نتایج جستجو برای: histogram modification

تعداد نتایج: 140204  

Journal: :I. J. Network Security 2014
Qian Mao Chin-Chen Chang Ting-Feng Chung

A reversible information hiding scheme that is suitable for embedding small amounts of data is proposed in this paper. The secret data are transformed to basek data stream, and each number is embedded into a pixel pair if the pixels’ difference is within a certain range. Referring a pre-determined table, the gray values of the pixel pair are modified so as to carry the secret number. In order t...

2014
R. Neeraja M. Gnana Priya

A Novel method of Stegnography to achieve Reversible Data Hiding (RDH) is proposed using Histogram Modification (HM). In this paper the HM technique is revisited and a general framework to construct HM-based RDH is presented by simply designing the shifting and embedding functions on the cover image. The Secret Image is embedded inside the cover image using several steps of specific shifting of...

2004
Sang-Kwang Lee Young-Ho Suh Yo-Sung Ho

In this paper, we propose a new lossless data hiding method where distortion due to data embedding can be completely removed from the watermarked image after the watermark has been extracted. In the proposed method, we utilize characteristics of the difference image and modify pixel values slightly to embed the data. We show that the lower bound of the PSNR (peak-signal-to-noise-ratio) values f...

2002
Guorong Xuan Jidong Chen Jiang Zhu Yun Q. Shi Zhicheng Ni Wei Su

This paper proposes a novel data hiding algorithm having large data hiding rate based on integer wavelet transform, which can recover original image without any distortion from the marked image after the hidden data have been extracted. This algorithm hides the data and the overhead data representing the bookkeeping information into a middle bit-plane of the integer wavelet coefficients in high...

2013
Zhenxing Qian Xiyu Han Xinpeng Zhang

This work proposes a novel scheme of separable reversible data hiding for encrypted image using histogram modification. After the original image is encrypted by the sender, the data-hider embeds the secret message into the encrypted image by a histogram modification and n-nary data hiding scheme. On the receiver side, the secret message can be extracted by the embedding key, and the original im...

Journal: :Journal of Circuits, Systems, and Computers 2003
György Cserey Csaba Rekeczky Péter Földesy

This paper describes parallel histogram modification techniques with embedded morphological preprocessing methods within the CNN-UM framework. The procedure is formulated in terms of nonlinear partial differential equations (PDE) and approximated through finite differences in space, resulting in coupled nonlinear ordinary differential equations (ODE). The I/O mapping of the system (containing b...

Journal: :IEICE Electronic Express 2007
Mehdi Fallahpour Mohammad Hosein Sedaaghi

This letter introduces a lossless reversible data hiding method. The original image is recovered without any distortion from the marked image following the extraction of the hidden data. The main algorithm is based on the relocation of zeros (or minima) and peaks of the histograms of the blocks of the original image to embed the data. It leads to the modification of the grey values of some pixe...

2013
Nader H. H. Aldeeb Ibrahim S. I. Abuhaiba

In this paper, we propose a Copyright Protection (CP) watermarking scheme, which is a robust, blind, and reversible watermarking scheme; aimed at protecting the copyright of color images against geometrical attacks. It is a development of an already existing watermarking scheme. Watermark embedding in this scheme, as well as in its counterpart, mainly depends on the permutation of the histogram...

2016
Silpa Rajan Minu Lalitha Madhavu

© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 761 REVERSIBLE DATA HIDING BY HISTOGRAM MODIFICATION FOR IMAGE CONTRAST ENHANCEMENT Silpa Rajan1, Minu Lalitha Madhavu2 1Silpa Rajan, Pursuing Mtech at Sree Buddha college of Engineering , Pattoor, Kerala, India 2Minu Lalitha Madhavu , Assistant Professor , Dept. of Computer Science Engineering, Sree Buddha Colle...

1979
BERTHOLD K. P. HORN ROBERT J. WOODHAM

Before images obtained by multisensor cameras can be used in image analysis, corrections must be introduced for the differences in the gain or transfer functions of the sensors. Methods are here presented for obtaining the required information directly from the statistics of the sensor outputs. The assumption is made that the probability distribution of scene radiances seen by each sensor is th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید