نتایج جستجو برای: data hiding
تعداد نتایج: 2414701 فیلتر نتایج به سال:
Today data hacking is a very big problem in networking field. There are many security techniques available to solving this problem. There are many research processing techniques related to internet security, cryptography and steganography etc. One of these is datahiding, using this concept we can provide security, authentication to the system. Data hiding cannot recover original cover. While Re...
To enhance the hiding capacity of DCT-based images, in this paper we propose a new data hiding scheme based on a notation transformation concept. Without considering the reversibility function, experimental results confirm that the hiding capacity provided by our designed data hiding strategy is not only higher than that provided by the Iwata et al.’s, Chang et al.’s and Lin et al.’s schemes bu...
Recent advances in intelligent surveillance systems have enabled a new era of smart monitoring wide range applications from health to homeland security. However, this boom data gathering, analyzing and sharing brings also significant privacy concerns. We propose Compressive Sensing (CS) based encryption that is capable both obfuscating selected sensitive parts documents compressively sampling, ...
Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an effort to conceal the existence of the data. A lot of steganography algorithms have been proposed recently. Many of them use the digital image data as a carrier. In data hiding scheme of halftoning and coordinate projection, still image data is used as a carrier, and the data of carrier image ar...
Security has become an important issue with the proliferation of digital communication. Multimedia sources such as images plays an important role in security of data communication. Data hiding technique can be used to implant secret data in host images where existence of data is undisclosed which reduces chances of unauthorized access. Some applications containing legal considerations require r...
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models and several statistical host data models have been considered by the application of information theory. Based on the foundation, a solution is given to the problem about how many bits can be hidden in host data transp...
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum based data-hiding algorithms, the proposed algorithm does not introduce a low-pass filtering effect in the histogram of the stego image. The distance between the center of gravity (CoG) as defined by [14] of the unmarked h...
In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when th...
Data hiding is the process of embedding data into a media form such as image, voice, and video. The Lest Significant Bit (LSB) is consider as the most widely used embedding technique. LSB embeds the secret message's bits into the least significant bit plane of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and att...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید