Sciweavers

18374 search results - page 25 / 3675
» Applications for data hiding
Sort
View
ICIAR
2007
Springer
14 years 11 months ago
Reversible Data Hiding for JPEG Images Based on Histogram Pairs
Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai,...
DI
2006
54views more  DI 2006»
14 years 9 months ago
Data hiding in the NTFS file system
Ewa Huebner, Derek Bem, Cheong Kai Wee
IJNSEC
2007
193views more  IJNSEC 2007»
14 years 9 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi
126
Voted
TIFS
2008
133views more  TIFS 2008»
14 years 9 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas