4,014 Hits in 6.8 sec

Research on Image Steganography Based on Sudoku Matrix

Tsung-Chih Hsiao, Dong-Xu Liu, Tzer-Long Chen, Chih-Cheng Chen
2021 Symmetry  
Therefore, this topic intends to propose a data hiding method based on a 16 × 16 Sudoku matrix by using the 16 × 16 Sudoku matrix and extending it to a double-layer magic matrix.  ...  In addition, by determining the classification of points of pixel pairs after applying a magic matrix and by determining the traversal area, the average peak signal-to-noise ratio (PSNR) can be improved  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym13030387 fatcat:t3rkaqxtqberbmrgo7upfqc2de

Quantization Based Data Hiding Scheme for Efficient Quality Access Control of Images Using DWT via Lifting

Amit Phadikar, Santi P. Maity, Malay K. Kundu
2008 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing  
This paper proposes a transform domain data-hiding scheme for quality access control of images.  ...  The degree of deterioration depends on the amount of external data insertion as well as step size used for DM. If this insertion process is reverted, better quality of images can be accessed.  ...  In this paper, we propose a quantization based data hiding scheme for quality access control of digital image. The proposed scheme embeds the watermark in the DWT domain via Lifting using DM.  ... 
doi:10.1109/icvgip.2008.23 dblp:conf/icvgip/PhadikarMK08 fatcat:ipjtomuowjealoqzvwoas4tysm


2005 International Journal of Image and Graphics  
In this paper we introduce and develop a framework for visual data-hiding technologies that aim at resolving emerging problems of modern multimedia networking.  ...  Secondly, we formulate digital data-hiding into visual content as communications with side information and advocate an appropriate informationtheoretic framework for the analysis of different data-hiding  ...  The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions.  ... 
doi:10.1142/s0219467805001641 fatcat:fwt723y6znaoportlfewwvgdly

Spread spectrum image steganography

L.M. Marvel, C.G. Boncelet, C.T. Retter
1999 IEEE Transactions on Image Processing  
Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.  ...  This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range.  ...  ACKNOWLEDGMENT The authors would like to take this opportunity to thank the anonymous reviewers for their efforts and insightful suggestions.  ... 
doi:10.1109/83.777088 pmid:18267522 fatcat:jzwxob5nbrf4lpbojewv2a6wpq

Data-Hiding Codes

P. Moulin, R. Koetter
2005 Proceedings of the IEEE  
The approach draws from basic concepts in information theory, coding theory, game theory, and signal processing, and is illustrated with applications to the problem of hiding data in images.  ...  This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics, and text.  ...  ACKNOWLEDGMENT The authors would like to thank their current and former students, A. Briassouli, A. K. Goteti, M. Kesal, T. Liu, M. K. Mıhçak, and Y. Wang, for their contributions to this paper.  ... 
doi:10.1109/jproc.2005.859599 fatcat:fshag72wujgntaoom7pd65uf24

Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security

Oleg Evsutin, Kristina Dzhanashia
2020 Cryptography  
With the huge transfers of data involved in the modern world, it is both crucial and challenging to maintain the security of data.  ...  The presented algorithm makes use of the Chinese remainder theorem and adaptive embedding to achieve good imperceptibility along with the possibility of hiding a decent amount of confidential information  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/cryptography4040035 fatcat:lmwle3pgl5fvxgpvui6pmuzq7u

Image communication scheme based on dynamic visual cryptography and computer generated holography

Paulius Palevicius, Minvydas Ragulskis
2015 Optics Communications  
The proposed visual image encryption scheme is based on computer generated holography, optical time-averaging moiré and principles of dynamic visual cryptography.  ...  Dynamic visual cryptography is used both for the initial encryption of the secret image and for the final decryption.  ...  Acknowledgements Financial support from the Lithuanian Science Council under Project no. MIP-100/2012 is acknowledged.  ... 
doi:10.1016/j.optcom.2014.09.041 fatcat:xrxb7lroanal3nugsjwpzxq7ti

Research on Covert Communication Security Based on Screen Content Coding

Zhe Liu, He Chen, Songlin Sun
2020 IEEE Access  
A video steganography scheme based on chaotic mapping in DCT domain is proposed where the proposed method applies to HEVC screen content coding.  ...  Therefore, based on the unique characteristics of the SCC stream, this paper studies the information steganography technology, and uses the video information hiding technology to transmit private data.  ...  Then a lossless data hiding scheme in JPEG image is proposed by Wang et al. [8] .  ... 
doi:10.1109/access.2020.2968740 fatcat:nlk4uor4szbtrfzh7humhk36ci

Robust Spatial Data Hiding for Color Images [chapter]

Xiaoqiang Li, Xiangyang Xue, Wei Li
2003 Lecture Notes in Computer Science  
In paper [1], we present a new watermarking technique in spatial domain expressly devised for color images, which is based on transmit diversity techniques.  ...  In this paper, we describe the revised scheme of algorithm [1] in detail, and give experimental results that demonstrate the unmistakable advantage of our new approach over algorithms operating on not  ...  Multi-bits robust watermarking for image remains a topic of research. In [1] , we developed a new multi-bits watermarking algorithm for color images based on transmit diversity techniques.  ... 
doi:10.1007/978-3-540-45184-6_17 fatcat:frxbldhs6naeja5jlwuva6pig4

Enhanced Bandwidth Utilization in Image Steganography with Enhanced Data Security

Balkrishan Balkrishan, Amar Partap Singh
2013 International Journal of Computer Applications  
In this paper, a new method is proposed for image steganography that involves double encryption as well as compression of a message followed by its subsequent hiding in a digital image.  ...  Further, encrypted data is encrypted and compressed using Chinese Remainder Theorem (CRT) for extra layer of security and increased the data hiding capacity.  ...  CONCLUSION In this study, an attempt is made to develop a new approach for data hiding in grey scale images in which data encryption, compression and hiding are combined to enhance bandwidth utilization  ... 
doi:10.5120/14622-2954 fatcat:tn5psh2ov5cxro75rbpktudm64

Genetic algorithms for optimality of data hiding in digital images

Santi P. Maity, Malay K. Kundu
2008 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
This paper investigates the scope of usage of Genetic Algorithms (GA) for data hiding in digital images.  ...  Results on robustness for both the methods against linear, non linear filtering, noise addition, and lossy compression as well as statistical invisibility of the hidden data are reported here for some  ...  A novel watermarking scheme for the image data using neural networks is also developed based on discrete wavelet transform (DWT) [17] .  ... 
doi:10.1007/s00500-008-0329-5 fatcat:bjncaut5wrahlprr7llg5qo3ka

Data Hiding Based on Mini Program Code

Jia Chen, Quankai Qi, Yongjie Wang, Xuehu Yan, Longlong Li, Zhili Zhou
2021 Security and Communication Networks  
Then, a binary stream of the secret message is embedded into the encoding region or the edge patch. Experiments show that the proposed data hiding scheme is effective and feasible.  ...  As a new carrier, the study of information hiding technology based on mini program code is of great significance for the expansion of covert communication carriers and can also deal with security problems  ...  ( for its linguistic assistance during the preparation of this manuscript.  ... 
doi:10.1155/2021/5546344 fatcat:7nhiwf2cgjhw3jwkqvtsn42mjy

Steganographic Techniques of Data Hiding Using Digital Images (Review Paper)

Babloo Saha, Shuchi Sharma
2012 Defence Science Journal  
For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons.  ...  Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for.  ...  Yang 34 , et al. presented a reversible data hiding scheme based on SMVq for Vq compressed images.  ... 
doi:10.14429/dsj.62.1436 fatcat:jg3opahcgnf5rm4yblbwno45ty

An Overview on LSB and LSB+HUFFMAN based Steganography

Lakshmi. M
2018 International Journal for Research in Applied Science and Engineering Technology  
Steganography is art of secret communication. It involves hiding information in an appropriate carrier e.g., text, image, audio, video.  ...  Now a day's internet has became common use, with increase in use of internet providing security to information is also important. Steganography is a method to provide network security.  ...  The same message is embedded into a cover image using two schemes for comparing the quality of an image.  ... 
doi:10.22214/ijraset.2018.5305 fatcat:enzhsczzv5cvbbkbez2xtzyzrq

Reliable Information Hiding Based on Support Vector Machine

Yong-Gang Fu, Rui-Min Shen, Li-Ping Shen, Xu-Sheng Lei
2005 Informatica  
In this paper, a reliable information hiding scheme based on support vector machine and error correcting codes is proposed.  ...  To extract the hidden information bits from a possibly tampered watermarked image with a lower error probability, information hiding is modeled as a digital communication problem, and both the good generalization  ...  There are a variety of schemes for hiding information into the original image.  ... 
doi:10.15388/informatica.2005.102 fatcat:656pm56hfzfkhcrd2bkhljjfry
« Previous Showing results 1 — 15 out of 4,014 results