نتایج جستجو برای: low order bits embedding

تعداد نتایج: 2071507  

Journal: :I. J. Network Security 2015
Chin-Feng Lee Chin-Chen Chang Pei-Yan Pai Chia-Ming Liu

In the exploiting modification direction (EMD) method, a secret digit in (2n+1)-ary notational system is embedded into a group that is consisted of n pixels. Only one pixel in a group at most is being modified by either increasing or decreasing one. Therefore, the maximum embedding rate of EMD method is (log2(2n+1))/n when n≧2. In order to increase the embedding capacity of EMD method, a new ad...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم 1393

in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...

2014
Nuha Omran Abokhdair

Reversible watermarking is a special branch of image watermarking, that is able to recover the original image after extracting the watermark from the image. In this paper, an adaptive prediction-based reversible watermarking scheme is presented, in order to increase the payload capacity of MRI medical images. The scheme divides the image into two parts, Region of Interest (ROI) and Region of No...

2010
J. A. Briffa C. Culnane H. Treharne

In this paper we propose a new imperceptible yellow printer dot watermarking scheme for documents printed on a colour printer. The scheme takes advantage of the imperfections of the human visual system to hide thousands of yellow dots over the entire page. It takes inspiration from the methods used by laser printer manufacturers for printer identification. The novelty of our approach is in prov...

2016
Samadrita Guha Dipti Kapoor Sarmah

In this paper, we propose a dynamic approach to image steganography in the frequency domain in order to increase the hiding potential of the cover image. Concealing a secret file in another file for the sake of its safe transmission via the communication channel is the main aim of a steganography technique. Embedding small size messages in a cover image has less possibilities of hampering the q...

Journal: :Journal of Systems and Software 2009
Wien Hong Tung-Shou Chen Chih-Wei Shiu

In this paper, a reversible data hiding scheme based on modification of prediction errors (MPE) is proposed. For the existing histogram-shifting based reversible data hiding techniques, though the distortion caused by embedding is low, the embedding capacity is limited by the frequency of the most frequent pixel. To remedy this problem, the proposed method modifies the histogram of prediction e...

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

2014
Zahra Jeddi Esmaeil Amini Magdy Bayoumi

In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data bits to change the location of the plaintext bits in the transmitted data without changing their order. The location of redundant bits inside the transmitted data represents the secret key...

2014
Gaurav Suman MVNK Prasad

We propose a newmethod for digital watermarking of images based on Fractal Image Coding using Ridgelet Transform and Discrete wavelet transform (DWT). The method takes Ridgelet transform of the image to get a transformed image and performs 2-level Discrete Wavelet Transform(DWT) on the transformed image to get low frequency sub-bands LL2 and LL1. LL1 is used for range blocks and LL2 is treated ...

2010

Recently watermarking algorithm plays an important role in image forensics. One of the main applications is protect—ion of images against tampering. An algorithm that full-fills two purposes has to be designed that includes: 1) detection of tampered area of received image and 2) information recovery in the tampered zones. These tasks using watermarking are accomplished by state-of-the-art techn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید