نتایج جستجو برای: data hiding

تعداد نتایج: 2414701  

2014
Minaxi Doorwar

Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and steganography etc. One of these is datahiding, using this concept we can provide security, authentication to the system. Data hiding cannot recover original cover. While Re...

2011
Chia-Chen Lin Pei-Feng Shiu

To enhance the hiding capacity of DCT-based images, in this paper we propose a new data hiding scheme based on a notation transformation concept. Without considering the reversibility function, experimental results confirm that the hiding capacity provided by our designed data hiding strategy is not only higher than that provided by the Iwata et al.’s, Chang et al.’s and Lin et al.’s schemes bu...

Journal: :Bulletin of Electrical Engineering and Informatics 2019

Journal: :IEEE Transactions on Information Forensics and Security 2021

Recent advances in intelligent surveillance systems have enabled a new era of smart monitoring wide range applications from health to homeland security. However, this boom data gathering, analyzing and sharing brings also significant privacy concerns. We propose Compressive Sensing (CS) based encryption that is capable both obfuscating selected sensitive parts documents compressively sampling, ...

2009
Woong Hee Kim

Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the data. A lot of steganography algorithms have been proposed recently. Many of them use the digital image data as a carrier. In data hiding scheme of halftoning and coordinate projection, still image data is used as a carrier, and the data of carrier image ar...

2015
Sanjay Sharma Hafeez M. A. Malik Yun Q. Shi N. Ansari C. W. Honsinger P. W. Jones M. Rabbani G. S. Sravanthi

Security has become an important issue with the proliferation of digital communication. Multimedia sources such as images plays an important role in security of data communication. Data hiding technique can be used to implant secret data in host images where existence of data is undisclosed which reduces chances of unauthorized access. Some applications containing legal considerations require r...

Journal: :I. J. Network Security 2007
Zhensong Liao Yan Huang Chisong Li

To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models and several statistical host data models have been considered by the application of information theory. Based on the foundation, a solution is given to the problem about how many bits can be hidden in host data transp...

Journal: :I. J. Network Security 2007
Palak K. Amin Ning Liu K. P. Subbalakshmi

In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum based data-hiding algorithms, the proposed algorithm does not introduce a low-pass filtering effect in the histogram of the stego image. The distance between the center of gravity (CoG) as defined by [14] of the unmarked h...

Journal: :TIIS 2013
Wen-Chung Kuo

In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when th...

2013
Fahd Alharbi

Data hiding is the process of embedding data into a media form such as image, voice, and video. The Lest Significant Bit (LSB) is consider as the most widely used embedding technique. LSB embeds the secret message's bits into the least significant bit plane of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and att...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید