نتایج جستجو برای: low order bits embedding

تعداد نتایج: 2071507  

Journal: :CoRR 2016
Han-Zhou Wu

In steganography, we always hope to maximize the embedding payload subject to an upper-bounded distortion. We need suitable distortion measurement to evaluate the embedding impact. However, different distortion functions exposes different levels of distortion evaluation, implying that we have different optimization distributions by applying different distortion functions. In applications, the e...

2013
Jianguo Jiang Yineng Zhu Qian Su

The numbers of information bits to be embedded into each block are equal in current image watermarking algorithms. The sensitive positions are overly embedded while the insensitive ones are not fully utilized with a certain amount of information bits, which limits the effect of embedding the information. A new image watermarking algorithm is proposed by adaptively determining the number of info...

2000
J. F. Delaigle C. De Vleeschouwer

This paper presents an additive watermarking technique for grey scale pictures. It consists in secretly embedding copyright information (a binary code) into the picture without degrading its quality. Those bits are encoded through the phase of Maximal Length Sequences (MLS). MLS are binary sequences with good correlation properties. The result of the autocorrelation is much greater than crossco...

Journal: :Fundam. Inform. 2008
Chin-Chen Chang Yung-Chen Chou The Duc Kieu

High embedding capacity and low image distortion factors are main concerns of information hiding researchers. No scheme can achieve these two factors simultaneously. The purpose of achieving either high embedding capacity or low image distortion varies from application to application. This paper presents a high embedding capacity information hiding method for grayscale images. The proposed meth...

Journal: :IET Information Security 2011
Yongfeng Huang Shanyu Tang Chunlan Bao Yau Jim Yip

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...

2012
Ram Mohan Reddy

: Steganography is an art and science of writing hidden messages in such a way that no one apart from the intended recipient knows the existence of the message.The maximum number of bits that can be used for LSB audio steganography without causing noticeable perceptual distortion to the host audio signal is 4 LSBs, if 16 bits per sample audio sequences are used.We propose two novel approaches o...

Journal: :Signal Processing 1998
Jean-François Delaigle Christophe De Vleeschouwer Benoit M. Macq

This paper presents an additive watermarking technique for grey-scale pictures. It consists in secretly embedding copyright information (a binary code) into the picture without degrading its quality. Those bits are encoded through the phase of maximal length sequences (MLS). MLS are binary sequences with good correlation properties. The result of the autocorrelation is much greater than crossco...

2009
Chin-Chen Chang Pei-Yu Lin Hsin-Chi Wang

Directly embedding the secret data into the VQ-compressed domain is practical for reducing storage and transmittal bandwidth. Many steganography techniques are currently exploited for the VQ index table. However, embedding strategies extend the amount of compression needed for embedding secret data and distort the original quality of the VQ decompressed image. To satisfy the essentials of incre...

Journal: :Inf. Sci. 2011
Yen-Shing Tsai Piyu Tsai

In this paper, an overlapping codeword clustering based data hiding scheme is presented. In this scheme, a mapping table is designed to determine the overlapping codeword clustering and to indicate the index modification in the secret embedding. The mapping table explores the relationship among the sub-codebook’s size, the codeword’s order and the embedding secret message to which the codeword ...

2010
Yongfeng Huang Shanyu Tang Chunlan Bao Jim Yip

A network covert channel is a passage along which information leaks across the network in violation of security policy in a completely undetectable manner. This paper reveals our findings in analysing the principle of G.723.1 codec that there are ‘unused’ bits in G.723.1 encoded audio frames, which can be used to embed secret messages. A novel steganalysis method that employs the second detecti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید