Sciweavers

21 search results - page 3 / 5
» Secure data hiding in binary document images for authenticat...
Sort
View
IEEEMSP
2002
IEEE
125views Multimedia» more  IEEEMSP 2002»
13 years 10 months ago
Wireless multimedia error resilience via a data hiding technique
Abstract—Transmission of digital contents in unavoidable noiseprone environments demands sophisticated error detection and concealment techniques to restore the perceptual qualit...
Chun-Shien Lu
ICIP
2008
IEEE
14 years 7 months ago
Adaptive decoding for halftone orientation-based data hiding
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Orhan Bulan, Gaurav Sharma, Vishal Monga
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
13 years 10 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
JDCTA
2008
535views more  JDCTA 2008»
13 years 5 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 7 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...