نتایج جستجو برای: low order bits embedding
تعداد نتایج: 2071507 فیلتر نتایج به سال:
Steganography includes all the actions that must be transported out to hide and protect the secret data inside the cover image encryption. In the first step of the embedding phase, the plain text will be encrypted, there are several encryption methods that can be applied to encrypt the data, but in this situation, we need a method that does not produce a cipher text longer than the plain text. ...
Barcodes are widely utilized for embedding data in printed format to provide automated identification and tracking capabilities in a number of applications. In these applications, it is desirable to maximize the number of bits embedded per unit print area in order to either reduce the area requirements of the barcodes or to offer an increased payload, which in turn enlarges the class of applica...
In the context of data hiding reversible embedding information into printable string encoded may provide a solution to store extra bits for various applications. A previous work demonstrated how leverage unused configurations Base45 and Base85 encodings files QR-codes. this paper we show that adapting encoding byte distribution statistics file types significantly improves payload like
© 2012 ETRI Journal, Volume 34, Number 3, June 2012 A series of reversible watermarking technologies have been proposed to increase embedding capacity and the quality of the watermarked image simultaneously. The major skills include difference expansion, histogram shifting, and optimizing embedding order. In this paper, an accurate predictor is proposed to enhance the difference expansion. An e...
A new definition is proposed for the effective number of bits of an ADC. This definition removes the variation in the calculated effective bits when the amplitude and offset of the sinewave test signal is slightly varied. This variation is most pronounced when test signals with amplitudes of a small number of code bin widths are applied to very low noise ADC's. The effectiveness of the proposed...
Let us consider a case where all of the elements in some continuous slices are missing in tensor data. In this case, the nuclear-norm and total variation regularization methods usually fail to recover the missing elements. The key problem is capturing some delay/shift-invariant structure. In this study, we consider a low-rank model in an embedded space of a tensor. For this purpose, we extend a...
0-7803-7651-X/03/$17.00 © 2003 IEEE IEEEAC paper #1027, Updated November, 2002 Abstract --This paper presents the results of embedding a covert audio message in a cover audio signal for battlefield communication using steganography. Representing the covert message in a compressed or coded form, typically in the standard Global System for Mobile communication halfrate code (GSM 06.20), tones are...
This research article outlines the efficient algorithm in which secrete data are embedded in edge regions of the image. Here region selection totally depending on size of the secrete message. If less information to be embedded, then sharp regions in the image are selected for embedding bits. If the size of secrete information is large, then the more edge regions are released to accommodate all ...
This paper aims to find an effective and efficient information hiding method used for protecting secret information by embedding it in a cover media such as images. Finding the optimal set of the image pixel bits to be substituted by the secret message bits, such that the cover image is of high quality, is a complex process and there is an exponential number of feasible solutions. Two new ant-b...
In this paper we propose a new watermarking technique where the watermark is embedded according to two keys. The first key is used to embed a code bit in a block of pixels. The second is used to generate the whole sequence of code bits. The watermark is embedded in spatial domain by adding or subtracting a random digital pattern to the given image signal. The embedding depth level depends on th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید