Sciweavers

15 search results - page 3 / 3
» Double Embedding In The Quantization Index Modulation Framew...
Sort
View
DCC
2007
IEEE
13 years 11 months ago
Data Hiding based Compression Mechanism for 3D Models
: The paper proposes a lossy compression mechanism for 3D models (3D meshes) by improving existing compression mechanism such as progressive meshes and single refinement mesh compr...
Hui Li, Parag Agarwal, Balakrishnan Prabhakaran
SSWMC
2004
13 years 6 months ago
Steganalysis of block-structured stegotext
We study a detection-theoretic approach to steganalysis. The relative entropy between covertext and stegotext determines the steganalyzer's difficulty in discriminating them,...
Ying Wang, Pierre Moulin
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
13 years 11 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
13 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
13 years 10 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...