Filters








770 Hits in 5.9 sec

Special Issue: Real-Time Data Hiding and Visual Cryptography

C. Kim, C. C. Chang, C. N. Yang, X. Zhang, J. Baek
2018 Journal of Real-Time Image Processing  
It includes fast schemes and hardware implementations, as well as software/hardware co-design based on DH/RDH and VCS. The call for papers resulted in 29 submissions.  ...  Recent research on RDH has been focused on encrypted domains. Another topic of this special issue is visual cryptography scheme (VCS).  ...  [9] , a lossless DH for absolute moment block truncation coding (AMBTC) images, which is very sensitive to change small pixels.  ... 
doi:10.1007/s11554-018-0749-0 fatcat:shtiyxfrqrbmrgrqp4sllzcmva

Новый алгоритм нанесения цифровых водяных знаков для аутентификации изображений с помощью метода векторного квантования

Арчана Тивари, Маниша Шарма
2017 Izvestiâ vyssih ucenyh zavedenij. Radioèlektronika  
На втором этапе, с помощью модифицированного метода индексного ключа MIKB (modified index key based) встраивается полухрупкий водяной знак.  ...  A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimedia Tools and Applications. -2015. -P. 21-26. -DOI : 10.1007/s11042-015-3059-6. 8.  ...  Digital image watermarking technique based on vector quantisation. Electron. Lett.  ... 
doi:10.20535/s0021347017040021 fatcat:bg66vdbbyjcdnphlbqagihxvym

Reversible Data Hiding Scheme for BTC-compressed Images Based on Histogram Shifting

Chun-Chi Lo, Yu-Chen Hu, Wu-Lin Chen, Chang-Ming Wu
2014 International Journal of Security and Its Applications  
In this paper, we proposed a novel reversible data hiding scheme for the compressed images for block truncation coding (BTC).  ...  In this scheme, the secret data is embedded into the compressed codes of BTC.  ...  Review on Absolute Moment Block Truncation Coding The block truncation coding (BTC) scheme [16] [17] [18] [19] [20] [21] [22] [23] is a commonly used image coding method for digital images.  ... 
doi:10.14257/ijsia.2014.8.2.31 fatcat:ssrxcmiqpzan5h476oknrf4lta

Smart Pix

Anishma. T. S
2018 International Journal for Research in Applied Science and Engineering Technology  
In this paper, a novel image steganography is proposed, based on adaptive neural networks with recycling the Improved Absolute Moment Block Truncation Coding algorithm, and by employing the enhanced five  ...  , based on adaptive neural networks with recycling the Improved Absolute Moment Block Truncation Coding algorithm, and by employing the enhanced five edge detection operators with an optimal target of  ... 
doi:10.22214/ijraset.2018.5446 fatcat:rnktyf6ipnfh3nehbhxftncej4

Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications

Amit Kumar Singh, Basant Kumar, Sanjay Kumar Singh, Mayank Dave, Vivek Kumar Singh, Pardeep Kumar, S. P. Ghrera, Pradeep Kumar Gupta, Anand Mohan
2017 Multimedia tools and applications  
In Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification (10.1007/s11042-016-4049-z).  ...  One such effort that has been attracting interest is based on digital watermarking techniques, which is a technique for embedding data (called a watermark) into digital multimedia cover objects in such  ...  Hong et al. present a data hiding technique for absolute moment block truncation coding (AMBTC) compressed image using quantization level modification.  ... 
doi:10.1007/s11042-017-4507-2 fatcat:cymtubngl5eiljunlbwupt22qi

Detection and Recovery of Higher Tampered Images using Novel Feature and Compression Strategy

Faranak Tohidi, Manoranjan Paul, Mohammad Reza Hooshmandasl
2021 IEEE Access  
These recent methods [15] of compression such as BTC, OIBTC, or Absolute Moment Block Truncation Coding (AMBTC) [9] [38] use two values for a block then generate a bit map based on those values  ...  To solve the problem, a new hybrid compression scheme is introduced in this paper, which is based on various blocksizes, where we have encoded a sub-set of the original pixel intensities, and some derived  ... 
doi:10.1109/access.2021.3072314 fatcat:pq2muxlf5nfsngsdc4j4bwricu

High-Precision Authentication Scheme Based on Matrix Encoding for AMBTC-Compressed Images

Su, Chang, Lin
2019 Symmetry  
In this paper, a high-precision image authentication scheme for absolute moment block truncation coding (AMBTC)-compressed images is presented.  ...  For each block, two sub-bitmaps are conducted using the symmetrical separation, and the six-bit authentication code is symmetrically assigned to two sub-codes, which is virtually embedded into sub-bitmaps  ...  [28] proposed a novel image authentication scheme to verify the integrity of the AMBTC-compressed image.  ... 
doi:10.3390/sym11080996 fatcat:3qqbuketirar5pbichtxxuinqm

Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy

Yu-Hsiu Lin, Chih-Hsien Hsia, Bo-Yan Chen, Yung-Yao Chen
2019 Sensors  
In order to respond to both needs, we present a novel data hiding scheme for image compression with Absolute Moment Block Truncation Coding (AMBTC).  ...  Between these two embedding phases, a halftoning scheme called direct binary search is integrated to efficiently improve the image quality without changing the fixed parameters.  ...  Illustration of the Absolute Moment Block Truncation Coding (AMBTC) compression.  ... 
doi:10.3390/s19091974 fatcat:5v4py253cjcytdpxr2yz7w4pcu

Survey on Reversible Watermarking Techniques of Echocardiography

Rabiya Ghafoor, Danish Saleem, Sajjad Shaukat Jamal, M. Ishtiaq, Sadaf Ejaz, Arif Jamal Malik, M. Fahad Khan, Emanuele Maiorana
2021 Security and Communication Networks  
Mostly, fragile methods are developed on the error-expansion techniques built on histogram shifting-based approach. In this study, several RW methods are compared and the results are presented.  ...  The current study focuses on the application of RW in echocardiography data. Mostly, RW is applied to protect patient data without affecting the quality of the decoded image.  ...  Bhardwaj and Aggarwal [21] proposed an encrypted RDH algorithm based on hierarchal absolute moment block truncation coding.  ... 
doi:10.1155/2021/8820082 fatcat:dhtsnv3najdotk2jye5pix6odm

TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA [article]

Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh
2018 arXiv   pre-print
A special parameter estimation technique based on genetic algorithm is performed to improve and optimize the quality of digests and watermarked image.  ...  In this paper, an efficient fragile blind quad watermarking scheme for image tamper detection and recovery based on lifting wavelet transform and genetic algorithm is proposed.  ...  The authors of age authentication scheme based on absolute moment block scheme [17], proposed image tamper detection scheme based truncation coding was proposed.  ... 
arXiv:1803.02623v1 fatcat:jjytcktbzvfnlkt4co2k6b45ki

Advanced Watermarking o f Digital Images Showing Robust, Semi Fragile a nd Fragile Behaviour

Dr. Shivanand Pujar, Assistant Professor, Department of Computer Science and Engineering, S. G. Balekundri Institute of Technology, Belagavi (Karnataka), India., Ms. Kangana W.M, Ms. Chitrashree Kurtkoti, Abhinandan P. Mangaonkar, Mr. Jagadish S. Jakati, Assistant Professor, Department of Computer Science and Engineering, S. G. Balekundri Institute of Technology, Belagavi (Karnataka), India., Assistant Professor, Department of Computer Science and Engineering, S. G. Balekundri Institute of Technology, Belagavi (Karnataka), India., Assistant Professor, Department of Computer Science and Engineering, S. G. Balekundri Institute of Technology, Belagavi (Karnataka), India., Assistant Professor, Department of Electronics and Communication Engineering, SGBIT, Belagavi, (Karnataka), India
2021 International journal of recent technology and engineering  
Digital Image Watermarking plays an important role when it comes to maintaining digital color picture authentication information.  ...  The proposed paper consists mainly of a digital watermarking scheme consisting of discrete wavelet transformation and involving the generation of pn sequence number to embed the watermark and also to extract  ...  The scheme includes an absolute moment block truncation coding image used as an watermark, in which case the image was a compressed version of the original cover image and also contained the content features  ... 
doi:10.35940/ijrte.d6612.1110421 fatcat:anxsfqztdng63elqnvdrd5w2mu

Efficient Data Hiding Based on Block Truncation Coding Using Pixel Pair Matching Technique

Wien Hong
2018 Symmetry  
In this paper, an efficient data hiding method that embeds data into absolute moment block truncation coding (AMBTC) codes is proposed.  ...  If the block is complex, a lossless embedding method is performed to carry one additional bit.  ...  (in dB) of the absolute moment block truncation coding (AMBTC) compressed images.  ... 
doi:10.3390/sym10020036 fatcat:lh52ziolnfflhovv7fd7ros2mu

Digital steganography and watermarking for digital images: a review of current research directions

Oleg O. Evsutin, Anna S. Melman, Roman V. Meshcheryakov
2020 IEEE Access  
This review is not exhaustive; it focuses on contemporary works illustrating current research directions in the field of information embedding in digital images.  ...  The development of information technology has led to a significant increase in the share of multimedia traffic in data networks.  ...  This scheme is based on Gray code and absolute moment block truncation coding compression. In [62] , the main focus is on ensuring high embedding capacity.  ... 
doi:10.1109/access.2020.3022779 fatcat:dgmubtjr75alpmlkdewpvd5scq

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism.  ...  These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised.  ...  This scheme is highly effective for compressing images that have good regularity and self-similarity. Block truncation coding In this, the image is divided into non overlapping blocks of pixels.  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

Welcome Messages

2019 2019 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)  
Abstract-Halftone based block truncation coding images (H-BTC) are the improved version of BTC images which can offer superior representation and enhanced image quality.  ...  This paper proposes a novel power allocation scheme for MU-MIMO systems, which minimizes the variance of channel capacities of each spatial stream of all users to achieve user fairness in terms of video  ...  To this end, a novel routing scheme based on vision-based sensor localization, namely, imageassisted routing (IAR), is proposed.  ... 
doi:10.1109/ispacs48206.2019.8986291 fatcat:gu4zaxsqkncp5n2ebj5fybk7ce
« Previous Showing results 1 — 15 out of 770 results