Sciweavers


Publication
270views
12 years 3 months ago
A Data Hiding Scheme Based on LBPROT Pattern
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been appl...
E. E. Varsaki, V. Fotopoulos, A. N. Skodras

Publication
260views
12 years 4 months ago
Alternative Astronomical FITS Imaging
Some important information on images of radio sources, such as radio flux and the noise of the map, is not easily accessible by astronomers other than radio astronomers, unless the...
E.E. Varsaki, N.A.B. Gizani, V. Fotopoulos and A.N...

Publication
295views
13 years 1 months ago
 Self-Authentication Of Natural Color Images In Pascal Transform Domain
This paper proposes a self-authentication scheme for color images, using a fragile data hiding method based on the Discrete Pascal Transform (DPT). The main contribution of this wo...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras

Publication
314views
13 years 1 months ago
On the use of discrete Pascal transform in hiding data in images
The Discrete Pascal Transform (DPT) has been proved remarkably useful for edge detection, filter design, discrete-time signal interpolation and data hiding. In the present work a n...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras

Presentation
945views
13 years 2 months ago
On the use of discrete Pascal transform in hiding data in images
The Discrete Pascal Transform (DPT) has been proved remarkably useful for edge detection, filter design, discrete-time signal interpolation and data hiding. In the present work a n...
SPIESR
1998
239views Database» more  SPIESR 1998»
13 years 6 months ago
Robust Embedded Data from Wavelet Coefficients
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using signature images that could be as much as 25% of the h...
Jong Jin Chae, B. S. Manjunath
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
13 years 11 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
ISM
2006
IEEE
93views Multimedia» more  ISM 2006»
13 years 11 months ago
Worst Case Attack on Quantization Based Data Hiding
Currently, most quantization based data hiding algorithms are built assuming specific distributions of attacks, such as additive white Gaussian noise (AWGN), uniform noise, and s...
Ning Liu, K. P. Subbalakshmi
ICIP
2007
IEEE
13 years 11 months ago
Infinity-Norm Rotation for Reversible Data Hiding
In this paper, we propose a novel transform that preserves the dynamic range—infinity-norm rotation. This transform is perfectly reversible and piecewise linear, and keeps the m...
Lei Yang, Pengwei Hao
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
13 years 11 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung