CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Binary tree approach for data hiding based on histogram modification

by K.Prasada Rao, B.A.David, P.D.Ratna Raju
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 2
Year of Publication: 2010
Authors: K.Prasada Rao, B.A.David, P.D.Ratna Raju
10.5120/891-1265

K.Prasada Rao, B.A.David, P.D.Ratna Raju . Binary tree approach for data hiding based on histogram modification. International Journal of Computer Applications. 5, 2 ( August 2010), 21-24. DOI=10.5120/891-1265

@article{ 10.5120/891-1265,
author = { K.Prasada Rao, B.A.David, P.D.Ratna Raju },
title = { Binary tree approach for data hiding based on histogram modification },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 2 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number2/891-1265/ },
doi = { 10.5120/891-1265 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:53:12.132585+05:30
%A K.Prasada Rao
%A B.A.David
%A P.D.Ratna Raju
%T Binary tree approach for data hiding based on histogram modification
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 2
%P 21-24
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a new approach for data hiding scheme for the secure digital data transmission. Here we present the modification to histogram by considering the differences of the pixels which can be used for increasing data hiding capacity. We also show-off how different images affect the performance of this proposed method.

References
  1. Lossless Generalized LSB data embedding by M.U celik IEEE-2005
  2. Hiding data in images by simple LSB substitution by Chi kwong chan ,L.M cheng
  3. Expansion Embedding techniques for reversible watermarking by Diljith M.thodi and Jefferey J IEEE 2007
  4. Lossless Data embedding for all image formats by Jessica Fedrich ,M.Goljan in SPIE security watermarking multimedia contents IV san Jose CA vol 4675
  5. Data Hiding fundamentals in image and video Part I by Min Mu,Bede Liu IEEE 2003
  6. Reversible Data embedding using a difference expansion J.Tian IEEE-2003 vol 13 No 8
  7. Reversible watermarking using modified difference expansion method by Md.K.Yakub ,ahmed Al Jaber vol 4 No.3 Internal journal of computing and information sciences
  8. Lossless data embedding with file size preservation by Jessica Fedrich, M.Goljan,Qing chen
  9. wavelet based reversible watermarking for authentication by J.Tian
  10. Reversible image authentication based on watermarking by sang kwang lee ,Young Ho suh and Yo sung ho IEEE-06-2006
Index Terms

Computer Science
Information Sciences

Keywords

watermarking authentication Histogram Binary tree