A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Special Issue: Real-Time Data Hiding and Visual Cryptography
2018
Journal of Real-Time Image Processing
It includes fast schemes and hardware implementations, as well as software/hardware co-design based on DH/RDH and VCS. The call for papers resulted in 29 submissions. ...
Recent research on RDH has been focused on encrypted domains. Another topic of this special issue is visual cryptography scheme (VCS). ...
[9] , a lossless DH for absolute moment block truncation coding (AMBTC) images, which is very sensitive to change small pixels. ...
doi:10.1007/s11554-018-0749-0
fatcat:shtiyxfrqrbmrgrqp4sllzcmva
Новый алгоритм нанесения цифровых водяных знаков для аутентификации изображений с помощью метода векторного квантования
2017
Izvestiâ vyssih ucenyh zavedenij. Radioèlektronika
На втором этапе, с помощью модифицированного метода индексного ключа MIKB (modified index key based) встраивается полухрупкий водяной знак. ...
A novel hybrid image authentication scheme
based on absolute moment block truncation coding.
Multimedia Tools and Applications. -2015. -P. 21-26.
-DOI : 10.1007/s11042-015-3059-6.
8. ...
Digital image watermarking technique based on vector quantisation. Electron. Lett. ...
doi:10.20535/s0021347017040021
fatcat:bg66vdbbyjcdnphlbqagihxvym
Reversible Data Hiding Scheme for BTC-compressed Images Based on Histogram Shifting
2014
International Journal of Security and Its Applications
In this paper, we proposed a novel reversible data hiding scheme for the compressed images for block truncation coding (BTC). ...
In this scheme, the secret data is embedded into the compressed codes of BTC. ...
Review on Absolute Moment Block Truncation Coding The block truncation coding (BTC) scheme [16] [17] [18] [19] [20] [21] [22] [23] is a commonly used image coding method for digital images. ...
doi:10.14257/ijsia.2014.8.2.31
fatcat:ssrxcmiqpzan5h476oknrf4lta
In this paper, a novel image steganography is proposed, based on adaptive neural networks with recycling the Improved Absolute Moment Block Truncation Coding algorithm, and by employing the enhanced five ...
, based on adaptive neural networks with recycling the Improved Absolute Moment Block Truncation Coding algorithm, and by employing the enhanced five edge detection operators with an optimal target of ...
doi:10.22214/ijraset.2018.5446
fatcat:rnktyf6ipnfh3nehbhxftncej4
Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications
2017
Multimedia tools and applications
In Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification (10.1007/s11042-016-4049-z). ...
One such effort that has been attracting interest is based on digital watermarking techniques, which is a technique for embedding data (called a watermark) into digital multimedia cover objects in such ...
Hong et al. present a data hiding technique for absolute moment block truncation coding (AMBTC) compressed image using quantization level modification. ...
doi:10.1007/s11042-017-4507-2
fatcat:cymtubngl5eiljunlbwupt22qi
Detection and Recovery of Higher Tampered Images using Novel Feature and Compression Strategy
2021
IEEE Access
These recent methods [15] of compression such as BTC, OIBTC, or Absolute Moment Block Truncation Coding (AMBTC) [9] [38] use two values for a block then generate a bit map based on those values ...
To solve the problem, a new hybrid compression scheme is introduced in this paper, which is based on various blocksizes, where we have encoded a sub-set of the original pixel intensities, and some derived ...
doi:10.1109/access.2021.3072314
fatcat:pq2muxlf5nfsngsdc4j4bwricu
High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images
2019
Symmetry
In this paper, a high-precision image authentication scheme for absolute moment block truncation coding (AMBTC)-compressed images is presented. ...
For each block, two sub-bitmaps are conducted using the symmetrical separation, and the six-bit authentication code is symmetrically assigned to two sub-codes, which is virtually embedded into sub-bitmaps ...
[28] proposed a novel image authentication scheme to verify the integrity of the AMBTC-compressed image. ...
doi:10.3390/sym11080996
fatcat:3qqbuketirar5pbichtxxuinqm
Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy
2019
Sensors
In order to respond to both needs, we present a novel data hiding scheme for image compression with Absolute Moment Block Truncation Coding (AMBTC). ...
Between these two embedding phases, a halftoning scheme called direct binary search is integrated to efficiently improve the image quality without changing the fixed parameters. ...
Illustration of the Absolute Moment Block Truncation Coding (AMBTC) compression. ...
doi:10.3390/s19091974
fatcat:5v4py253cjcytdpxr2yz7w4pcu
Survey on Reversible Watermarking Techniques of Echocardiography
2021
Security and Communication Networks
Mostly, fragile methods are developed on the error-expansion techniques built on histogram shifting-based approach. In this study, several RW methods are compared and the results are presented. ...
The current study focuses on the application of RW in echocardiography data. Mostly, RW is applied to protect patient data without affecting the quality of the decoded image. ...
Bhardwaj and Aggarwal [21] proposed an encrypted RDH algorithm based on hierarchal absolute moment block truncation coding. ...
doi:10.1155/2021/8820082
fatcat:dhtsnv3najdotk2jye5pix6odm
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA
[article]
2018
arXiv
pre-print
A special parameter estimation technique based on genetic algorithm is performed to improve and optimize the quality of digests and watermarked image. ...
In this paper, an efficient fragile blind quad watermarking scheme for image tamper detection and recovery based on lifting wavelet transform and genetic algorithm is proposed. ...
The authors of
age authentication scheme based on absolute moment block scheme [17], proposed image tamper detection scheme based
truncation coding was proposed. ...
arXiv:1803.02623v1
fatcat:jjytcktbzvfnlkt4co2k6b45ki
Advanced Watermarking o f Digital Images Showing Robust, Semi Fragile a nd Fragile Behaviour
2021
International journal of recent technology and engineering
Digital Image Watermarking plays an important role when it comes to maintaining digital color picture authentication information. ...
The proposed paper consists mainly of a digital watermarking scheme consisting of discrete wavelet transformation and involving the generation of pn sequence number to embed the watermark and also to extract ...
The scheme includes an absolute moment block truncation coding image used as an watermark, in which case the image was a compressed version of the original cover image and also contained the content features ...
doi:10.35940/ijrte.d6612.1110421
fatcat:anxsfqztdng63elqnvdrd5w2mu
Efficient Data Hiding Based on Block Truncation Coding Using Pixel Pair Matching Technique
2018
Symmetry
In this paper, an efficient data hiding method that embeds data into absolute moment block truncation coding (AMBTC) codes is proposed. ...
If the block is complex, a lossless embedding method is performed to carry one additional bit. ...
(in dB) of the absolute moment block truncation coding (AMBTC) compressed images. ...
doi:10.3390/sym10020036
fatcat:lh52ziolnfflhovv7fd7ros2mu
Digital steganography and watermarking for digital images: a review of current research directions
2020
IEEE Access
This review is not exhaustive; it focuses on contemporary works illustrating current research directions in the field of information embedding in digital images. ...
The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. ...
This scheme is based on Gray code and absolute moment block truncation coding compression. In [62] , the main focus is on ensuring high embedding capacity. ...
doi:10.1109/access.2020.3022779
fatcat:dgmubtjr75alpmlkdewpvd5scq
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
2013
IOSR Journal of Computer Engineering
We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism. ...
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. ...
This scheme is highly effective for compressing images that have good regularity and self-similarity.
Block truncation coding In this, the image is divided into non overlapping blocks of pixels. ...
doi:10.9790/0661-1320107
fatcat:rdpsdcqelbbzvkg5rm4og4tzba
Welcome Messages
2019
2019 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)
Abstract-Halftone based block truncation coding images (H-BTC) are the improved version of BTC images which can offer superior representation and enhanced image quality. ...
This paper proposes a novel power allocation scheme for MU-MIMO systems, which minimizes the variance of channel capacities of each spatial stream of all users to achieve user fairness in terms of video ...
To this end, a novel routing scheme based on vision-based sensor localization, namely, imageassisted routing (IAR), is proposed. ...
doi:10.1109/ispacs48206.2019.8986291
fatcat:gu4zaxsqkncp5n2ebj5fybk7ce
« Previous
Showing results 1 — 15 out of 770 results