نتایج جستجو برای: low order bits embedding
تعداد نتایج: 2071507 فیلتر نتایج به سال:
In steganography, we always hope to maximize the embedding payload subject to an upper-bounded distortion. We need suitable distortion measurement to evaluate the embedding impact. However, different distortion functions exposes different levels of distortion evaluation, implying that we have different optimization distributions by applying different distortion functions. In applications, the e...
The numbers of information bits to be embedded into each block are equal in current image watermarking algorithms. The sensitive positions are overly embedded while the insensitive ones are not fully utilized with a certain amount of information bits, which limits the effect of embedding the information. A new image watermarking algorithm is proposed by adaptively determining the number of info...
This paper presents an additive watermarking technique for grey scale pictures. It consists in secretly embedding copyright information (a binary code) into the picture without degrading its quality. Those bits are encoded through the phase of Maximal Length Sequences (MLS). MLS are binary sequences with good correlation properties. The result of the autocorrelation is much greater than crossco...
High embedding capacity and low image distortion factors are main concerns of information hiding researchers. No scheme can achieve these two factors simultaneously. The purpose of achieving either high embedding capacity or low image distortion varies from application to application. This paper presents a high embedding capacity information hiding method for grayscale images. The proposed meth...
A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...
: Steganography is an art and science of writing hidden messages in such a way that no one apart from the intended recipient knows the existence of the message.The maximum number of bits that can be used for LSB audio steganography without causing noticeable perceptual distortion to the host audio signal is 4 LSBs, if 16 bits per sample audio sequences are used.We propose two novel approaches o...
This paper presents an additive watermarking technique for grey-scale pictures. It consists in secretly embedding copyright information (a binary code) into the picture without degrading its quality. Those bits are encoded through the phase of maximal length sequences (MLS). MLS are binary sequences with good correlation properties. The result of the autocorrelation is much greater than crossco...
Directly embedding the secret data into the VQ-compressed domain is practical for reducing storage and transmittal bandwidth. Many steganography techniques are currently exploited for the VQ index table. However, embedding strategies extend the amount of compression needed for embedding secret data and distort the original quality of the VQ decompressed image. To satisfy the essentials of incre...
In this paper, an overlapping codeword clustering based data hiding scheme is presented. In this scheme, a mapping table is designed to determine the overlapping codeword clustering and to indicate the index modification in the secret embedding. The mapping table explores the relationship among the sub-codebook’s size, the codeword’s order and the embedding secret message to which the codeword ...
A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید