A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Low Bit-Rate and High Fidelity Reversible Data Hiding
[article]
2015
arXiv
pre-print
As a result, the proposed method can obtain very high fidelity marked images with low bit-rate data embedded. ...
The experimental results show that the proposed method outperforms the state-of-the-art low bit-rate reversible data hiding method. ...
In this paper, a low bit-rate and high fidelity reversible data hiding method is proposed. ...
arXiv:1507.08075v1
fatcat:kiakbw6rdbd35e7giqsf7em2by
Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues
2019
IEEE Access
The experimental results showed significant improvements over the state-of-the-art methods with regard to capacity, fidelity, and reversibility. ...
, and electronic data management. ...
Overall, our scheme achieves high fidelity due to the fact that the watermarking process does not necessarily alter all the bits of changeable symbols, and attains high capacity by embedding two bits into ...
doi:10.1109/access.2019.2908924
fatcat:32v2fc4rdzb5rmsmebkqiwgkj4
Reversible Data Hiding for DICOM Image Using Lifting and Companding
2019
Cryptography
In this work, a reversible watermarking technique is proposed for DICOM (Digital Imaging and Communications in Medicine) image that offers high embedding capacity (payload), security and fidelity of the ...
In the embedding process, the companding technique is used to increase the data hiding capacity. ...
Data Decoding Step 1: Image transformation: Decompose the watermarked image (I w ) into 4-subbands, i.e., low-low (LL), high-low (HL), low-high (LH), and high-high (HH), using lifting. ...
doi:10.3390/cryptography3030021
fatcat:2icxbibq6jhrdjlli2zasgucr4
Current status and key issues in image steganography: A survey
2014
Computer Science Review
Digital watermarking is another branch of information hiding. Both steganography and watermarking are the methods of data embedding, but there are several differences among them. ...
Image steganography Steganalysis Image quality measures A B S T R A C T Steganography and steganalysis are the prominent research fields in information hiding paradigm. ...
A reversible data hiding scheme for VQ indices is explained in [40] that outperforms many schemes such as Lin and Chang, Tsai and Yang and Lin's method giving the compression rate of 0.49 bpp. ...
doi:10.1016/j.cosrev.2014.09.001
fatcat:vpvq6qozrrcvpfuhz73t26ma54
Temporally Synchronized Reversible Data Hiding of EEG to MREG
2016
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies
It is demonstrated through experiments that MREG maintains high perceptual fidelity and also verified that after EEG extraction and acquisition of every electrode's sample, MREG is fully reversed to its ...
The embedding procedure maintains temporal synchronization between EEG and 32-bit MREG making it a novel data hiding application. ...
The data hiding method can guarantee with the proper quantization settings high fidelity between the original MREG sequence and its version that carries hidden data. ...
doi:10.5220/0005665700580067
dblp:conf/biostec/FylakisKKS16
fatcat:yhdwaleujjdvzfudmn5y27pgae
A data hiding approach for sensitive smartphone data
2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '16
We develop and evaluate a data hiding method that enables smartphones to encrypt and embed sensitive information into carrier streams of sensor data. ...
Our evaluation considers multiple handsets and a variety of data types, and we demonstrate that our method has a computational cost that allows real-time data hiding on smartphones with negligible distortion ...
A large number of LSBs leads to high capacity and low fidelity in the carrier signals. ...
doi:10.1145/2971648.2971686
dblp:conf/huc/LuoFPKGLSK16
fatcat:go6b3d4egfgzxhajmrdutp7vpe
A PVO-based Reversible Data Hiding Scheme Using Variable Difference
2019
DEStech Transactions on Engineering and Technology Research
In order to improve the PSNR of the marked image, an improved high-fidelity reversible data hiding algorithm was proposed based on Pixel-Value-Ordering. ...
The algorithm can extract the secret information and restore the original image without any damage. ...
Introduction Image data hiding is usually divided into reversible data hiding (RDH) and irreversible data hiding. ...
doi:10.12783/dtetr/icicr2019/30582
fatcat:frvq5ybkybcepanlrqldopjzqa
Steganography in RGB Images Using Adjacent Mean
2021
IEEE Access
Swain, “High Fidelity Based Reversible Data
Hiding Using Modified LSB Matching and Pixel Difference,”
Journal of King Saud Univeristy-Computer and Information ...
Kittawi and A. Al-Haj, “Reversible Data Hiding in Encrypted
[9] A. Nilizadeh and A. R. N. ...
doi:10.1109/access.2021.3132424
fatcat:zr6ifymknzdm5m6do5gauaojza
Embedding Data in Non-Important Gabor Ridges
2022
International Journal on Advanced Science, Engineering and Information Technology
There are many hiding techniques; each one of them used different paths to ensure standard properties such as optimizing security level, increasing the amount of embedding data, decreasing the ability ...
The imaging stage constructed after the suggested technique is good and identical to the pure image for the accepted degree as shown in used fidelity metrics (PSNR). ...
bits, ensuring that noise quantity stills in accepted rate in the file after the hiding process [22] . ...
doi:10.18517/ijaseit.12.1.15005
fatcat:huyjwpvaejd37dv2kndai4gasq
A high-capacity reversible data hiding method: HCRHide
2013
Imaging Science Journal
Throughout a joint imperceptibility and data hiding capacity evaluation, results have approved high performance of the proposed method over the existing reversible data hiding methods. ...
In this paper, we propose a highcapacity reversible data hiding method called HCRHide based on the Neighbour Mean Interpolation (NMI) method and the R-weighted Coding Method (RCM). ...
Acknowledgements The authors would like to thank the anonymous reviewers and the editor for their valuable comments and suggestions as well as Mr Jeffry Livesay for his contribution in language editing ...
doi:10.1179/1743131x13y.0000000060
fatcat:u3gm3qwgybce3iozsakdjzl27e
Guest Editorial: Information Hiding and Forensics for Multimedia Security
2016
Multimedia tools and applications
confidential data into ECG signal reversibly, while keeping its high visual quality. ...
high-capacity separable data hiding in encrypted images using compressive sensing. ...
doi:10.1007/s11042-016-3876-2
fatcat:h2z6bme6sjdmhj3y4msr2d2gli
An Authentication Technique in Frequency Domain through Wavelet Transform (ATFDWT)
[article]
2012
arXiv
pre-print
(PSNR), Standard Deviation(SD) and Image Fidelity(IF) analysis, which shows better performances in ATFDWT. ...
The secret message/image bits stream in varying positions are embedded in 'Vertical orientation sub-image' followed by reverse transformation to generate embedded/encrypted image. ...
Acknowledgement The authors express deep sense of gratuity towards the department of CSE University of Kalyani and the IIPC Project AICTE, Govt. of India, of the department where the computational resources ...
arXiv:1212.3719v1
fatcat:zubzvsdxwngr5ehvq4osyqkikm
A Novel LSB Matching Algorithm Based on Information Pre-Processing
2021
Mathematics
This paper analyzes random bits and scanned documents, two forms of secret data. ...
Both theory and experiment have demonstrated that our study presented a good trade-off between high capacity and low distortion and is superior to other related schemes. ...
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error
expansion. Signal Process. 2013, 93, 198–205. [CrossRef]
12. Ou, B.; Li, X.L.; Zhao, Y.; Ni, R.R. ...
doi:10.3390/math10010008
fatcat:y7hh52sj45cjxj5euucjd3l32m
Watermarking in Transform Domains (WTD)
2012
Procedia Technology - Elsevier
Extraction is made in reverse manner. ...
with enhanced fidelity. ...
ACKNOWLEDGMENT The author express deep sense of gratuity towards the Dept of CSE University of Kalyani and the IIPC Project AICTE, Govt of India, of the dept where the computational resourses are used ...
doi:10.1016/j.protcy.2012.05.003
fatcat:mzjgu74ijncbnk7oastrhbblau
Audio Hiding Using Wavelet Transform with Amplitude Modulation
2013
Al-Nahrain Journal of Science
The performance of hiding method was tested using the fidelity measures Mean Square Error (MSE), and Peak Signal to Noise Ratio (PSNR) to describe the overall error rate. ...
Hiding rate was computed to asses the embedding power of this method. ...
The two produced bands are called the low frequency (L) and high frequency (H). ...
doi:10.22401/jnus.16.1.27
fatcat:mensea7cujcuhe5wkh32okprxu
« Previous
Showing results 1 — 15 out of 3,969 results