Sciweavers

17 search results - page 2 / 4
» Worst Case Attack on Quantization Based Data Hiding
Sort
View
ICIP
2004
IEEE
14 years 6 months ago
Rotation and cropping resilient data hiding with zernike moments
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
Palak K. Amin, Koduvayur P. Subbalakshmi
ISCIS
2003
Springer
13 years 10 months ago
Multiple Description Coding for Image Data Hiding in the Spatial Domain
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...
Mohsen Ashourian, Yo-Sung Ho
IJNSEC
2007
193views more  IJNSEC 2007»
13 years 5 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
13 years 10 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho
ICIP
2005
IEEE
14 years 7 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...