Information Hiding and Recovery using Reversible Embedding

The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original conte...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer applications 2011-01, Vol.24 (5), p.30-34
Hauptverfasser: Sonawane, A S, Dhore, M L, Mali, S N
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 34
container_issue 5
container_start_page 30
container_title International journal of computer applications
container_volume 24
creator Sonawane, A S
Dhore, M L
Mali, S N
description The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.
doi_str_mv 10.5120/2957-3908
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_907946876</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2418489061</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1688-859fdc5e4c8dcac40ff067cc3f0d3c964ac6a556844db228585da1643852b0b43</originalsourceid><addsrcrecordid>eNpdkMtKAzEUhoMoWGoXvsHgRlyMJpPbiTsp1RYKQtF1yOQiU2YmNekIfXtn0IV4NufCx8_hQ-ia4HtOKvxQKS5LqjCcoRlWkpcAIM__zJdokfMej0VVJRSbocdNH2LqzLGJfbFuXNN_FKZ3xc7b-OXTqRjydNr5cclN3fpi1dXeTdwVugimzX7x2-fo_Xn1tlyX29eXzfJpW1oiAErgKjjLPbPgrLEMh4CFtJYG7KhVghkrDOcCGHN1VQEH7gwRjAKvalwzOke3P7mHFD8Hn4-6a7L1bWt6H4esFZaKCZBiJG_-kfs4pH58TgMQKskYP0J3P5BNMefkgz6kpjPppAnWk0Y9adSTRvoNxNpioA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>881371228</pqid></control><display><type>article</type><title>Information Hiding and Recovery using Reversible Embedding</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Sonawane, A S ; Dhore, M L ; Mali, S N</creator><creatorcontrib>Sonawane, A S ; Dhore, M L ; Mali, S N</creatorcontrib><description>The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/2957-3908</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Decoders ; Encoders ; Extraction ; Messages ; Position (location) ; Streams ; Two phase</subject><ispartof>International journal of computer applications, 2011-01, Vol.24 (5), p.30-34</ispartof><rights>Copyright Foundation of Computer Science 2011</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c1688-859fdc5e4c8dcac40ff067cc3f0d3c964ac6a556844db228585da1643852b0b43</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Sonawane, A S</creatorcontrib><creatorcontrib>Dhore, M L</creatorcontrib><creatorcontrib>Mali, S N</creatorcontrib><title>Information Hiding and Recovery using Reversible Embedding</title><title>International journal of computer applications</title><description>The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.</description><subject>Decoders</subject><subject>Encoders</subject><subject>Extraction</subject><subject>Messages</subject><subject>Position (location)</subject><subject>Streams</subject><subject>Two phase</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkMtKAzEUhoMoWGoXvsHgRlyMJpPbiTsp1RYKQtF1yOQiU2YmNekIfXtn0IV4NufCx8_hQ-ia4HtOKvxQKS5LqjCcoRlWkpcAIM__zJdokfMej0VVJRSbocdNH2LqzLGJfbFuXNN_FKZ3xc7b-OXTqRjydNr5cclN3fpi1dXeTdwVugimzX7x2-fo_Xn1tlyX29eXzfJpW1oiAErgKjjLPbPgrLEMh4CFtJYG7KhVghkrDOcCGHN1VQEH7gwRjAKvalwzOke3P7mHFD8Hn4-6a7L1bWt6H4esFZaKCZBiJG_-kfs4pH58TgMQKskYP0J3P5BNMefkgz6kpjPppAnWk0Y9adSTRvoNxNpioA</recordid><startdate>20110101</startdate><enddate>20110101</enddate><creator>Sonawane, A S</creator><creator>Dhore, M L</creator><creator>Mali, S N</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110101</creationdate><title>Information Hiding and Recovery using Reversible Embedding</title><author>Sonawane, A S ; Dhore, M L ; Mali, S N</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1688-859fdc5e4c8dcac40ff067cc3f0d3c964ac6a556844db228585da1643852b0b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Decoders</topic><topic>Encoders</topic><topic>Extraction</topic><topic>Messages</topic><topic>Position (location)</topic><topic>Streams</topic><topic>Two phase</topic><toplevel>online_resources</toplevel><creatorcontrib>Sonawane, A S</creatorcontrib><creatorcontrib>Dhore, M L</creatorcontrib><creatorcontrib>Mali, S N</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sonawane, A S</au><au>Dhore, M L</au><au>Mali, S N</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information Hiding and Recovery using Reversible Embedding</atitle><jtitle>International journal of computer applications</jtitle><date>2011-01-01</date><risdate>2011</risdate><volume>24</volume><issue>5</issue><spage>30</spage><epage>34</epage><pages>30-34</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>The main objective of this work is to develop data embedding technique that not only embeds secret message, in the form of binary bit stream, to the host image without any auxiliary information or location map, but also extracts that embedded secret message at decoder and restores the original content of host image, which are manipulated after the embedding at encoder. This technique carried out in two phases, embedding and extraction, using min-max approach. This technique reduces extra overhead to embed extra information other than secret message.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/2957-3908</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2011-01, Vol.24 (5), p.30-34
issn 0975-8887
0975-8887
language eng
recordid cdi_proquest_miscellaneous_907946876
source EZB-FREE-00999 freely available EZB journals
subjects Decoders
Encoders
Extraction
Messages
Position (location)
Streams
Two phase
title Information Hiding and Recovery using Reversible Embedding
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T18%3A12%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information%20Hiding%20and%20Recovery%20using%20Reversible%20Embedding&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Sonawane,%20A%20S&rft.date=2011-01-01&rft.volume=24&rft.issue=5&rft.spage=30&rft.epage=34&rft.pages=30-34&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/2957-3908&rft_dat=%3Cproquest_cross%3E2418489061%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=881371228&rft_id=info:pmid/&rfr_iscdi=true