Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








20,408 Hits in 5.3 sec

Comparison of LSB and Predictive Coding using PSNR and MSE

Jagreeti Kaur, Baljit Singh
2014 International Journal of Computer Applications  
Different techniques are used to hide data in the image to achieve high quality of stego image and high embedding capacity. In this paper, two steganographic techniques re used i.e.  ...  Images are used for secret communication also like for military purposes, hiding the serial number or copyright also to embed the virus and other bad things etc.  ...  [11] used the scheme for reversible data hiding is linear prediction for medical images. The scheme is based on histogram shifting which is limited by the hiding capacity. Hossain et al.  ... 
doi:10.5120/17199-7400 fatcat:e5jzynhorfhedibaosymbfztui

Steganography Technique Based on WPT and ElGamal Encryption with Confusion for Robust Medical Image

2019 International journal of recent technology and engineering  
For health care system, all the medical image data are stored in third party a server that is cloud.  ...  In order to improve the security for data, this paper proposes a steganography technique which embed the important details into the medical image by using Wavelet Packet Transform (WPT) without affecting  ...  In WT, the filtering process is applied only at the low frequency range. So, the high frequency range is not considered for processing [19] .  ... 
doi:10.35940/ijrte.b1246.0982s1119 fatcat:x7nllsxj6rbutblnzeju7ljbva

Research advances in data hiding for multimedia security

Muhammad Khurram Khan
2011 Multimedia tools and applications  
Data hiding represents a class of processes used to embed data, such as copyright information, into various forms of media e.g. video, image, audio, and text with a minimum amount of perceivable degradation  ...  Data hiding embeds information into digital media for the purpose of identification, authentication, and copyright protection.  ...  I thank all the authors who contributed their papers for this special issue.  ... 
doi:10.1007/s11042-011-0741-1 fatcat:g5o4qyxmvrdptjhqsmxwx24dhi

A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality

2014 KSII Transactions on Internet and Information Systems  
Our proposed technique is feasible in reversible data hiding.  ...  Jung and Yoo proposed the first image interpolation-based reversible data hiding algorithm. Although their algorithm achieved superior interpolation results, the embedding capacity was insufficient.  ...  Current data hiding algorithms [2] [3] [4] [5] [6] [7] [8] [9] [10] use still images, audio, video, 3D models or high-dynamic-range images as their cover media.  ... 
doi:10.3837/tiis.2014.09.019 fatcat:qb2ffdjtzjgsjgapbg5jfxecji

Vicode: 3D Barcode with Embedded Video Using Histogram Shifting Based Reversible Data Hiding

2017 International Journal of Science and Research (IJSR)  
This paper also gives an overview of different steganographic techniques such as histogram Shifting based Reversible Data Hiding Scheme, Reversible Data Embedding Using a Difference Expansion, An LSB Data  ...  The appearance of a traditional 2D barcode pattern is too obtrusive for integrating into an aesthetically designed advertisement, no visual hint about the encoded information is provided before the barcode  ...  Histogram Shifting based Reversible Data Hiding Scheme, Reversible Data Embedding Using a Difference Expansion and An LSB Data Hiding are the various data embedding techniques and compare these methods  ... 
doi:10.21275/5071708 fatcat:jmfr432mfnh6xmztiqlzln5ori

A Study of Various Steganographic Techniques Used for Information Hiding

Sumathi C.P, Santanam T, Umamaheswari G
2013 International Journal of Computer Science & Engineering Survey  
Steganography is a technology where modern data compression, information theory, spread spectrum, and cryptography technologies are brought together to satisfy the need for privacy on the Internet.  ...  The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era.  ...  s [8] article, the authors propose an algorithm which works on colour images (JPEG). The edges are chosen for data hiding to improve robustness.  ... 
doi:10.5121/ijcses.2013.4602 fatcat:2jkkcpp6rjaalgqait5maanglu

Extending Multi-MSB Prediction and Huffman Coding for Reversible Data Hiding in Encrypted HDR Images

Yuan-Yu Tsai, Hong-Lin Liu, Pei-Lin Kuo, Chi-Shiang Chan
2022 IEEE Access  
High-dynamic-range (HDR) images [20] represent a new image format with a larger range of color representation than that of low-dynamic-range (LDR) images, which enhances bright and dark areas that do  ...  REVERSIBLE DATA HIDING ALGORITHMS FOR ENCRYPTED IMAGES Zhang [32] proposed a block-based VRAE reversible data hiding algorithm for encrypted images.  ... 
doi:10.1109/access.2022.3171578 fatcat:imris7vvxfd4fj7vcv7eph5qim

Embedding Biometric Information in Interpolated Medical Images with a Reversible and Adaptive Strategy

Heng-Xiao Chi, Ji-Hwei Horng, Chin-Chen Chang, Yung-Hui Li
2022 Sensors  
The interpolation-based reversible data hiding (RDH) scheme is especially useful for the application of medical image management.  ...  The biometric information of patients acquired by biosensors is embedded into an interpolated medical image for the purpose of authentication.  ...  Informed Consent Statement: Not applicable. Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22207942 fatcat:d3fcjuifkje6thxqifeth27yg4

Special issue on real-time image watermarking and forensics in cloud computing

Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang
2019 Journal of Real-Time Image Processing  
The paper titled "A Fast Coding Method for Distortion-free Data Hiding in High Dynamic Range Image", co-authored by Yue Guo, Weiming Zhang, Dongdong Hou, Yuanzhi Yao, and Shuangkui Ge, proposes an efficient  ...  data hiding using turtle shells.  ...  Visual Secret Sharing with Reversibility and High Capacity", Ching-Chun Chang, Yanjun Liu, and Kaimeng Chen propose a high-capacity (2, 2) DH-VSS method based on the LSB substitution technique, which includes  ... 
doi:10.1007/s11554-019-00881-y fatcat:qgkqy5fxxbhfhj3l4ptrmcoewy

Secure Text Hiding Method in Image Processing using Enhanced MSB Technique

2019 International journal of soft computing and engineering  
Data hiding approach represents a class of processes which are implemented for embedding data into different formats. In this approach, secret message occurs along with the secret information.  ...  The data hiding is known as a procedure which is used to achieve composite signals by embedding message signals into the host picture.  ...  Further, in the presence of damage, the capability of recovering lossless data was increased based on the application of dynamic range adjustment technique.  ... 
doi:10.35940/ijsce.c3283.099319 fatcat:emykxoy5jzf6vknoqlqzzu6upi

LSB Data Hiding in Digital Media: A Survey

Dang Tran, Hans-Jürgen Zepernick, Thi Chu
2022 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems  
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel.  ...  In particular, least significant bit (LSB) data hiding is easy to implement and to combine with other hiding techniques, offers high embedding capacity for data, can resist steganalysis and several types  ...  Regarding image quality, the edge region of the quantum cover image is used for data hiding in [201] .  ... 
doi:10.4108/eai.5-4-2022.173783 fatcat:iupulvy6lrbwtglrvukb6gzrue

Utilizations of Reversible Lossless Data Hiding Techniques in Video Sequences

Osama F. Abdel Wahab et. al.
2015 International Journal of Computing and Network Technology  
The proposed algorithm is a hybrid hiding scheme based on discrete wavelet transform (DWT) and histogram shifting for lossless data hiding .  ...  frequency subbands to make space for data hiding and Finally, the secret message is extracted from the stego-video.This technique satisfy both imperceptibility and robustness.  ...  Digital data hiding can hide sensitive information into multimedia for covert communications.  ... 
doi:10.12785/ijcnt/030102 fatcat:qcmfoku3uze2lia5pkwv545kz4

Steganography Techniques for Medical Images: A Recommender Paper

Inam Ul Haq, Ahmad Ali, Bilal Shabbir Qaisar, Hafiz Muhammad Adnan, Mubasher Hussain, Muhammad Nauman
2023 Zenodo  
Image steganography is the process of concealing secret media within any format of the transmitter. In image steganography, a cover image is used in both the embedding and extracting processes.  ...  The main challenges of image steganography in spatial and transform domains are presented. In the end, findings for future scope are also presented.  ...  ACKNOWLEDGEMENT Special thank goes to University of Okara for providing the IT services, Lab and Servers provisions for smoothly writing the manuscript.  ... 
doi:10.5281/zenodo.8340602 fatcat:pxi2lyiicnbwnaba7eg7tzaxwa

Secure High Capacity Data Hiding Scheme based on Reference Matrix

Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin
2019 International Journal of Network Security  
In this paper, a secure high-capacity data hiding scheme based on a reference matrix is proposed.  ...  Experimental results confirm that our proposed scheme outperforms previous data hiding schemes in visual quality and hiding capacity.  ...  For example, based on reversibility, DH schemes can be classified into reversible data hiding Figure 1 : Taxonomy of data hiding (RDH) [5, 9, 15, 16, 18, 25, 30] and irreversible data hiding (IRDH)  ... 
dblp:journals/ijnsec/LiCHL19 fatcat:gv2vf7wazzbs3fczpf4k3o3o7e

Analytical Study of Image Steganography Techniques in the Context of Present Scenario

Ravi Saini, Kamaldeep Joshi, Rajkumar Yadav, Rainu Nandal
2022 Zenodo  
Information Hiding is the technology of camouflaging the vital data which uses cover file, digital image processing, cryptography, signal processing, compression techniques etc. for the safety of information  ...  As the various applications are used for information sharing, so the risk of various attacks and unwanted access by some person also increases.  ...  We have also used the graph by using MATLAB for visualizing the various techniques.  ... 
doi:10.5281/zenodo.6787158 fatcat:rnehwk2wq5hvjnwgs6347jz6ra
« Previous Showing results 1 — 15 out of 20,408 results