SlideShare a Scribd company logo
1 of 21
ENHANCING IMAGE-BASED DATA HIDING METHOD USING
REDUCED DIFFERENCE EXPANSION AND INTEGER
TRANSFORM SCHEME
By Maurice Ntahobari
NRP: 5116201702
INSTUTUT TEKNOLOGI SEPULUH NOPEMBER SURABAYA
DEPARTMENT OF INFORMATICS
MASTERS IN NET CENTRIC COMPUTING
Background
In this generation of information technology, files
or information sharing between users in remote
have been needs for everyone, anytime and
anywhere.
 Public network that is normally used for such
communication is however unsecure.
The end to end communication must be secured
to maintain integrity and confidentiality
Data protection method.
Cryptography
Steganography
Watermarking
Data hiding
Cryptography
Secret key encryption Public key encryption
Shared secret key
The same key is used for
both encrypt and decrypt
message
Encrypt DecryptSender Receiver
CiphertextPlaintext
Plaintext
Public Key
Public Key
Key repository
Bob Alice
Data hiding processes
Image data hiding
Spatial domain data
hiding
Frequency domain
data hiding
Spatial domain datahiding
LSB
modification
Compression
based RDH
Histogram
shifting
Difference
Expansion
hiding
Pixel value
difference
Prediction error
expansion
Transformdomain
DCT DWT IWT
Challenges in data hiding
based method
The previous data hiding method based on
reduced difference expansion suffer to two main
problems.
Low visual quality
2 challenges
Low embedding capacity
Related work
Difference expansion (Tian)
Reduced difference expansion (Liu)
Improved reduced difference expansion (Yi)
Difference expansion of quads (Alattar)
An improved quad and RDE based medical data
hiding method (Ahmad et al)
Integer transform scheme
P0 P1
P2 P3
P0
P1
P2
New proposed method
1. Integer transform scheme to compute the
difference between two pixels.
P0 P1
P2 P3
New proposed method
2. Reduced difference expansion to reduced
difference before embedding process
New proposed method
3. Secret Data Embedding
- Expandable pixel block - Changeable pixel
block
New proposed method
4. The new pixel construction
New proposed method
3. Tools and dataset
 Medical and common images
Secret message of different size(5kb,10kb,20kb)
Mathlab programming language
The results for 5kb embedded
in medical images
Medical images PSNR Value for
Previous method in
(Ahmad, Holil,
Wibisono, & Ijtihadie,
2013)
PSNR value for the
proposed method
Abdominal
Leg
Head
Hand
Chest
Average
37.6805
38.0537
31.9050
37.5609
38.0634
36.6527
38.717
39.135
33.046
38.131
39.686
37.743
The results for 10 kb
embedded in medical images
Medical images PSNR Value for Previous
method in (Ahmad, Holil,
Wibisono, & Ijtihadie,
2013)
PSNR value for the
proposed method
Abdominal
Leg
Head
Hand
Chest
Average
37.6781
38.0088
31.9048
37.5563
38.0617
36.6419
38.715
39.137
33.054
38.130
39.685
37.744
The results for 20 Kb
embedded in medical images
Medical images PSNR Value for Previous
method in (Ahmad, Holil,
Wibisono, & Ijtihadie,
2013)
PSNR value for the
proposed method
Abdominal
Leg
Head
Hand
Chest
Average
37.6805
38.0537
31.9050
37.5609
38.0634
36.6527
38.717
39.135
33.046
38.131
39.6861
37.743
Performance comparison
Lena image Chest image
26
27
28
29
30
31
32
33
5 10 20
ThePSNRvaluesindB
Embedding capacity in kilobyte (kb)
Proposed
method
Previous
method
(Ahmad,
Holil,
Wibisono,
&
Ijtihadie,
2013) 35
36
37
38
39
40
41
42
43
5 10 20
ThePSNRvaluesindecibel(dB)
Embedding capacity in kilobyte (kb)
Proposed
method
Previous
method
(Ahmad,
Holil,
Wibisono,
& Ijtihadie,
2013)
Average performance for all medical
Images on different size of secret
messages
35
36
37
38
39
40
41
5 10 20
AveragePSNRvaluesindecibel(dB)
Embedding capacity in kilobyte (kb)
Proposed
method
Previous method
(Ahmad, Holil,
Wibisono, &
Ijtihadie, 2013)
Conclusion
1. The visual quality is improved for almost all
images and the performance depends on the
amount of secret data hidden in a specific
image.
2.The visual quality decreases as long as the
embedding capacity increases and the quality of
stego image is directly proportional to the
payload capacity where increasing one entity
decreases another and verse versa.
3. The performance of a data hiding algorithm
depends on the cover image(intensity) used in
embedding process.
Thank you very much !!!!!
We love your questions and
comments

More Related Content

What's hot

What's hot (19)

Multivariate feature descriptor based cbir model to query large image databases
Multivariate feature descriptor based cbir model to query large image databasesMultivariate feature descriptor based cbir model to query large image databases
Multivariate feature descriptor based cbir model to query large image databases
 
A comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hidingA comparative case study on the various techniques of reversible data hiding
A comparative case study on the various techniques of reversible data hiding
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
 
Image Processing as a Part of Big Data Initiatives
Image Processing as a Part of Big Data InitiativesImage Processing as a Part of Big Data Initiatives
Image Processing as a Part of Big Data Initiatives
 
50120130405017 2
50120130405017 250120130405017 2
50120130405017 2
 
A010520107
A010520107A010520107
A010520107
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography Techniques
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...Lossless and reversible data hiding in encrypted images with public key crypt...
Lossless and reversible data hiding in encrypted images with public key crypt...
 
C010511420
C010511420C010511420
C010511420
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Steganography
Steganography Steganography
Steganography
 
Ieee projects 2012 2013 - Datamining
Ieee projects 2012 2013 - DataminingIeee projects 2012 2013 - Datamining
Ieee projects 2012 2013 - Datamining
 
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 

Similar to Enhancing image based data hiding method using reduced difference expansion and integer transform scheme

Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
CSCJournals
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
CSCJournals
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
TELKOMNIKA JOURNAL
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
IJCNCJournal
 

Similar to Enhancing image based data hiding method using reduced difference expansion and integer transform scheme (20)

Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachTowards A More Secure Web Based Tele Radiology System: A Steganographic Approach
Towards A More Secure Web Based Tele Radiology System: A Steganographic Approach
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...Hiding algorithm based fused images and Caesar cipher with intelligent securi...
Hiding algorithm based fused images and Caesar cipher with intelligent securi...
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...Lightweight digital imaging and communications in medicine image encryption f...
Lightweight digital imaging and communications in medicine image encryption f...
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
P017329498
P017329498P017329498
P017329498
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Applying Information Security to Healthcare Services
Applying Information Security to Healthcare ServicesApplying Information Security to Healthcare Services
Applying Information Security to Healthcare Services
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
98462-234458-1-PB
98462-234458-1-PB98462-234458-1-PB
98462-234458-1-PB
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Enhancing image based data hiding method using reduced difference expansion and integer transform scheme

  • 1. ENHANCING IMAGE-BASED DATA HIDING METHOD USING REDUCED DIFFERENCE EXPANSION AND INTEGER TRANSFORM SCHEME By Maurice Ntahobari NRP: 5116201702 INSTUTUT TEKNOLOGI SEPULUH NOPEMBER SURABAYA DEPARTMENT OF INFORMATICS MASTERS IN NET CENTRIC COMPUTING
  • 2. Background In this generation of information technology, files or information sharing between users in remote have been needs for everyone, anytime and anywhere.  Public network that is normally used for such communication is however unsecure. The end to end communication must be secured to maintain integrity and confidentiality
  • 4. Cryptography Secret key encryption Public key encryption Shared secret key The same key is used for both encrypt and decrypt message Encrypt DecryptSender Receiver CiphertextPlaintext Plaintext Public Key Public Key Key repository Bob Alice
  • 6. Image data hiding Spatial domain data hiding Frequency domain data hiding Spatial domain datahiding LSB modification Compression based RDH Histogram shifting Difference Expansion hiding Pixel value difference Prediction error expansion Transformdomain DCT DWT IWT
  • 7. Challenges in data hiding based method The previous data hiding method based on reduced difference expansion suffer to two main problems. Low visual quality 2 challenges Low embedding capacity
  • 8. Related work Difference expansion (Tian) Reduced difference expansion (Liu) Improved reduced difference expansion (Yi) Difference expansion of quads (Alattar) An improved quad and RDE based medical data hiding method (Ahmad et al)
  • 9. Integer transform scheme P0 P1 P2 P3 P0 P1 P2
  • 10. New proposed method 1. Integer transform scheme to compute the difference between two pixels. P0 P1 P2 P3
  • 11. New proposed method 2. Reduced difference expansion to reduced difference before embedding process
  • 12. New proposed method 3. Secret Data Embedding - Expandable pixel block - Changeable pixel block
  • 13. New proposed method 4. The new pixel construction
  • 14. New proposed method 3. Tools and dataset  Medical and common images Secret message of different size(5kb,10kb,20kb) Mathlab programming language
  • 15. The results for 5kb embedded in medical images Medical images PSNR Value for Previous method in (Ahmad, Holil, Wibisono, & Ijtihadie, 2013) PSNR value for the proposed method Abdominal Leg Head Hand Chest Average 37.6805 38.0537 31.9050 37.5609 38.0634 36.6527 38.717 39.135 33.046 38.131 39.686 37.743
  • 16. The results for 10 kb embedded in medical images Medical images PSNR Value for Previous method in (Ahmad, Holil, Wibisono, & Ijtihadie, 2013) PSNR value for the proposed method Abdominal Leg Head Hand Chest Average 37.6781 38.0088 31.9048 37.5563 38.0617 36.6419 38.715 39.137 33.054 38.130 39.685 37.744
  • 17. The results for 20 Kb embedded in medical images Medical images PSNR Value for Previous method in (Ahmad, Holil, Wibisono, & Ijtihadie, 2013) PSNR value for the proposed method Abdominal Leg Head Hand Chest Average 37.6805 38.0537 31.9050 37.5609 38.0634 36.6527 38.717 39.135 33.046 38.131 39.6861 37.743
  • 18. Performance comparison Lena image Chest image 26 27 28 29 30 31 32 33 5 10 20 ThePSNRvaluesindB Embedding capacity in kilobyte (kb) Proposed method Previous method (Ahmad, Holil, Wibisono, & Ijtihadie, 2013) 35 36 37 38 39 40 41 42 43 5 10 20 ThePSNRvaluesindecibel(dB) Embedding capacity in kilobyte (kb) Proposed method Previous method (Ahmad, Holil, Wibisono, & Ijtihadie, 2013)
  • 19. Average performance for all medical Images on different size of secret messages 35 36 37 38 39 40 41 5 10 20 AveragePSNRvaluesindecibel(dB) Embedding capacity in kilobyte (kb) Proposed method Previous method (Ahmad, Holil, Wibisono, & Ijtihadie, 2013)
  • 20. Conclusion 1. The visual quality is improved for almost all images and the performance depends on the amount of secret data hidden in a specific image. 2.The visual quality decreases as long as the embedding capacity increases and the quality of stego image is directly proportional to the payload capacity where increasing one entity decreases another and verse versa. 3. The performance of a data hiding algorithm depends on the cover image(intensity) used in embedding process.
  • 21. Thank you very much !!!!! We love your questions and comments