3,795 Hits in 8.6 sec

Adaptive data hiding scheme based on magic matrix of flexible dimension

2021 KSII Transactions on Internet and Information Systems  
Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with  ...  Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice.  ...  Then, two partition strategies are applied to embed the secret data into this block. Based on 0 , the (4,4) grouping is applied; based on 1 , the (2,2,2,2) grouping is applied.  ... 
doi:10.3837/tiis.2021.09.014 fatcat:t5yn4k42pzbyjaiz3yau63jcuq

Pixel Value Ordering Based Reversible Data Hiding with Novel MPBS Strategy

M. Mahasree, Department of Computer Science and Engineering, Annamalai University, Chidambaram, India., N. Puviarasan, P. Aruna, Department of Computer and Information Science, Annamalai University, Chidambaram, India., Department of Computer Science and Engineering, Annamalai University, Chidambaram, India.
2020 International Journal of Engineering and Advanced Technology  
For achieving better performance, Pixel Value Ordering (PVO) based reversible data hiding schemes have been proposed.  ...  Recently, Reversible Data Hiding (RDH) techniques has gained much attention in many sensitive fields such as remote sensing, archive management, military and medical image processing systems.  ...  Weng et al. proposed a reversible hiding scheme using flexible image block division and adaptive pixel modifications.  ... 
doi:10.35940/ijeat.b4248.029320 fatcat:jdteqqikuvh3javlgw6lzusv4i

VoIP Steganography Methods, a Survey

S. Deepikaa, R. Saravanan
2019 Cybernetics and Information Technologies  
VoIP calls are much preferred among internet users for its wide availability, dynamic time limit and low cost. This paper focuses on data hiding methods that uses VoIP as a carrier.  ...  Recent research focuses much on utilizing Voice over Internet Protocol (VoIP) calls as a carrier for data hiding.  ...  [15] in 2016 worked on the VoIP communication scheme based on UDP and the secret data was first encrypted using block cipher method.  ... 
doi:10.2478/cait-2019-0004 fatcat:6yibizuonbhorkhlqvfpyocw6i

Hidden context highlighting with JPEG2000-imagery

René Rosenbaum, Heidrun Schumann
2007 Security, Steganography, and Watermarking of Multimedia Contents IX  
This contribution motivates and proposes the new idea of embedding and hiding a highlighting of particular regions within a raster image.  ...  Existing approaches tightly combine content and means for highlighting, and thus, do not allow access control to the emphasized contents or a removal of the accentuation.  ...  The baseline codec supports two different transforms, a reversible transform based on 5/3 kernels and an irreversible transform using CDF 9/7 kernels.  ... 
doi:10.1117/12.703999 dblp:conf/sswmc/RosenbaumS07 fatcat:ovgqym6fyrevxdr6swgpyqwa6a

Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme

Yung-Yao Chen, Yu-Chen Hu, Ting-Kai Yang, You-An Wang
2022 Computers Materials & Continua  
The secret data are embedded into the smooth blocks by using a simple replacement strategy.  ...  Hiding secure data in these transmitted data has emerged broad security issue, such as authentication and copyright protection.  ...  In the data hiding stage, to maximize the embedding capacity in a more flexible manner, the proposed method divides the blocks into four types for which different data hiding strategies are applied.  ... 
doi:10.32604/cmc.2022.023993 fatcat:67t6on6munhtjfllhufchtnyey

Preserving Data Integrity of Encoded Medical Images: The LAR Compression Framework [chapter]

Marie Babel, François Pasteau, Clément Strauss, Maxime Pelcat, Laurent Bédat, Médéric Blestel, Olivier Déforges
2012 Intelligent Systems Reference Library  
Moreover, these sensitive data require confidentiality and privacy for both archiving and transmission purposes, leading to use cryptography and data embedding solutions.  ...  This chapter introduces data integrity protection and developed dedicated tools of content protection and secure bitstream transmission for medical encoded image purposes.  ...  Data embedding in the direct domain Pixel-based methods rely on pixel modification following specific patterns.  ... 
doi:10.1007/978-3-642-24693-7_4 fatcat:gef7wjgbzrbanembsqnhdhdgju

A Decode Technique of MSI for Efficient Reconstruction Process

C Narmatha, P Manimegalai, S Manimurugan, Saad Almutairi, Majed Aborokbah
2018 International Journal of Engineering & Technology  
Basically, theMSImethod can be classified into two parts of Encode and Decode.  ...  However, the main advantages of this technique are easy to handle, more complex and strength than other methods, a perfect reconstruction without any loss and less execution time.  ...  Finally, special thanks to the editor for their support and valuable effort.  ... 
doi:10.14419/ijet.v7i3.6.14951 fatcat:tnogmbeoibasrgteu6s4l5pnii

Write bandwidth optimization of online Erasure Code based cluster file system

Lin Yan, Jing Xing, Tian Wang, Zhigang Huo, Jie Ma, Peiheng Zhang
2013 2013 IEEE International Conference on Cluster Computing (CLUSTER)  
As the data volume is growing from big to huge in many science labs and data centers, more and more data owners are willing to choose Erasure Code based storage to reduce the storage cost.  ...  We propose a Partition Encoding policy to accelerate the encoding arithmetic through SIMD extensions and to overlap data encoding with data committing.  ...  Through reversible redundancy encoding, erasure code based storage can get m parities from k data blocks. These k blocks and m parities compose a stripe which can tolerant at most m data failures.  ... 
doi:10.1109/cluster.2013.6702661 dblp:conf/cluster/YanXWHMZ13 fatcat:iqrmudyiwndfxmgsnl3kzakk4a

LSB Data Hiding in Digital Media: A Survey

Dang Tran, Hans-Jürgen Zepernick, Thi Chu
2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
This survey will be helpful for researchers and practitioners to keep abreast about the potential of LSB data hiding in digital media and to develop novel applications based on suitable performance trade-offs  ...  This article provides a comprehensive survey on LSB data hiding in digital media. The fundamental concepts and terminologies used in data hiding are reviewed along with a general data hiding model.  ...  LSB data hiding in combination with cryptography. Figure 4 . 4 Figure 4. Reversible data hiding using G-LSB modification ©[2005]IEEE.  ... 
doi:10.4108/eai.5-4-2022.173783 fatcat:iupulvy6lrbwtglrvukb6gzrue

Steganography Enhancement by Combining Text and Image through Wavelet Technique

Najran N.H.Al_Dawla, M. M. Kazi, K.V. Kale
2012 International Journal of Computer Applications  
The system based on levels of encryption and decryption methods performed to enhance the security of the system.  ...  The rapidly proliferated information and evolution of digital technologies by Information hiding in multimedia data has improved the ease of access to digital information enabling reliable, faster and  ...  HIDING DATA SCHEME In this section, we will discuss in detail the overall view of combining text (cipher text) as secret information and image of the introduced hiding Secrete Data Scheme.  ... 
doi:10.5120/8328-1855 fatcat:jgmm6lgq6bc4nhxckd4s7p3owy

Reversible data hiding based on multi‐predictor and adaptive expansion

Wenguang He, Gangqiang Xiong, Yaomin Wang
2021 IET Image Processing  
Adaptive embedding plays an important role in improving the embedding performance of reversible data hiding and it is usually realized by modifying the prediction-errors discriminately.  ...  Each pair of extreme predictions is first evaluated by the introduced distortion per embedding one bit.  ...  In terms of embedding primitive, for example, dynamic partition [35] , multistage blocking [36] , flexible block partition [37] and annular merging [38] are proposed to realize the coexistence of  ... 
doi:10.1049/ipr2.12395 fatcat:v5bydrhs6febvl2e5mwygdxkt4

Robust Image-Adaptive Data Hiding Using Erasure and Error Correction

K. Solanki, N. Jacobsen, U. Madhow, B.S. Manjunath, S. Chandrasekaran
2004 IEEE Transactions on Image Processing  
based on information theory. 2) The use of local criteria to choose where to hide data can potentially cause desynchronization of the encoder and decoder.  ...  The three main findings are as follows. 1) In order to limit perceivable distortion while hiding large amounts of data, hiding schemes must use image-adaptive criteria in addition to statistical criteria  ...  Chen and Wornell [16] present a variety of practical approaches to data hiding, with a focus on scalar quantization-based hiding, and show that these schemes are superior to spread spectrum hiding schemes  ... 
doi:10.1109/tip.2004.837557 pmid:15575157 fatcat:ceosxmh4ufcgplhnv4c6f2e2fi

Embedding capacity raising in reversible data hiding based on prediction of difference expansion

Chin-Feng Lee, Hsing-Ling Chen, Hao-Kuan Tso
2010 Journal of Systems and Software  
The study presents an adaptive reversible data scheme based on the prediction of difference expansion.  ...  Most of the proposed methods of reversible data hiding based on difference expansion require location maps to recover cover images.  ...  Difference expansion technique Tian proposed a reversible data hiding scheme based on difference expansion.  ... 
doi:10.1016/j.jss.2010.05.078 fatcat:hxph44iesbhv7esodmffciapry

2020 Index IEEE Transactions on Circuits and Systems for Video Technology Vol. 30

2020 IEEE transactions on circuits and systems for video technology (Print)  
., TCSVT Jan. 2020 217-231 Hu, X., see Zhu, L., TCSVT Oct. 2020 3358-3371 Hu, Y., Lu, M., Xie, C., and Lu, X  ...  ., and Zeng, B., MUcast: Linear Uncoded Multiuser TCSVT Nov. 2020 4299-4308 Hu, R., see Chen, L., TCSVT Dec. 2020 4513-4525 Hu, R., see Wang, X., TCSVT Nov. 2020 4309-4320 Hu, X., see Zhang, X  ...  ., +, TCSVT Aug. 2020 2313-2328 Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification.  ... 
doi:10.1109/tcsvt.2020.3043861 fatcat:s6z4wzp45vfflphgfcxh6x7npu

A hybrid reversible data hiding for multiple images with high embedding capacity

Xiao-Zhu Xie, Chin-Chen Chang, Chia-Chen Lin
2019 IEEE Access  
This paper proposed a high capacity reversible data hiding (RDH) scheme using three steganographic images, on which three successive embedding phases are performed.  ...  INDEX TERMS Reversible data hiding (RDH), multi-steganographic images, pixel value ordering (PVO), prediction error histogram shifting (PEHS), high capacity.  ...  The technology is referred as reversible data hiding (RDH) [4] .  ... 
doi:10.1109/access.2019.2961764 fatcat:ig2mw2xik5cg5mhrhihohl23y4
« Previous Showing results 1 — 15 out of 3,795 results