Sciweavers

381 search results - page 29 / 77
» Error-Correcting Codes in Steganography
Sort
View
VTC
2007
IEEE
15 years 6 months ago
Distance Spectrum Calculation of Symbol Punctured Trellis Coded Modulation
— A special kind of symbol-wise puncturing is applied to the code symbols of a constituent trellis coded modulation (TCM) within two very bandwidth-efficient concatenated coding...
Axel Hof
IH
2005
Springer
15 years 5 months ago
Efficient Wet Paper Codes
Abstract. Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipien...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
SECRYPT
2007
121views Business» more  SECRYPT 2007»
15 years 1 months ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
ICIP
2005
IEEE
16 years 1 months ago
The role of the virtual channel in distributed source coding of video
In distributed video source coding side-information at the decoder is generated as a temporal prediction based on previous frames. This creates a virtual dependency channel betwee...
Ronald P. Westerlaken, Rene Klein Gunnewiek, Inald...
ICIP
2002
IEEE
16 years 1 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang