Sciweavers

7084 search results - page 25 / 1417
» Hiding Information in Images
Sort
View
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Block-Based Lossless Data Hiding in Delta Domain
Digital watermarking is one of the ways to prove the ownership and the authenticity of the media. However, some applications, such as medical and military, are sensitive to distor...
Shu-Kei Yip, Oscar C. Au, Hoi-Ming Wong, Chi-Wang ...
ICIP
2006
IEEE
15 years 11 months ago
Cover Selection for Steganographic Embedding
The primary goal of image steganography techniques has been to maximize embedding rate while minimizing the detectability of the resulting stego images against steganalysis techni...
Mehdi Kharrazi, Taha Taha Sencar, Nasir D. Memon
65
Voted
JMM2
2008
103views more  JMM2 2008»
14 years 9 months ago
A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing
To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a novel steganographic approach using tri-way pixel-value dif...
Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, Te...
ICIP
2004
IEEE
15 years 11 months ago
Rotation and cropping resilient data hiding with zernike moments
Most digital data hiding schemes are sensitive to simple geometric attacks namely rotation, cropping, and scaling. Of these, rotational attacks possess the capability to not only ...
Palak K. Amin, Koduvayur P. Subbalakshmi
IJNSEC
2007
193views more  IJNSEC 2007»
14 years 9 months ago
Statistical Attack Resilient Data Hiding
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi