Sciweavers

7084 search results - page 25 / 1417
» Hiding Information in Images
Sort
View
104
Voted
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Block-Based Lossless Data Hiding in Delta Domain
Digital watermarking is one of the ways to prove the ownership and the authenticity of the media. However, some applications, such as medical and military, are sensitive to distor...
Shu-Kei Yip, Oscar C. Au, Hoi-Ming Wong, Chi-Wang ...
98
Voted
ICIP
2006
IEEE
16 years 2 months ago
Cover Selection for Steganographic Embedding
The primary goal of image steganography techniques has been to maximize embedding rate while minimizing the detectability of the resulting stego images against steganalysis techni...
Mehdi Kharrazi, Taha Taha Sencar, Nasir D. Memon
80
Voted
JMM2
2008
103views more  JMM2 2008»
15 years 22 days ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
103
Voted
ICIP
2004
IEEE
16 years 2 months ago
Rotation and cropping resilient data hiding with zernike moments
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
Palak K. Amin, Koduvayur P. Subbalakshmi
IJNSEC
2007
193views more  IJNSEC 2007»
15 years 20 days ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi