نتایج جستجو برای: low order bits embedding

تعداد نتایج: 2071507  

2015

This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1 source codec, which isused extensively in Voice over Internet Protocol (VoIP). This study reveals that, contrary to existing thought, the inactive frames of VoIP streams are more suitable for data embedding than the active frames of the st...

2014
Gayathri

A new approach of image watermarking based on RSA encryption technique for the lossless medical images has been proposed. This paper presents a strategy of attaining maximum embedding capacity in an image in a way that to determine the amount of information to be added in each pixel, maximum possible neighboring pixels are analyzed for their frequencies. The technique provides a seamless insert...

2017
Leo Ferres José Fuentes Sepúlveda Travis Gagie Meng He Gonzalo Navarro

There are many representations of planar graphs, but few are as elegant as Turán’s (1984): it is simple and practical, uses only 4 bits per edge, can handle self-loops and multi-edges, and can store any specified embedding. Its main disadvantage has been that “it does not allow efficient searching” (Jacobson, 1989). In this paper we show how to add a sublinear number of bits to Turán’s represen...

2011
Nabin Ghoshal J. K. Mandal

In this paper a novel data hiding technique in frequency domain has been proposed using Discrete Fourier Transform (DFT) for colour image authentication and secret message transmission. Image authentication is done by embedding message/image in frequency domain by choosing image blocks of size 2 × 2, called mask, from the source image in row major order and transform it into the frequency domai...

2007
Aravind K. Mikkilineni Pei-Ju Chiang George T.-C. Chiu Jan P. Allebach Edward J. Delp

In today’s digital world securing different forms of content is very important in terms of protecting copyright and verifying authenticity. One example is watermarking of digital audio and images. We believe that a marking scheme analogous to digital watermarking but for documents is very important. In this paper we describe the use of laser amplitude modulation in electrophotographic printers ...

2002
Sorina Dumitrescu Xiaolin Wu Nasir D. Memon

In this paper we present an LSB steganalysis technique that can detect the existence of hidden messages that are randomly embedded in the least significant bits of natural continuous-tone images. The technique is inspired by recent work of Fridrich et al. [1] and just like [1], it can also precisely measure the length of the embedded message, even when the hidden message is very short relative ...

2008
Won-gyum Kim Yong-seok Seo Hye-won Jung

This paper presents a new image fingerprinting scheme which embeds a multi-bits fingerprinting code and is robust against the geometric attack such as rotation, scaling and translation. We construct a 64 bits fingerprinting code and embed into wavelet subband of 512x512 images repeatedly. In order to restore an image from geometric distortion a noise reduction filter is performed and a rectilin...

2015
Wen-Chung Kuo Shao-Hung Kuo Takayoshi Kobayashi

The goal of data hiding techniques usually considers two issues, embedding capacity and image quality. Consequently, in order to achieve high embedding capacity and good image quality, a data hiding scheme combining run-length encoding (RLE) with multi-bit embedding is proposed in this paper. This work has three major contributions. First, the embedding capacity is increased 62% because the sec...

Journal: :IJDCF 2012
Lifang Yu Yun Q. Shi Yao Zhao Rongrong Ni Gang Cao

In this paper, the authors examine embedding efficiency, which influences the most concerned performance of steganography, security, directly. Embedding efficiency is defined as the number of random message bits embedded per embedding change. Recently, matrix embedding has gained extensive attention because of its outstanding performance in boosting steganographic schemes’ embedding efficiency....

2012
Youngwoon Lee Jae-Pil Heo Sung-Eui Yoon

Thanks to compact data representations and fast similarity computation, many binary code embedding techniques have been proposed for large-scale similarity search used in many computer vision applications including image retrieval. Most prior techniques have centered around optimizing a set of projections for accurate embedding. In spite of active research efforts, existing solutions suffer fro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید