In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit i...
详细信息
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit is embedded using Difference Expansion (DE). We consider two consecutive pixels from cover image, calculate the difference between them andthen embed n-1 bits secret message by modifying the pixel pair. Again, we consider that modified pixel pair to embed 1 bit secret message using embedding function. After that, we distribute these two stego pixel pairs among dual image depending on a shared secret key bit stream. At the receiver end, we extract the secret message successfully and recover original cover image from dual stego image without any distortion. Finally, we compare our scheme with other state-of-the-art methods and obtain reasonably better performance in terms of data embedding capacity.
Recently, the inclusion of a credit period policy becomes a beneficial strategy to improve a transportation business from the point of views of source and destination. In this regard, this study addresses a two-staged...
详细信息
This article deals with the bi-objective manufacturing inventory problems. We know that the present world economy is very much competitive and nobody leaves a pace to the other company for their profit-seeking enterpr...
详细信息
This paper presents a one machine multiple-product problem with bounded production rate to minimize the total linear cost of inventory under imprecise space constraint. The demand is dependent on time and known. Also ...
详细信息
This study characterized the double-averaged (time and space) turbulence parameters and local flow distributions through the experimental measurement over fully submerged artificially made hemispherical rough bed. Thr...
详细信息
In this paper, the concept of quasi-coincidence of a bipolar fuzzy point within a bipolar fuzzy set is introduced. The notion of (∈,∈∨q)-bipolar fuzzy subalgebras and ideals of BCK/BCI-algebras are introduced and t...
详细信息
L(0, 1)-labelling of a graph G= (V, E) is a function f from the vertex set V(G) to the set of non-negative integers such that adjacent vertices get number zero apart, and vertices at distance two get distinct num...
详细信息
With the worldwide transport infrastructural development, there are several connecting roads between the cities for transportation. Some of these roads are smooth, and some are very rough, which invites some risks dur...
详细信息
This study deals with a supplier-retailer supply chain system for perishable goods under fuzzy lead-time and fully backlogged shortages. In this proposed model, a supplier collects the deteriorating goods and fulfills...
详细信息
L(0,1)-labelling of a graph G=(V,E) is a function f from the vertex set V(G) to the set of non-negative integers such that adjacent vertices get number zero apart, and vertices at distance two get distinct numbers. Th...
详细信息
暂无评论