The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In our earlier study, we proposed an image morphing based method for information hiding. The basic idea is to hide a secrete image into a morphed image which is obtained from the secrete image and another reference image. To make this method practically useful, it is necessary to produce natural morphed images. This is a necessary condition conceal the existence of the secret image. To produce natural...
In our earlier studies, we have proposed an image morphing based steganography. The basic idea is to embed a secrete image into a stego image through morphing. The stego image is a morphed image obtained from the secrete image and some other reference images. To make this method more practically useful, it is essential to make the stego image as natural as possible. For this purpose, we should define...
Nowadays, “cards” are becoming part of our lives. To prevent the cards from being illegally used, card user authentication is indispensable. A common practice for user authentication is to use some secret information known or possessed by the true card holder. However, if the secret information is leaked, some malicious third party may still be able to use the card illegally. To solve the problem,...
Nowadays, “cards” are becoming part of our lives. The cards enable us to obtain different kinds of services conveniently, but may also bring us economic loss if they are used illegally by some malicious third party. A common practice to solve the problem is to ask the user to provide some personal information possessed by the true card holder only. However, the personal information can be leaked if...
Recently, we proposed a new technique for information hiding based on image morphing. Since the cover message can be changed after embedding the secret message, the cover rate of the new technique is much larger than that of existing techniques. However, this technique has two fatal problems. First, the stegodata may not look natural due to inaccurate definition of the feature lines. Second, the secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.