نتایج جستجو برای: low order bits embedding

تعداد نتایج: 2071507  

2014
Mandeep Singh Neetu Sharma

Digital watermark is a type of technology that embeds copyright information into digital image. Digital Watermarking works by hiding information inside digital data, such that it cannot be noticed without any software help with the purpose of building sure the covered data is present in all copies of the information that are completed whether legally or if not, in spite of efforts to scratch or...

Journal: :JIPS 2013
Mamta Juneja Parvinder Singh Sandhu

This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embeddin...

2015
P. R. Sonawane S. D. Nagrale

Reversible image watermarking enables the embedding of copyright or useful information in a host image without any loss of information. Here a novel technique to improve the embedding capacity i.e. reversible watermarking using an adaptive prediction error expansion & pixel selection is proposed. This work is an improvement in conventional Prediction Error Expansion by adding two new techniques...

2015
Yan Zhang Yao Zhao Shikui Wei Zhenfeng Zhu

Binary code embedding methods can effectively compensate the quantization error of bag-of-words (BoW) model and remarkably improve the image search performance. However, the existing embedding schemes commonly generate binary code by projecting local feature from original feature space into a compact binary space. The spatial relationship between the local feature and its neighbors are ignored....

Journal: :Computer Vision and Image Understanding 2014

Journal: :J. Inf. Sci. Eng. 2010
Gin-Der Wu Pang-Hsuan Huang

This work presents a novel robust wavelet-tree-based watermarking method based on structure-based quantization. Wavelet-trees are arranged into super-trees. The watermark bits are then embedded into the super-trees by using the proposed structure-based quantization method. Next, the super-trees are quantized into a significant structure according to these bits. The quantized super-tree has a st...

Journal: :American journal of physiology. Renal physiology 2000
G F DiBona S Y Jones L L Sawin

Nonlinear dynamic analysis was used to examine the chaotic behavior of renal sympathetic nerve activity in conscious rats subjected to either complete baroreceptor denervation (sinoaortic and cardiac baroreceptor denervation) or induction of congestive heart failure (CHF). The peak interval sequence of synchronized renal sympathetic nerve discharge was extracted and used for analysis. In contro...

Journal: :Journal of Multimedia 2012
Yifeng Sun Danmei Niu Guangming Tang Zhanzhan Gao

This paper proposes an optimized LSB matching steganography based on Fisher Information. The embedding algorithm is designed to solve the optimization problem, in which Fisher information is the objective function and embedding transferring probabilities are variables to be optimized. Fisher information is the quadratic function of the embedding transferring probabilities, and the coefficients ...

Kooroush Manochehri Sahar Darvish Motevali

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

Journal: :CoRR 2018
Hanzhou Wu Wei Wang Jing Dong Hongxia Wang

The conventional reversible data hiding (RDH) algorithms often consider the host as a whole to embed a payload. In order to achieve satisfactory rate-distortion performance, the secret bits are embedded into the noise-like component of the host such as prediction errors. From the rate-distortion view, it may be not optimal since the data embedding units use the identical parameters. This motiva...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید