; Dhore, M L ; Mali, S N</creator><creatorcontrib>Sonawane, A S ; Dhore, M L ; Mali, S N</creatorcontrib><description>The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/2957-3908</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Decoders ; Encoders ; Extraction ; Messages ; Position (location) ; Streams ; Two phase</subject><ispartof>International journal of computer applications, 2011-01, Vol.24 (5), p.30-34</ispartof><rights>Copyright Foundation of Computer Science 2011</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1688-859fdc5e4c8dcac40ff067cc3f0d3c964ac6a556844db228585da1643852b0b43</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Sonawane, A S</creatorcontrib><creatorcontrib>Dhore, M L</creatorcontrib><creatorcontrib>Mali, S N</creatorcontrib><title>Information Hiding and Recovery using Reversible Embedding</title><title>International journal of computer applications</title><description>The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.</description><subject>Decoders</subject><subject>Encoders</subject><subject>Extraction</subject><subject>Messages</subject><subject>Position (location)</subject><subject>Streams</subject><subject>Two phase</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkMtKAzEUhoMoWGoXvsHgRlyMJpPbiTsp1RYKQtF1yOQiU2YmNekIfXtn0IV4NufCx8_hQ-ia4HtOKvxQKS5LqjCcoRlWkpcAIM__zJdokfMej0VVJRSbocdNH2LqzLGJfbFuXNN_FKZ3xc7b-OXTqRjydNr5cclN3fpi1dXeTdwVugimzX7x2-fo_Xn1tlyX29eXzfJpW1oiAErgKjjLPbPgrLEMh4CFtJYG7KhVghkrDOcCGHN1VQEH7gwRjAKvalwzOke3P7mHFD8Hn4-6a7L1bWt6H4esFZaKCZBiJG_-kfs4pH58TgMQKskYP0J3P5BNMefkgz6kpjPppAnWk0Y9adSTRvoNxNpioA</recordid><startdate>20110101</startdate><enddate>20110101</enddate><creator>Sonawane, A S</creator><creator>Dhore, M L</creator><creator>Mali, S N</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110101</creationdate><title>Information Hiding and Recovery using Reversible Embedding</title><author>Sonawane, A S ; Dhore, M L ; Mali, S N</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1688-859fdc5e4c8dcac40ff067cc3f0d3c964ac6a556844db228585da1643852b0b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Decoders</topic><topic>Encoders</topic><topic>Extraction</topic><topic>Messages</topic><topic>Position (location)</topic><topic>Streams</topic><topic>Two phase</topic><toplevel>online_resources</toplevel><creatorcontrib>Sonawane, A S</creatorcontrib><creatorcontrib>Dhore, M L</creatorcontrib><creatorcontrib>Mali, S N</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sonawane, A S</au><au>Dhore, M L</au><au>Mali, S N</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information Hiding and Recovery using Reversible Embedding</atitle><jtitle>International journal of computer applications</jtitle><date>2011-01-01</date><risdate>2011</risdate><volume>24</volume><issue>5</issue><spage>30</spage><epage>34</epage><pages>30-34</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/2957-3908</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-8887 |
ispartof | International journal of computer applications, 2011-01, Vol.24 (5), p.30-34 |
issn | 0975-8887 0975-8887 |
language | eng |
recordid | cdi_proquest_miscellaneous_907946876 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Decoders Encoders Extraction Messages Position (location) Streams Two phase |
title | Information Hiding and Recovery using Reversible Embedding |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T18%3A12%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20Hiding%20and%20Recovery%20using%20Reversible%20Embedding&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Sonawane,%20A%20S&rft.date=2011-01-01&rft.volume=24&rft.issue=5&rft.spage=30&rft.epage=34&rft.pages=30-34&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/2957-3908&rft_dat=%3Cproquest_cross%3E2418489061%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=881371228&rft_id=info:pmid/&rfr_iscdi=true |