نتایج جستجو برای: data hiding

تعداد نتایج: 2414701  

2012
Phan Trung Huy Nguyen Hai Thanh Cheonsick Kim

In this paper, we show the role of modules over rings of finite characteristics in data hiding area. Applications of correcting codes and covering functions in data hiding are shown as special cases of our module approach. Applications of modules over rings of characteristic 2 to design new embedding schemes for hiding secret data in binary images are introduced.

2016
M. Nagarajan

Data hiding is also known as data encapsulation or information hiding, it reduces system complexity for increased robustness .Proposed approach provides optimal solution for performing data hiding. The goal of data hiding technique is to embed the secret data into the cover image with minimum changes in the pixel values. Here the secret data is generated and embedded into the cover image by ran...

Journal: :IEEE Trans. Computers 2002
Yu-Chee Tseng Hsiang-Kuang Pan

ÐIn an earlier paper [4], we proposed a steganography scheme for hiding a piece of critical information in a host binary image. That scheme ensures that, in each m n image block of the host image, as many as blog2…mn‡ 1†c bits can be hidden in the block by changing at most 2 bits in the block. In this paper, we propose a new scheme that improves [4] in its capability to maintain higher quality ...

Journal: :Symmetry 2018
Yanjun Liu Chin-Chen Chang Peng-Cheng Huang Cheng-Yi Hsu

Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD) which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hi...

2001
Chuhong Fei Deepa Kundur Raymond H. Kwong

In this paper, we determine the watermark domain that maximizes data hiding capacity. We focus on the situation in which the watermarked signal undergoes lossy compression involving quantization in a specified compression domain. A novel linear model for the process of quantization is proposed which leads to analytical results estimating the data hiding capacity for various watermarking domains...

2012
Vikram Singh S. P. Singh Anand Mohan

This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage’s DCT coefficient probability plots, thus making the presence of hidd...

Journal: :I. J. Network Security 2012
Li-Chin Huang Lin-Yu Tseng Min-Shiang Hwang

Reversible data hiding plays an important role in medical image systems. Many hospitals have already applied the electronic medical information in healthcare systems. Reversible data hiding is one of the feasible methodologies to protect the individual privacy and confidential information. With application in several high quality medical devices, the detection rate of diseases and treating are ...

2014
Richa Khare Rachana Mishra

-Information Hiding is a method of hiding secret messages into a cover-media such that an intended observer will not be aware of the existence of hidden messages. In such applications various file formats are used as cover-object which contains confidential data. Steganography provide security and make safe the data of very important significance. Video Steganography is the technique of hiding ...

2013

This work proposes a Secure and authenticated discrete reversible data hiding in cipher images deals with security and authentication. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then , a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some addition...

2012
Preeti Jain Vijay Kumar Trivedi

A secure data transfer is limited due to its attack made on data communication internet community. Audio data hiding can be used anytime you want to hide data. There are many reasons to hide data but most important is to prevent unauthorized persons from becoming aware of the existence of a message. Hidden message is information that is not immediately noticeable, and that must be discovered or...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید