• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 308
Next 10 →

Weighted stego-image steganalysis for JPEG covers

by Rainer Böhme - INFORMATION HIDING. LNCS 5284 , 2008
"... This paper contains two new results for the quantitative detector of LSB replacement steganography based on a weighted stegoimage (WS). First, for spatial domain steganalysis, a variant of the WS method is known to be highly accurate only when cover images have never been subject to lossy compress ..."
Abstract - Cited by 15 (2 self) - Add to MetaCart
compression. We propose a new variant of WS which increases the accuracy for JPEG pre-processed covers by one order of magnitude, thus leaving behind the best structural detectors which were known to be more robust on JPEG pre-compressed covers than WS. Second, we explain why WS-like estimators can also

Novel pre-compression rate distortion optimization algorithm of JPEG2000,” SPIE

by Yu-wei Chang, Hung-chi Fang, Chung-jr Lian, Liang-gee Chen - Proc. of Visual Communication and Image Processing , 2004
"... In this paper, a novel pre-compression rate-distortion optimization algorithm is proposed, which can reduce computation power and memory requirement of JPEG 2000 encoder. It can reduce the wasted computational power of the entropy coder (EBCOT Tier-1) and unnecessary memory requirement for the code- ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
In this paper, a novel pre-compression rate-distortion optimization algorithm is proposed, which can reduce computation power and memory requirement of JPEG 2000 encoder. It can reduce the wasted computational power of the entropy coder (EBCOT Tier-1) and unnecessary memory requirement for the code

Feature-oriented Rate Shaping of Pre-compressed Image/Video

by Wenjun Zeng, Baining Guo, Bede Liu - Proc. Inter. Conf. Image Proc , 1997
"... Rate shaping plays an important role in transmitting compressed video on a network with dynamic bandwidth. In this paper, we present a scheme for rate shaping JPEG/MPEG-precompressed image /video with feature analysis in scale space. The proposed scheme draws its strengths from a technique for ident ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Rate shaping plays an important role in transmitting compressed video on a network with dynamic bandwidth. In this paper, we present a scheme for rate shaping JPEG/MPEG-precompressed image /video with feature analysis in scale space. The proposed scheme draws its strengths from a technique

Semi-Fragile Watermarking for Authenticating JPEG Visual Content

by Ching-Yung Lin, Shih-fu Chang , 2000
"... In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation of the ..."
Abstract - Cited by 75 (8 self) - Add to MetaCart
In this paper, we propose a semi-fragile watermarking technique that accepts JPEG lossy compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. The authenticator can identify the positions of corrupted blocks, and recover them with approximation

Steganalysis of JPEG Images: Breaking the F5 Algorithm

by Jessica Fridrich, Miroslav Goljan, Dorin Hogea - in 5th International Workshop on Information Hiding , 2002
"... Abstract. In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done by decompress ..."
Abstract - Cited by 79 (5 self) - Add to MetaCart
Abstract. In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done

Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes

by Jessica Fridrich - in Proc. Inf. Hiding Workshop, Springer LNCS
"... Abstract. In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embedding mechanisms. The detection method is a linear classifier trained on feature vectors corresponding to cove ..."
Abstract - Cited by 110 (13 self) - Add to MetaCart
Abstract. In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embedding mechanisms. The detection method is a linear classifier trained on feature vectors corresponding

IMAGE TRANSMORPHING WITH JPEG

by Lin Yuan, Touradj Ebrahimi
"... Picture-related applications are extremely popular because pictures present attractive and vivid information. Nowadays, people record everyday life, communicate with each other, and enjoy entertainment using various interesting imaging applications. In many cases, processed images need to be re-cove ..."
Abstract - Add to MetaCart
version while preserving sufficient information about the original image in the processed im-age. It does this by inserting partial information about the original image in the application markers of the processed JPEG image file, so that the original image can be later re-covered. Experiments

Steganalysis Based on JPEG Compatibility

by Jessica Fridrich *a, Miroslav Goljan B, Rui Du B
"... In this paper, we introduce a new forensic tool that can reliably detect modifications in digital images, such as distortion due to steganography and watermarking, in images that were originally stored in the JPEG format. The JPEG compression leaves unique fingerprints and serves as a “fragile water ..."
Abstract - Add to MetaCart
In this paper, we introduce a new forensic tool that can reliably detect modifications in digital images, such as distortion due to steganography and watermarking, in images that were originally stored in the JPEG format. The JPEG compression leaves unique fingerprints and serves as a “fragile

Steganalysis Based on JPEG Compatibility

by Miroslav Goljanb, Rui Dub
"... In this paper, we introduce a new forensic tool that can reliably detect modifications in digital images, such as distortion due to steganography and watermarking, in images that were originally stored in the JPEG format. The JPEG compression leaves unique fingerprints and serves as a “fragile water ..."
Abstract - Add to MetaCart
In this paper, we introduce a new forensic tool that can reliably detect modifications in digital images, such as distortion due to steganography and watermarking, in images that were originally stored in the JPEG format. The JPEG compression leaves unique fingerprints and serves as a “fragile

qa-cover (1401x1991x24b jpeg) PREFACE

by unknown authors
"... In this globalised world, higher educational institutions not only have to meet the increasing market demand for people with the ability to work in different crosscultural settings, but also carry with them the mission of nurturing academic excellence and professional advancement. ASEAN must strive ..."
Abstract - Add to MetaCart
In this globalised world, higher educational institutions not only have to meet the increasing market demand for people with the ability to work in different crosscultural settings, but also carry with them the mission of nurturing academic excellence and professional advancement. ASEAN must strive for quality assurance networking development as a mechanism to reach and maintain a high standard education, not just for one particular country, but for the ASEAN region as a whole. There have been strong QA movements in ASEAN in recent years in response to the liberalisation of education and the need for standard education. Governments of ASEAN countries have prioritised QA in education as a national agenda. Individual universities set up their own quality criteria, partly in consultation with other institutions at the national and international levels. At the regional level, the ASEAN University Network’s initiative for the establishment of binding QA standards among its member universities represents a pioneering move. The ASEAN University Network’s efforts to set up a standard quality assurance system originated from the need to improve quality amid globalisation, realising that the fastest way for us to grow is to start a long QA journey together. The creation of the ASEAN University Network-Quality Assurance (AUN-QA) was initiated in 1998 by the first Chairman of the AUN Board of Trustees (AUN-BOT), Professor Dr. Vanchai Sirichana, who believes that it will help all higher education institutions in ASEAN attain and maintain their high standard of education. And in the highly competitive, globalised world of education, quality assurance helps bridge the gaps among individual institutions with diverse cultures and resources.
Next 10 →
Results 1 - 10 of 308
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University