نتایج جستجو برای: low order bits embedding
تعداد نتایج: 2071507 فیلتر نتایج به سال:
Digital watermark is a type of technology that embeds copyright information into digital image. Digital Watermarking works by hiding information inside digital data, such that it cannot be noticed without any software help with the purpose of building sure the covered data is present in all copies of the information that are completed whether legally or if not, in spite of efforts to scratch or...
This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embeddin...
Reversible image watermarking enables the embedding of copyright or useful information in a host image without any loss of information. Here a novel technique to improve the embedding capacity i.e. reversible watermarking using an adaptive prediction error expansion & pixel selection is proposed. This work is an improvement in conventional Prediction Error Expansion by adding two new techniques...
Binary code embedding methods can effectively compensate the quantization error of bag-of-words (BoW) model and remarkably improve the image search performance. However, the existing embedding schemes commonly generate binary code by projecting local feature from original feature space into a compact binary space. The spatial relationship between the local feature and its neighbors are ignored....
This work presents a novel robust wavelet-tree-based watermarking method based on structure-based quantization. Wavelet-trees are arranged into super-trees. The watermark bits are then embedded into the super-trees by using the proposed structure-based quantization method. Next, the super-trees are quantized into a significant structure according to these bits. The quantized super-tree has a st...
Nonlinear dynamic analysis was used to examine the chaotic behavior of renal sympathetic nerve activity in conscious rats subjected to either complete baroreceptor denervation (sinoaortic and cardiac baroreceptor denervation) or induction of congestive heart failure (CHF). The peak interval sequence of synchronized renal sympathetic nerve discharge was extracted and used for analysis. In contro...
This paper proposes an optimized LSB matching steganography based on Fisher Information. The embedding algorithm is designed to solve the optimization problem, in which Fisher information is the objective function and embedding transferring probabilities are variables to be optimized. Fisher information is the quadratic function of the embedding transferring probabilities, and the coefficients ...
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
The conventional reversible data hiding (RDH) algorithms often consider the host as a whole to embed a payload. In order to achieve satisfactory rate-distortion performance, the secret bits are embedded into the noise-like component of the host such as prediction errors. From the rate-distortion view, it may be not optimal since the data embedding units use the identical parameters. This motiva...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید