A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Adaptive data hiding scheme based on magic matrix of flexible dimension
2021
KSII Transactions on Internet and Information Systems
Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with ...
Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. ...
Then, two partition strategies are applied to embed the secret data into this block. Based on 0 , the (4,4) grouping is applied; based on 1 , the (2,2,2,2) grouping is applied. ...
doi:10.3837/tiis.2021.09.014
fatcat:t5yn4k42pzbyjaiz3yau63jcuq
Pixel Value Ordering Based Reversible Data Hiding with Novel MPBS Strategy
2020
International Journal of Engineering and Advanced Technology
For achieving better performance, Pixel Value Ordering (PVO) based reversible data hiding schemes have been proposed. ...
Recently, Reversible Data Hiding (RDH) techniques has gained much attention in many sensitive fields such as remote sensing, archive management, military and medical image processing systems. ...
Weng et al. proposed a reversible hiding scheme using flexible image block division and adaptive pixel modifications. ...
doi:10.35940/ijeat.b4248.029320
fatcat:jdteqqikuvh3javlgw6lzusv4i
VoIP Steganography Methods, a Survey
2019
Cybernetics and Information Technologies
VoIP calls are much preferred among internet users for its wide availability, dynamic time limit and low cost. This paper focuses on data hiding methods that uses VoIP as a carrier. ...
Recent research focuses much on utilizing Voice over Internet Protocol (VoIP) calls as a carrier for data hiding. ...
[15] in 2016 worked on the VoIP communication scheme based on UDP and the secret data was first encrypted using block cipher method. ...
doi:10.2478/cait-2019-0004
fatcat:6yibizuonbhorkhlqvfpyocw6i
Hidden context highlighting with JPEG2000-imagery
2007
Security, Steganography, and Watermarking of Multimedia Contents IX
This contribution motivates and proposes the new idea of embedding and hiding a highlighting of particular regions within a raster image. ...
Existing approaches tightly combine content and means for highlighting, and thus, do not allow access control to the emphasized contents or a removal of the accentuation. ...
The baseline codec supports two different transforms, a reversible transform based on 5/3 kernels and an irreversible transform using CDF 9/7 kernels. ...
doi:10.1117/12.703999
dblp:conf/sswmc/RosenbaumS07
fatcat:ovgqym6fyrevxdr6swgpyqwa6a
Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme
2022
Computers Materials & Continua
The secret data are embedded into the smooth blocks by using a simple replacement strategy. ...
Hiding secure data in these transmitted data has emerged broad security issue, such as authentication and copyright protection. ...
In the data hiding stage, to maximize the embedding capacity in a more flexible manner, the proposed method divides the blocks into four types for which different data hiding strategies are applied. ...
doi:10.32604/cmc.2022.023993
fatcat:67t6on6munhtjfllhufchtnyey
Preserving Data Integrity of Encoded Medical Images: The LAR Compression Framework
[chapter]
2012
Intelligent Systems Reference Library
Moreover, these sensitive data require confidentiality and privacy for both archiving and transmission purposes, leading to use cryptography and data embedding solutions. ...
This chapter introduces data integrity protection and developed dedicated tools of content protection and secure bitstream transmission for medical encoded image purposes. ...
Data embedding in the direct domain Pixel-based methods rely on pixel modification following specific patterns. ...
doi:10.1007/978-3-642-24693-7_4
fatcat:gef7wjgbzrbanembsqnhdhdgju
A Decode Technique of MSI for Efficient Reconstruction Process
2018
International Journal of Engineering & Technology
Basically, theMSImethod can be classified into two parts of Encode and Decode. ...
However, the main advantages of this technique are easy to handle, more complex and strength than other methods, a perfect reconstruction without any loss and less execution time. ...
Finally, special thanks to the editor for their support and valuable effort. ...
doi:10.14419/ijet.v7i3.6.14951
fatcat:tnogmbeoibasrgteu6s4l5pnii
Write bandwidth optimization of online Erasure Code based cluster file system
2013
2013 IEEE International Conference on Cluster Computing (CLUSTER)
As the data volume is growing from big to huge in many science labs and data centers, more and more data owners are willing to choose Erasure Code based storage to reduce the storage cost. ...
We propose a Partition Encoding policy to accelerate the encoding arithmetic through SIMD extensions and to overlap data encoding with data committing. ...
Through reversible redundancy encoding, erasure code based storage can get m parities from k data blocks. These k blocks and m parities compose a stripe which can tolerant at most m data failures. ...
doi:10.1109/cluster.2013.6702661
dblp:conf/cluster/YanXWHMZ13
fatcat:iqrmudyiwndfxmgsnl3kzakk4a
LSB Data Hiding in Digital Media: A Survey
2022
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
This survey will be helpful for researchers and practitioners to keep abreast about the potential of LSB data hiding in digital media and to develop novel applications based on suitable performance trade-offs ...
This article provides a comprehensive survey on LSB data hiding in digital media. The fundamental concepts and terminologies used in data hiding are reviewed along with a general data hiding model. ...
LSB data hiding in combination with cryptography.
Figure 4 . 4 Figure 4. Reversible data hiding using G-LSB modification ©[2005]IEEE. ...
doi:10.4108/eai.5-4-2022.173783
fatcat:iupulvy6lrbwtglrvukb6gzrue
Steganography Enhancement by Combining Text and Image through Wavelet Technique
2012
International Journal of Computer Applications
The system based on levels of encryption and decryption methods performed to enhance the security of the system. ...
The rapidly proliferated information and evolution of digital technologies by Information hiding in multimedia data has improved the ease of access to digital information enabling reliable, faster and ...
HIDING DATA SCHEME In this section, we will discuss in detail the overall view of combining text (cipher text) as secret information and image of the introduced hiding Secrete Data Scheme. ...
doi:10.5120/8328-1855
fatcat:jgmm6lgq6bc4nhxckd4s7p3owy
Reversible data hiding based on multi‐predictor and adaptive expansion
2021
IET Image Processing
Adaptive embedding plays an important role in improving the embedding performance of reversible data hiding and it is usually realized by modifying the prediction-errors discriminately. ...
Each pair of extreme predictions is first evaluated by the introduced distortion per embedding one bit. ...
In terms of embedding primitive, for example, dynamic partition [35] , multistage blocking [36] , flexible block partition [37] and annular merging [38] are proposed to realize the coexistence of ...
doi:10.1049/ipr2.12395
fatcat:v5bydrhs6febvl2e5mwygdxkt4
Robust Image-Adaptive Data Hiding Using Erasure and Error Correction
2004
IEEE Transactions on Image Processing
based on information theory. 2) The use of local criteria to choose where to hide data can potentially cause desynchronization of the encoder and decoder. ...
The three main findings are as follows. 1) In order to limit perceivable distortion while hiding large amounts of data, hiding schemes must use image-adaptive criteria in addition to statistical criteria ...
Chen and Wornell [16] present a variety of practical approaches to data hiding, with a focus on scalar quantization-based hiding, and show that these schemes are superior to spread spectrum hiding schemes ...
doi:10.1109/tip.2004.837557
pmid:15575157
fatcat:ceosxmh4ufcgplhnv4c6f2e2fi
Embedding capacity raising in reversible data hiding based on prediction of difference expansion
2010
Journal of Systems and Software
The study presents an adaptive reversible data scheme based on the prediction of difference expansion. ...
Most of the proposed methods of reversible data hiding based on difference expansion require location maps to recover cover images. ...
Difference expansion technique Tian proposed a reversible data hiding scheme based on difference expansion. ...
doi:10.1016/j.jss.2010.05.078
fatcat:hxph44iesbhv7esodmffciapry
2020 Index IEEE Transactions on Circuits and Systems for Video Technology Vol. 30
2020
IEEE transactions on circuits and systems for video technology (Print)
., TCSVT Jan. 2020 217-231 Hu, X., see Zhu, L., TCSVT Oct. 2020 3358-3371 Hu, Y., Lu, M., Xie, C., and Lu, X ...
., and Zeng, B., MUcast: Linear Uncoded Multiuser TCSVT Nov. 2020 4299-4308 Hu, R., see Chen, L., TCSVT Dec. 2020 4513-4525 Hu, R., see Wang, X., TCSVT Nov. 2020 4309-4320 Hu, X., see Zhang, X ...
., +, TCSVT Aug. 2020 2313-2328
Optimal Reversible Data Hiding Scheme Based on Multiple Histograms
Modification. ...
doi:10.1109/tcsvt.2020.3043861
fatcat:s6z4wzp45vfflphgfcxh6x7npu
A hybrid reversible data hiding for multiple images with high embedding capacity
2019
IEEE Access
This paper proposed a high capacity reversible data hiding (RDH) scheme using three steganographic images, on which three successive embedding phases are performed. ...
INDEX TERMS Reversible data hiding (RDH), multi-steganographic images, pixel value ordering (PVO), prediction error histogram shifting (PEHS), high capacity. ...
The technology is referred as reversible data hiding (RDH) [4] . ...
doi:10.1109/access.2019.2961764
fatcat:ig2mw2xik5cg5mhrhihohl23y4
« Previous
Showing results 1 — 15 out of 3,795 results