We have proposed two data hiding methods based on the RLM encoding. All of the proposed method used the length of the location, which compared the run length of the cover data and that of the secret data. The RLM method used the run length table constructed from the cover and secret data, whereas the RRLM method used the difference value of the cover and secret data before making the run length encoding table. Our experimental results have shown that the proposed methods provided a better way to hide secret data compared with four other methods.
International Journal of Intelligent Information and Database Systems, Vol. 3, No. 3, 2009, pp.311–325 (SCOPUS)