Javascript must be enabled to continue!
ACO Based Variable Least Significant Bits Data Hiding in Edges Using IDIBS Algorithm
View through CrossRef
This work presents a double asymmetric data hiding technique. The first asymmetry is created by hiding secret data in the complex region of the cover image and keep the smooth region unaffected. Then another asymmetry is developed by hiding a different number of secret bits in the various pixels of the complex region. The proposed technique uses the ant colony optimization (ACO) based technique for the classification of complex and smooth region pixels. Then, the variable least significant bits (VLSB) data hiding framework is used to hide secret bits in the complex region of the cover image. A distance-based substitution technique, namely increasing distance increasing bits substitution algorithm, is used to ensure the asymmetry in the number of hidden bits. The double asymmetric framework enhances the security of the hidden secret data and makes the retrieval of hidden information difficult for unauthorized users. The algorithm results in high-quality stego images, and the hidden information does not attract the human visual system (HVS).
Title: ACO Based Variable Least Significant Bits Data Hiding in Edges Using IDIBS Algorithm
Description:
This work presents a double asymmetric data hiding technique.
The first asymmetry is created by hiding secret data in the complex region of the cover image and keep the smooth region unaffected.
Then another asymmetry is developed by hiding a different number of secret bits in the various pixels of the complex region.
The proposed technique uses the ant colony optimization (ACO) based technique for the classification of complex and smooth region pixels.
Then, the variable least significant bits (VLSB) data hiding framework is used to hide secret bits in the complex region of the cover image.
A distance-based substitution technique, namely increasing distance increasing bits substitution algorithm, is used to ensure the asymmetry in the number of hidden bits.
The double asymmetric framework enhances the security of the hidden secret data and makes the retrieval of hidden information difficult for unauthorized users.
The algorithm results in high-quality stego images, and the hidden information does not attract the human visual system (HVS).
Related Results
Machine learning algorithms for 5G optical networks
Machine learning algorithms for 5G optical networks
(English) Throughout this thesis we addressed 5G network challenges. The non-coherent optical modulation
tradeoff has been addressed, as we proposed FBMC and artificial intelligen...
PPARγ Attenuates Cellular Senescence of Alveolar Macrophages in Asthma- COPD Overlap
PPARγ Attenuates Cellular Senescence of Alveolar Macrophages in Asthma- COPD Overlap
Abstract
Asthma-chronic obstructive pulmonary disease (COPD) overlap (ACO) represents a complex condition characterized by shared clinical and pathophysiological features o...
Pushing the Limits: One Bit, One Section South Iraq Deep Well Case Study
Pushing the Limits: One Bit, One Section South Iraq Deep Well Case Study
Abstract
Cost and operation effective selection of drilling Bits to drill the HPHT Wells sections in Block-09 field in one run with optimum parameters.
...
Computed tomographic attributes in asthma-chronic obstructive pulmonary disease overlap
Computed tomographic attributes in asthma-chronic obstructive pulmonary disease overlap
Abstract
Background
Limited number of studies analyzed imaging features in patients with asthma-COPD overlap (ACO). In patients with ACO, we eval...
Ant-Inspired Metaheuristic Algorithms for Combinatorial Optimization Problems in Water Resources Management
Ant-Inspired Metaheuristic Algorithms for Combinatorial Optimization Problems in Water Resources Management
Ant-inspired metaheuristic algorithms known as ant colony optimization (ACO) offer an approach that has the ability to solve complex problems in both discrete and continuous domain...
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
Abusive Supervision and Its Impact on Knowledge Hiding Behavior Among Sales Force
The purpose of this study is to test the relationship between abusive supervision and employee’s knowledge hiding behavior (evasive hiding, playing dumb, rationalized hiding) among...
Evaluating Behavioral Intervention Technologies: Integrating Human-Centered Design and Implementation Science Outcomes (Preprint)
Evaluating Behavioral Intervention Technologies: Integrating Human-Centered Design and Implementation Science Outcomes (Preprint)
BACKGROUND
Background: Behavioral intervention technologies (BITs) have been the tools for advanced health solutions by increasing access to cost-effective ...
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
Knowledge Hiding Behaviors and Team Creativity: The Contingent Role of Perceived Mastery Motivational Climate
The present study explains how different factors of knowledge hiding (e.g., evasive, playing dumb, and rationalized) influence on team creativity. Drawn on social exchange theory, ...

