Information Technology Reference
In-Depth Information
FIGURE 4.2
Subjective visual results for the stego-image “Mandrill” with the secret
image “Lena” showing the stego-image, the error stego-image, the retrieved secret image,
and the retrieved error secret image from the left to the right for each method. Row 1: (a)-
(d) using LSB, Row 2: (e)-(h) CLCES(
T
1
,
βs
1
).
By applying the proposed scaling scheme, an improvement in visual
images [21] can be seen. In the case of different
j
values in the scaling
factor using the same images “Mandrill” [12] as cover image and “Lena”
[12] as hide image, in Table (4.3), one can see when the
j
value increases
the performance results increase too.
TABLE 4.3
Performance results for different values of
j
with cover image “Mandrill” and
hidden image “Lena”
Proposed method
PSNR db
CC
NCD
Q
MAE
Cover image
31.5084
78.52
—
0.7836
10.4878
j
= 0
Recovered image
16.5327
38.80
0.4748
0.3586
4.9403
Cover image
31.4999
80.46
—
0.8040
9.9490
j
= 2
Recovered image
16.9537
38.89
0.4749
0.3587
4.9471
Cover image
36.1233
97.81
0.0020
0.9792
3.2086
j
= 5
Recovered image
27.2474
99.85
0.0020
0.9962
2.7714
Cover image
36.1233
99.08
8.015e-4
0.9913
2.0309
j
= 9
Recovered image
31.0781
99.80
0.0020
0.9962
2.7714
Cover image
36.1233
99.34
6.0486e-4
0.9934
1.7022
j
= 10
Recovered image
32.5167
99.55
0.0020
0.9962
2.7714
Search WWH ::
Custom Search