نتایج جستجو برای: low order bits embedding

تعداد نتایج: 2071507  

2011
Jobin Abraham

This paper proposes a novel method for watermarking gray scale images in spatial domain by modifying the least significant bits of the pixels in the image. The embedding process creates a watermarked image with hidden information that in future can proclaim its ownership details. Data to be embedded is integrated in the image selectively on a subset of pixels using a rule that replaces the LSB’...

2003
Kaliappan Gopalan

A method of embedding a covert audio message in a cover utterance for secure communication is presented. The covert message is represented in a compressed form with possibly encryption and/or encoding for added security. One bit in each of the samples of a given cover utterance is altered in accordance with the data bits and a key. The same key is used to retrieve the embedded bits at the recei...

2008
Andreas Westfeld

There are several powerful steganalytic methods for images in the spatial domain, which are based on higher order statistics. We propose a generic methodology to prepare higher order steganalytic methods from spatial domain for application in the transformed domain. This paper presents 72 new systematically designed methods that are derived from the spatial domain. Their reliability and the pre...

2013
Biswapati Jana Debasis Giri Shymal Kumar Mondal Pabitra Pal B. Jana D. Giri S. K. Mondal P. Pal

In this paper, a new approach of image steganography using twodimensional Cellular Automata (2D-CA) has been proposed for a confidential message. We convert the message in such a way that message length becomes 1024 bits after padding some bits. If message size is more than 1024 bits, we subdivide the message of length 1024 bits using padding technique. Convert original message by XORing with s...

Journal: :IJIIS: International Journal of Informatics and Information Systems 2022

In this paper, we propose a high capacity data hiding method applying in binary images. Since image has only two colors, black or white, it is hard to hide imperceptible. The capacities and imperception are always trade-off problem. Before embedding shuffle the secret by pseudo-random number generator keep more secure. We divide host into several non-overlapping (2n+1) sub-blocks an M N as many...

2002
Andreas Westfeld

This paper shows three approaches for detecting steganograms with low change density. MP3Stego is a steganographic algorithm with a very low embedding rate. The attack presented here is a statistical analysis of block sizes. It is able to detect 0.001 % of steganographic payload in MP3 files. The second approach is the use of hash functions to combine sample categories for the chi-square attack...

2008
Pei-Ju Chiang Aravind K. Mikkilineni Sungjoo Suh Edward J. Delp Jan P. Allebach George T.-C. Chiu

Printer identification based on printed documents can provide forensic information to protect copyright and verify authenticity. In addition to intrinsic features (intrinsic signatures) of the printer, modulating the printing process to embed specific signature (extrinsic signatures) will further extend the encoding capacity. In this paper we describe the use of laser modulation in electrophoto...

Journal: :CoRR 2016
Sjoerd Dirksen Alexander Stollenwerk

We consider the problem of encoding a finite set of vectors into a small number of bits while approximately retaining information on the angular distances between the vectors. By deriving improved variance bounds related to binary Gaussian circulant embeddings, we largely fix a gap in the proof of the best known fast binary embedding method. Our bounds also show that well-spreadness assumptions...

2016
Pooja Dwivedi Deepak Mishra

This correspondence propose a framework of reversible data hiding (RDH) in an encrypted IMAGE bit stream. unlike accessible RDH technique for encrypted spatial-domain images, the propose technique aims at encrypting a IMAGE bit stream into a appropriately prepared structure, and embed a secret message into the encrypted bit stream by slightly modifying the IMAGE stream. we have a tendency to id...

2014
Grace Selvarani

In this paper a reversible data hiding method which uses a novel algorithm based on histogram sifting is proposed. The distortion that occurs due to embedding can be completely removed during the data extraction. The proposed method uses double embedding to increase the reversibility. Location map information is embedded into the image itself, so that the reversibility can be easily achieved. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید