Information Technology Reference
In-Depth Information
FIGURE 4.2 Subjective visual results for the stego-image “Mandrill” with the secret
image “Lena” showing the stego-image, the error stego-image, the retrieved secret image,
and the retrieved error secret image from the left to the right for each method. Row 1: (a)-
(d) using LSB, Row 2: (e)-(h) CLCES( T 1 , βs 1 ).
By applying the proposed scaling scheme, an improvement in visual
images [21] can be seen. In the case of different j values in the scaling
factor using the same images “Mandrill” [12] as cover image and “Lena”
[12] as hide image, in Table (4.3), one can see when the j value increases
the performance results increase too.
TABLE 4.3 Performance results for different values of j with cover image “Mandrill” and
hidden image “Lena”
Proposed method
PSNR db
CC
NCD
Q
MAE
Cover image
31.5084
78.52
0.7836
10.4878
j = 0
Recovered image
16.5327
38.80
0.4748
0.3586
4.9403
Cover image
31.4999
80.46
0.8040
9.9490
j = 2
Recovered image
16.9537
38.89
0.4749
0.3587
4.9471
Cover image
36.1233
97.81
0.0020
0.9792
3.2086
j = 5
Recovered image
27.2474
99.85
0.0020
0.9962
2.7714
Cover image
36.1233
99.08
8.015e-4
0.9913
2.0309
j = 9
Recovered image
31.0781
99.80
0.0020
0.9962
2.7714
Cover image
36.1233
99.34
6.0486e-4
0.9934
1.7022
j = 10
Recovered image
32.5167
99.55
0.0020
0.9962
2.7714
 
Search WWH ::




Custom Search