Results 1 - 10
of
226,480
A Data Hiding Method for Few-Color Images
- Proceedings IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '02), Volume: 4, PP 3469–3472
, 2002
"... The few-color images are often synthetic graphics without complicated color and texture variation, which makes the embedding of invisible digital watermark difficult. This paper proposes a data hiding method that can hide a moderate amount of data in a few-color image, such as cartoon images, binary ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The few-color images are often synthetic graphics without complicated color and texture variation, which makes the embedding of invisible digital watermark difficult. This paper proposes a data hiding method that can hide a moderate amount of data in a few-color image, such as cartoon images
Worst Case Additive Attack against Quantization-Based Data-Hiding Methods
, 2005
"... The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantization-based methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known as ..."
Abstract
-
Cited by 13 (4 self)
- Add to MetaCart
The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantization-based methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known
Data-Hiding Method using Digital Watermark in the Public Multimedia Network
"... Abstract: In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these pro ..."
Abstract
- Add to MetaCart
these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents
Robust Data Hiding Method for Palette Images Using Double Messages Embedding
"... Abstract. The commonly used JPEG and GIF images on Internet web sites have become more popular for steganographic applications. However, the use of lossy image compression will destroy the embedded message on the marked images. This article presents a novel data hiding method for palette images whic ..."
Abstract
- Add to MetaCart
Abstract. The commonly used JPEG and GIF images on Internet web sites have become more popular for steganographic applications. However, the use of lossy image compression will destroy the embedded message on the marked images. This article presents a novel data hiding method for palette images
A DCT-BASED DATA-HIDING METHOD TO EMBED THE COLOR INFORMATION IN A JPEG GREY LEVEL IMAGE
"... In this paper, we propose an original method to embed the color information of an image in a corresponding compressed grey-level image. The objective of this work is to allow free access to the compressed grey-level image and give color im-age access only if you own a secret key. This method is made ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
be robust to data hiding, we propose an original K color ordering algo-rithm. Finally, the DCT-based data-hiding method benefits from the used of an hybrid JPEG coder which allows to com-press images with a Word Wide Web standard format and in the same time proposes a data-hiding functionality. 1.
Rational dither modulation: a novel data-hiding method robust to value-metric attacks
- In In IEEE International Workshop on Multimedia Signal Processing
, 2004
"... Abstract — A novel quantization-based data-hiding method, named Rational Dither Modulation (RDM), is presented. This method amounts to simple modifications of the well-known Dither Modulation (DM) scheme, which is largely vulnerable to scaling attacks. With such modifications, RDM becomes invariant ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Abstract — A novel quantization-based data-hiding method, named Rational Dither Modulation (RDM), is presented. This method amounts to simple modifications of the well-known Dither Modulation (DM) scheme, which is largely vulnerable to scaling attacks. With such modifications, RDM becomes invariant
A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ 171 A Lossy Compression Tolerant Data Hiding Method Based on JPEG and VQ
"... A lossy compression tolerant data hiding method is proposed in this paper. The image which hides data is named a stego-image. Most of data hiding methods will lose some hidden data when the stego-image is compressed by lossy compression process. However, there are few people will transmit image with ..."
Abstract
- Add to MetaCart
A lossy compression tolerant data hiding method is proposed in this paper. The image which hides data is named a stego-image. Most of data hiding methods will lose some hidden data when the stego-image is compressed by lossy compression process. However, there are few people will transmit image
Rational Dither Modulation: A High-Rate Data-Hiding Method Invariant to Gain Attacks
"... A novel quantization-based data-hiding method, named Rational Dither Modulation (RDM) is pre-sented. This method retains most of the simplicity of the dither modulation (DM) scheme, which is largely vulnerable to amplitude scalings, but modifies the latter in such a way that it becomes invariant to ..."
Abstract
- Add to MetaCart
A novel quantization-based data-hiding method, named Rational Dither Modulation (RDM) is pre-sented. This method retains most of the simplicity of the dither modulation (DM) scheme, which is largely vulnerable to amplitude scalings, but modifies the latter in such a way that it becomes invariant
Results 1 - 10
of
226,480