Cryptography Reference
In-Depth Information
Fig. 5.6. Flowchart of the cluster ordering-and-mapping technique.
3. The color c RID is an embeddable pixel.
The image data X(i, j) of the nearest color is used for the modification.
Let D om denote the hiding capacity of the cluster ordering-and-mapping
technique. The formula for calculating D om is,
h
w
D om =
f (c X(i,j) )
,
if
f (c X(i,j) )
=1.
(5.7)
i=1
j=1
Here
is the size of the cluster to which the color c X(i,j) belongs.
An example of the cluster ordering-and-mapping technique is shown in
Fig. 5.7. Assume the cover image I with the image dataX 1,1 ,X 1,2 ,,X 4,4
f (c X(i,j) )
is as shown in Fig. 5.7(a). We have six clusters that are shown in Fig. 5.7(b).
Let A = (1011011) 2
be the secret data.
Search WWH ::




Custom Search