Pub. online:22 Jun 2020Type:Research ArticleOpen Access
Journal:Informatica
Volume 32, Issue 1 (2021), pp. 69–84
Abstract
Clinics and hospitals have already adopted more technological resources to provide a faster and more precise diagnostic for patients, health care providers, and institutes of medicine. Security issues get more and more important in medical services via communication resources such as Wireless-Fidelity (Wi-Fi), third generation of mobile telecommunications technology (3G), and other mobile devices to connect medical systems from anywhere. Furthermore, cloud-based medical systems allow users to access archived medical images from anywhere. In order to protect medical images, lossless data hiding methods are efficient and easy techniques. In this paper, we present a data hiding of two-tier medical images based on histogram shifting of prediction errors. The median histogram shifting technique and prediction error schemes as the two-tier hiding have high capacity and PSNR in 16-bit medical images.
Journal:Informatica
Volume 25, Issue 4 (2014), pp. 523–540
Abstract
Abstract
Reversible data hiding is a method that can guarantee that the cover image can be reconstructed correctly after the secret message has been extracted. Recently, some reversible data hiding schemes have concentrated on the VQ compression domain. In this paper, we present a new reversible data hiding scheme based on VQ and SMVQ techniques to enhance embedding capacity and compression rate. Experimental results show that our proposed scheme achieves higher embedding capacity and smaller average compression rate than some previous methods. Moreover, our proposed scheme maintains the high level of visual quality of the reconstructed image.
Journal:Informatica
Volume 18, Issue 4 (2007), pp. 615–628
Abstract
This paper proposes a reversible data hiding method for error diffused halftone images. It employs statistics feature of pixel block patterns to embed data, and utilizes the HVS characteristics to reduce the introduced visual distortion. The watermarked halftone image can be perfectly recovered if it is intact, only a secret key is required. The method is suitable for the applications where the content accuracy of the original halftone image must be guaranteed, and it is easily extended to the field of halftone image authentication.