Sciweavers

210 search results - page 1 / 42
» Research on Data Hiding Capacity
Sort
View
IJNSEC
2007
96views more  IJNSEC 2007»
13 years 4 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 4 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
HIS
2009
13 years 2 months ago
An Efficient VQ-Based Data Hiding Scheme Using Voronoi Clustering
In this paper, we propose a vector quantization (VQ) -based information hiding scheme that cluster the VQ codeowrds according the codewords' relation on Voronoi Diagram (VD). ...
Ming-Ni Wu, Puu-An Juang, Yu-Chiang Li
ICIP
2000
IEEE
14 years 5 months ago
An Information-Theoretic Model for Image Watermarking and Data Hiding
An information?theoretic model for image watermarking and data hiding systems is presented in this paper. The fundamental capacity limits of these systems are determined by the st...
Gen-Iu. Lin, Mehmet Kivanç Mihçak, P...
MOBISYS
2009
ACM
14 years 4 months ago
PEIR, the personal environmental impact report, as a platform for participatory sensing systems research
PEIR, the Personal Environmental Impact Report, is a participatory sensing application that uses location data sampled from everyday mobile phones to calculate personalized estima...
Min Mun, Sasank Reddy, Katie Shilton, Nathan Yau, ...