The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a steganalysis algorithm to detect spatial domain least significant bit (LSB) matching steganography, which is much harder than the detection of LSB replacement. We use features based on histogram of run length and histogram characteristic function to detect the LSB Matching. Experimental results on two datasets demonstrate that this method has superior results compared with...
An improved lossless data hiding scheme, which can restore the original image completely after data extraction, is presented in this paper. In the proposed method, a cover image is reordered into a sequence using space filling curves. For each pixel (except the first pixel) in the sequence, a pixel difference is generated between the pixel and its neighbor pixel. Due to the inherent structure of images...
We proposes a method to estimate secret message length of secret message embedded using quantization index modulation (QIM) based data hiding in digital images. The Secret Message Length estimation equation is constructed used for embedding ratio estimation. Our experimental results have demonstrated that the proposed steganalyzers can is a reliably way to estimate the secret message length of QIM...
An improved reversible data hiding scheme, which can restore the original image completely after data extraction, is presented in this paper. The method is an extended subsampling reversible data hiding method. Compared with the previous method, the proposed method has much more room for data hiding. The data hiding capacity is much higher than the previous method while the visual distortion keep...
A reversible data hiding scheme, which can restore the original image completely after data extraction, is presented in this paper. In the proposed method, a cover image is reordered into a sequence using space filling curves. For each pixel (except the first pixel) in the sequence, a pixel difference is generated between the pixel and its neighbor pixel. Due to the inherent structure of images causes...
This paper presents a novel LSB steganographic scheme which attempts to defeat statistical steganalysis. The embedding distortion introduced to the cover image is small for perceptual and statistical detection. The modification of image pixel values for embedding is just like conventional image processing which is capable of resisting all kinds of LSB steganalysis attacks such as the Chi-Squre test,...
In this paper, we utilized machine vision and image processing to develop an image detection flow for the dimension and appearance of multilayer ceramic capacitors (MLCC), and also used proposed automatic optical inspection (AOI) system in the MLCC production line operation. We compared the advantages and disadvantages of Hough Transform and Histogram analysis. The proposed tiny passive components...
A lossless data hiding scheme, which can restore the original image completely after data extraction, is presented in this paper. In the proposed method, a cover image is reordered into a sequence using space filling curves. For each pixel (except the first pixel) in the sequence, a pixel difference is generated between the pixel and its neighbor pixel. Due to the inherent structure of images causes...
This paper proposes a new method to embed data in binary images, including scanned text, figures, and cartoon images. The proposed method is based on the manipulating of chains, which are a representation of binary image, to hide data. The chain records the edge information of an image, and the modifications of chains are modifications of edge area. It is difficult to be recognized by human eyes....
Paper presents a method for color image compression coding by using correlation vectors combined with SPIHT Algorithm. In this method, the Green component of a color image is coded using SPIHT Algorithm, and the other two components are segmented into multi-subregions by quadtree partitioning according to the non-correlation degree of three color components. Based on the calculated correlation vectors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.