Open Access Open Access  Restricted Access Subscription or Fee Access

Information Hiding Using Temporally Brightness Modulated Pattern

Dr. K. Kalaiselvi, S. Kamaleshwar Rao, V. Prashanth, P. Nivas, T. Karthikeyan


A new display system technology that may hide secret data behind a displayed image, whereas at the same time satisfying each high physical property and readability needs. The hidden data may be a reasonably binary image as well as characters, and varied varieties of patterns, i.e., Quadratic Residue (QR) codes. This system uses a temporally bright modulated invisible pattern in an exceedingly moving image, or video. Frame pictures over some period’s area unit summed up once scan out, enhancing the distinction of the invisible pattern to create it visible. We have a tendency to conjointly propose a replacement technique to unravel a problem that happens thanks to asynchronous operations of the show and video camera that may be a technique that was achieved by mistreatment time shift sampling. The hidden binary image scans out per experiments that we conducted to substantiate the results. Moreover, the patterns employed in this system were in spades invisible once arranged behind the most pictures, that steered the planned technology was extremely possible in sensible applications per this confirmation. At the decoder facet, a robust two-class SVM classifier is meant to tell apart encrypted and unencrypted image patches, permitting North American country to put together rewrite the embedded message and therefore the original image signal. Compared with the progressive ways, the planned approach provides higher embedding capability and is ready to dead reconstruct the first image likewise because the embedded message.


Quadratic Residue (QR) Codes, Bright Modulated Invisible Pattern

Full Text:



M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005.

M. U. Celik, G. Sharma, and A. M. Tekalp, “Lossless watermarking for image authentication: A new framework and an implementation,” IEEE Trans. Image Process., vol. 15, no. 4, pp. 1042–1049, Apr. 2006.

Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.

X. Li, W. Zhang, X. Gui, and B. Yang, “A novel reversible data hiding scheme based on two-dimensional difference-histogram modification,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 7, pp. 1091–1100, Jul. 2013.

C. Qin, C.-C. Chang, Y.-H. Huang, and L.-T. Liao, “An inpaintingassisted reversible steganographic scheme using a histogram shifting mechanism,” IEEE Trans. Circuits Syst. Video Technol., vol. 23, no. 7, pp. 1109–1118, Jul. 2013.

W.-L. Tai, C.-M. Yeh, and C.-C. Chang, “Reversible data hiding based on histogram modification of pixel differences,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906–910, Jun. 2009.

J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.

Y. Hu, H.-K. Lee, and J. Li, “DE-based reversible data hiding with improved overflow location map,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 2, pp. 250–260, Feb. 2009. ZHOU et al.: SECURE RIDH OVER ENCRYPTED DOMAIN VIA KEY MODULATION 451

X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.

X. Zhang, “Reversible data hiding with optimal value transfer,” IEEE Trans. Multimedia, vol. 15, no. 2, pp. 316–325, Feb. 2013.657–665.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.