81 Hits in 4.4 sec

Research advances in data hiding for multimedia security

Muhammad Khurram Khan
2011 Multimedia tools and applications  
The first paper by Liu et al. presents an adaptive DE-based reversible steganographic scheme with bilinear interpolation and simplified location map.  ...  Data hiding represents a class of processes used to embed data, such as copyright information, into various forms of media e.g. video, image, audio, and text with a minimum amount of perceivable degradation  ...  I am also full of gratitude to the reviewers who scrutinized the submitted manuscripts and recommended modifications and revisions in enhancing the quality of the accepted papers.  ... 
doi:10.1007/s11042-011-0741-1 fatcat:g5o4qyxmvrdptjhqsmxwx24dhi

Protection of Ultrasound Image Sequence: Employing Motion Vector Reversible Watermarking

Rafi Ullah Habib, Fayez Al-Fayez
2019 International Journal of Advanced Computer Science and Applications  
In this paper, a reversible watermarking technique is applied to the patients' data (ultrasound image sequence).  ...  Before applying the motion estimation algorithm and watermark embedding, the histogram pre-processing is performed to avoid underflow/overflow.  ...  Prediction encoding has been employed to compute the prediction errors and then all of the prediction errors are explored to develop a histogram-based reversible video watermarking algorithm.  ... 
doi:10.14569/ijacsa.2019.0100416 fatcat:ivb3iothp5afhcjb6qpfbi6574

Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection

Xiaorui Zhang, Xun Sun, Xingming Sun, Wei Sun, Sunil Kumar Jha
2022 Computers Materials & Continua  
In the second stage, the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion  ...  Due to the independence of the two embedding domains, the embedding of the second-stage reversible watermark will not affect the first-stage watermark, so the robustness of the first-stage watermark can  ...  12, 13] , based on prediction error (PEE) [14] [15] [16] , and based on integer transformation [17, 18] .  ... 
doi:10.32604/cmc.2022.022304 fatcat:vaitgyr7szgzrmnccfsq5y4yky

Reversible data hiding: Advances in the past two decades

Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, Bin Ma
2016 IEEE Access  
INDEX TERMS Reversible data hiding, lossless data hiding, invertible data hiding, histogram shifting, difference expansion, prediction-error, sorting, robust reversible data hiding, video reversible data  ...  hiding, audio reversible data hiding. 3210 2169-3536  ...  Unlike the current reversible video watermarking approaches that are based on the modification of the motion-compensated prediction error histogram, this method is based on motioncompensated frame interpolation  ... 
doi:10.1109/access.2016.2573308 fatcat:muzewmyrijcldkm26q33fimlhq

Survey on Reversible Watermarking Techniques of Echocardiography

Rabiya Ghafoor, Danish Saleem, Sajjad Shaukat Jamal, M. Ishtiaq, Sadaf Ejaz, Arif Jamal Malik, M. Fahad Khan, Emanuele Maiorana
2021 Security and Communication Networks  
Mostly, fragile methods are developed on the error-expansion techniques built on histogram shifting-based approach. In this study, several RW methods are compared and the results are presented.  ...  In critical domains such as medical and military, reversible watermarking (RW) has been used. In the medical domain, different modalities are used to store patient information.  ...  (b) Modification through histogram: the difference between the adjacent pixels is calculated.  ... 
doi:10.1155/2021/8820082 fatcat:dhtsnv3najdotk2jye5pix6odm

Targeted Genome Editing Across Species Using ZFNs and TALENs

Andrew J. Wood, Te-Wen Lo, Bryan Zeitler, Catherine S. Pickle, Edward J. Ralston, Andrew H. Lee, Rainier Amora, Jeffrey C. Miller, Elo Leung, Xiangdong Meng, Lei Zhang, Edward J. Rebar (+3 others)
2011 Science  
$watermark-text $watermark-text $watermark-text In ben-1 mutants, we found no mutations at the top 39 off-target ZFN sites predicted by empirical specificity data (table S3, A and B).  ...  $watermark-text $watermark-text $watermark-text  ... 
doi:10.1126/science.1207773 pmid:21700836 pmcid:PMC3489282 fatcat:dn4oj45gxbaizf3op5xnqjtqm4

An Improved Integer Transform Combining with an Irregular Block Partition

Shaowei Weng, Yi Chen, Wien Hong, Jeng-Shyang Pan, Chin-Chen Chang, Yijun Liu
2019 Symmetry  
After conducting deep research on all existing reversible data hiding (RDH) methods based on Alattar's integer transform, we discover that the frequently-used method in obtaining the difference value list  ...  Thus, the difference value list is created by using the center pixel to predict each pixel surrounding it.  ...  introduced the prediction in DE, and thus a sharper prediction-error histogram is generated, which helps to further improve embedding performance.  ... 
doi:10.3390/sym11010049 fatcat:6ehqxgcglvgijdmlb75532ljsy

HEVC Watermarking Techniques for Authentication and Copyright Applications: Challenges and Opportunities

Ali A. Elrowayati, Mohamed A. Alrshah, M.F.L. Abdullah, Rohaya Latip
2020 IEEE Access  
A new classification has been drawn followed by an identification of the challenges of implementing HEVC watermarking techniques based on the analysis and discussion of those chosen articles.  ...  In order to provide this support, several watermarking techniques have been proposed by many researchers during the last few years.  ...  However, to apply the watermarking on motion vector data in HEVC should consider the differences between the motion-compensated prediction algorithm applied in the HEVC codec and the motion-compensated  ... 
doi:10.1109/access.2020.3004049 fatcat:erkfkaghpjg2xlr7a5d4mf5gry

LSB Data Hiding in Digital Media: A Survey

Dang Tran, Hans-Jürgen Zepernick, Thi Chu
2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
This survey will be helpful for researchers and practitioners to keep abreast about the potential of LSB data hiding in digital media and to develop novel applications based on suitable performance trade-offs  ...  The article concludes with summarizing main findings and suggesting directions for future research.  ...  A modification of a motion vector with high prediction error has a lower effect on the reconstruction quality.  ... 
doi:10.4108/eai.5-4-2022.173783 fatcat:iupulvy6lrbwtglrvukb6gzrue

Lossless generalized-LSB data embedding

M.U. Celik, G. Sharma, A.M. Tekalp, E. Saber
2005 IEEE Transactions on Image Processing  
A prediction-based conditional entropy coder which utilizes unaltered portions of the host signal as side-information improves the compression efficiency and, thus, the lossless data-embedding capacity  ...  We present a novel lossless (reversible) data-embedding technique, which enables the exact recovery of the original host signal upon extraction of the embedded information.  ...  In order to avoid the propagation of rounding errors, the average prediction error is computed from the refined prediction instead of the raw prediction in (11) .  ... 
doi:10.1109/tip.2004.840686 pmid:15700530 fatcat:b5issso6enaopaaovbyjqnb7dy

Non-Blind Structure-Preserving Substitution Watermarking of H.264/CAVLC Inter-Frames

Thomas Stutz, Florent Autrusseau, Andreas Uhl
2014 IEEE transactions on multimedia  
The proposed watermarking algorithm enables extremely efficient watermark embedding by simple bit substitutions (substitution watermarking).  ...  Furthermore our watermarking algorithm can be applied in applications scenarios which require that watermarking preserves the length of the bitstream units (structure-preserving watermarking).  ...  Inter-prediction is conducted by motion estimation and motion compensation, which are conducted with quarter pixel accuracy.  ... 
doi:10.1109/tmm.2014.2310595 fatcat:irblo6zjxrd6tl4wunyz6ut47u

Digital Image Watermarking Techniques: A Review

Mahbuba Begum, Mohammad Shorif Uddin
2020 Information  
Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern.  ...  Digital image authentication is an extremely significant concern for the digital revolution, as it is easy to tamper with any image.  ...  To ensure copyright protection, one study [49] proposed an SHA-3-based novel reversible invisible watermarking scheme, which uses the hash function and an adaptive prediction algorithm.  ... 
doi:10.3390/info11020110 fatcat:nzo5ex2a3ves3hfjycmlgesf3q

Hybrid SVD-based Image Watermarking Schemes: A Review

Wafar Hamdan Alshoura, Zurinahni Zainol, Je Sen Teh, Moatsum Alawida, Abdulatif Alabdulatif
2021 IEEE Access  
Thus, there are many existing hybrid SVD-based image watermarking schemes found be insecure.  ...  There are many image watermarking schemes that have been recently published based on the frequency domain as it can fulfill watermarking requirements such as high robustness and imperceptibility.  ...  In the embedding phase, a reversible IWT and histogram modification is used. Lossless watermark information is embedded in the encrypted host image by inverse IWT.  ... 
doi:10.1109/access.2021.3060861 fatcat:xjghamulkfaxfprs64ztn7c6gm

Information Forensics: An Overview of the First Decade

Matthew C. Stamm, Min Wu, K. J. Ray Liu
2013 IEEE Access  
issue that must be addressed next, namely, to ensure that content, devices, and intellectual property are being used by authorized users for legitimate purposes, and to be able to forensically prove with  ...  The effects of this anti-forensic algorithm can be seen in Fig. 12 which shows the P-frame prediction error sequence of a video before and after anti-forensic modification.  ...  To accomplish this, the model of the video's P-frame prediction error sequence is used to identify spikes in the prediction error that correspond to frame deletion fingerprints.  ... 
doi:10.1109/access.2013.2260814 fatcat:l3hs7vh2nzakpkihwmkubh24dy

Vehicle identification based on feature point matching and epipolar geometry constraint [chapter]

2015 Information Technology  
Parameter estimation for differential equation models using a framework of measurement error in regression models. Journal of the American Statistical Association, 103, 1570-1583.  ...  The back of the jigsaw puzzle with the positive sequence is the same, the corresponding digital a for B, B for a, then reverse to obtain the first column opposite number.  ... 
doi:10.1201/b18776-86 fatcat:ie2okjuq5ffkxk4v54diirb5ku
« Previous Showing results 1 — 15 out of 81 results