Abstract

AbstractThe vast potential of information and communication technologies such as computer‐based communication networks and telecommunication systems is indeed blooming innovations. This paper is a novel attempt in the field of authorization and access control, which uses steganography that coverts the data into a form that cannot be interpreted by unauthorized persons. The proposed algorithm transfers compressed data and hides it into a cover medium by improvising existing run‐length technique in steganography. It deals with a compression technique that uses the redundancy feature of a bitstream and then uses this compressed stream to embed data in an image. The run‐length encoding technique is exploited to compress a bitstream being embedded in a cover image. However, run‐length encoding method has inefficient compression like the sharp bitstreams, such as the pattern “101010101”. This study developed a novel high‐capacity steganographic access control in data hiding to transform sharp bitstreams into smooth bitstreams before it is hidden into a cover image. Our scheme performs the logical Exclusive‐OR (XOR) operation to smoothen the secret bitstream and to embed the result into a cover medium. Additionally, the proposed scheme employs generalized difference expansion transform for image recovery after data extraction; consequently, the image fidelity can be preserved. The experimental results show that our scheme owns a higher embedding capacity than previous approaches while maintaining high image quality. Copyright © 2011 John Wiley & Sons, Ltd.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.