نتایج جستجو برای: data hiding

تعداد نتایج: 2414701  

2014
TINA BABU MEENU MATHEW MEHBOOBA P SHAREEF NIMISHA ABRAHAM

Data hiding in video is an important research issue as the traditional methods are error prone and leads to distortion. However, most of the video data hiding methods utilize uncompressed video data. Recent video data hiding techniques are focused on the characteristics generated by video compressing standards. A new blind data hiding method is proposed based on a novel concept of forbidden zon...

Journal: :Journal of Artificial Intelligence 2016

2002
Fernando Pérez-González Félix Balado

In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spread-spectrum methods. The method is based in quantizing a diversity projection of the host signal, inspired in the statistic used for detection in spread-spectrum algorithms. We carry on a theoretical analysis of QP to...

2014
Wen-Chung Kuo Sheng-Yi Chang

The rising popularity of Internet provides convenience while also raising the risk of disclosure from the viewpoint of information security. In particular, steganography is a common way to safeguard information because it can be used to embed the secret data into the meaningful message and the attacker cannot find it out. In order to increase embedding capacity and maintain others desirable ste...

Journal: :CoRR 2018
Hanzhou Wu Wei Wang Jing Dong Hongxia Wang

The conventional reversible data hiding (RDH) algorithms often consider the host as a whole to embed a payload. In order to achieve satisfactory rate-distortion performance, the secret bits are embedded into the noise-like component of the host such as prediction errors. From the rate-distortion view, it may be not optimal since the data embedding units use the identical parameters. This motiva...

2009
Józef Lubacz Wojciech Mazurczyk Krzysztof Szczypiorski

The paper presents and compares steganographic techniques that can be used to enable hidden communication within computer networks. A new class – “steganophony” – of such methods is introduced. Specific methods proposed by the authors – LACK, HICCUPS and SIP-based VoIP protocols’ steganography – are briefly described.

Journal: :SIAM Journal of Applied Mathematics 2011
Stephen Peppin Apala Majumdar Robert Style Graham Sander

We develop a mathematical model of frost heave in colloidal soils. The theory accounts for heave and consolidation, while not requiring a frozen fringe assumption. Two solidification regimes occur: a compaction regime in which the soil consolidates to accommodate the ice lenses, and a heave regime during which liquid is sucked into the consolidated soil from an external reservoir, and the added...

2002
Mehmet Utku Celik Gaurav Sharma Eli Saber A. Murat Tekalp

We present a novel reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known LSB (least significant bit) modification is proposed as the data embedding method, which introduces additional operating points on the capacity-distortion curve. Lossless recovery ...

Journal: :IEEE Trans. Information Theory 2002
David P. DiVincenzo Debbie W. Leung Barbara M. Terhal

We expand on our work on Quantum Data Hiding [1] – hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits ca...

2002
Boris Shimanovsky Jessica Feng Miodrag Potkonjak

Just like disk or RAM, DNA and RNA can store vast amounts of information, and just like data stored in digital media, DNA data can be easily copied or tampered with. However, unlike in the digital realm, there are no techniques for watermarking, annotating, or encrypting information in DNA and RNA. The ability to catalogue genes, place checksums, watermark, and otherwise protect intellectual pr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید