نتایج جستجو برای: data hiding
تعداد نتایج: 2414701 فیلتر نتایج به سال:
Data hiding in video is an important research issue as the traditional methods are error prone and leads to distortion. However, most of the video data hiding methods utilize uncompressed video data. Recent video data hiding techniques are focused on the characteristics generated by video compressing standards. A new blind data hiding method is proposed based on a novel concept of forbidden zon...
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spread-spectrum methods. The method is based in quantizing a diversity projection of the host signal, inspired in the statistic used for detection in spread-spectrum algorithms. We carry on a theoretical analysis of QP to...
The rising popularity of Internet provides convenience while also raising the risk of disclosure from the viewpoint of information security. In particular, steganography is a common way to safeguard information because it can be used to embed the secret data into the meaningful message and the attacker cannot find it out. In order to increase embedding capacity and maintain others desirable ste...
The conventional reversible data hiding (RDH) algorithms often consider the host as a whole to embed a payload. In order to achieve satisfactory rate-distortion performance, the secret bits are embedded into the noise-like component of the host such as prediction errors. From the rate-distortion view, it may be not optimal since the data embedding units use the identical parameters. This motiva...
The paper presents and compares steganographic techniques that can be used to enable hidden communication within computer networks. A new class – “steganophony” – of such methods is introduced. Specific methods proposed by the authors – LACK, HICCUPS and SIP-based VoIP protocols’ steganography – are briefly described.
We develop a mathematical model of frost heave in colloidal soils. The theory accounts for heave and consolidation, while not requiring a frozen fringe assumption. Two solidification regimes occur: a compaction regime in which the soil consolidates to accommodate the ice lenses, and a heave regime during which liquid is sucked into the consolidated soil from an external reservoir, and the added...
We present a novel reversible (lossless) data hiding (embedding) technique, which enables the exact recovery of the original host signal upon extraction of the embedded information. A generalization of the well-known LSB (least significant bit) modification is proposed as the data embedding method, which introduces additional operating points on the capacity-distortion curve. Lossless recovery ...
We expand on our work on Quantum Data Hiding [1] – hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits ca...
Just like disk or RAM, DNA and RNA can store vast amounts of information, and just like data stored in digital media, DNA data can be easily copied or tampered with. However, unlike in the digital realm, there are no techniques for watermarking, annotating, or encrypting information in DNA and RNA. The ability to catalogue genes, place checksums, watermark, and otherwise protect intellectual pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید