Sciweavers

7084 search results - page 10 / 1417
» Hiding Information in Images
Sort
View
70
Voted
ICIP
2006
IEEE
15 years 3 months ago
Forbidden Zone Data Hiding
Ersin Esen, A. Aydin Alatan
IH
1998
Springer
15 years 1 months ago
Information Hiding to Foil the Casual Counterfeiter
Abstract. Security documents (currency, treasury bills, stocks, bonds, birth certificates, etc.) provide an interesting problem space for investigating information hiding. Recent a...
Daniel Gruhl, Walter Bender
CORR
2010
Springer
171views Education» more  CORR 2010»
14 years 9 months ago
Recursive Information Hiding in Visual Cryptography
: Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret shar...
Sandeep Katta
80
Voted
IH
2005
Springer
15 years 3 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...
IEEEIAS
2007
IEEE
15 years 4 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei