نتایج جستجو برای: low order bits embedding
تعداد نتایج: 2071507 فیلتر نتایج به سال:
In this paper we propose a new adaptive block based compressed domain data hiding scheme which can embed relatively large number of secret bits without significant perceptual distortion in video domain. Macro blocks are selected for embedding on the basis of low inter frame velocity. From this subset, the blocks with high prediction error are selected for embedding. The embedding is done by mod...
Wet paper codes were proposed as a tool for constructing steganographic schemes with an arbitrary selection channel that is not shared between the sender and the recipient. In this paper, we describe new approaches to wet paper codes that enjoy low computational complexity and improved embedding efficiency (number of message bits per embedding change). Some applications of wet paper codes to st...
Embedding messages bits in a cover-object affects the first order statistical properties of the cover-object. In this paper a new technique is introduced to hide information bits in the redundant bits of JPEG images with preserving the statistical properties. This technique proved to defeat the visual and statistical attacks and offer higher capacity than existing steganographic systems. [Hamdy...
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
In this paper, an iterative incremental relay selection (IIRS) scheme is considered for wireless cooperative networks in order to increase the reliability of transmission. Different from the conventional incremental relay selection which incrementally selects a best relay for only one iteration; the IIRS scheme iteratively applies the incremental relaying and relay selection processes. To evalu...
In this paper, we present zero-watermarking technique for medical image based on thinning file in order to ensure the authenticity and integrity of the medical images. Medical images, different of other images, require careful attention when hiding watermark information within them because the watermark bits may be affect on the region of interest (ROI) and misdiagnose. Therefore, zero-watermar...
One digital watermarking method, based on the spread spectrum technique, is described in this paper. This method uses the frequency hopping spread spectrum in order to determine positions for watermark embedding in an original image, while the direct spread spectrum technique is used to provide robustness to the watermark signal. To embed the watermark signal, the selected bits are used to carr...
Separable Reversible Data Hiding in Encryption Image (RDH-EI) has become widely used clinical and military applications, social cloud security surveillance recent years, contributing significantly to preserving the privacy of digital images. Aiming address shortcomings works that directed achieve high embedding rate by compensating image quality, security, reversible separable properties, we pr...
A novel digital watermarking for image authentication is proposed in this paper. Most previous proposed watermarking algorithms embed sequences of random numbers as watermarks. Here images are taken as watermarks for embedding. In the proposed approach, the host image is decomposed into wavelet coefficients. Local entropies of wavelet coefficients in the low-frequency subband are calculated by ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید