The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a method for detection of motion vector-based video steganography. First, the modification on the least significant bit of the motion vector is modeled. The influence of the embedding operation on the sum of absolute difference (SAD) is illustrated, which allows us to focus on the difference between the actual SAD and the locally optimal SAD after the adding-or-subtracting-one...
Common digital signal processing often bring some noise to the audio signal, and also can change high-frequency component. Therefore, the watermark embedding method through adjusting low-frequency component of audio signal can improve the robustness of watermarking scheme. Simultaneously, some signal processing operations and malicious attacks are able to change the location of watermark information...
This papers presents a novel steganalysis scheme for YouTube compressed video. The proposed scheme exploits spatial-temporal correlation between adjacent frames. To this end, 3D Discrete Cosine Transform (DCT) is used to capture this correlation. Statistical features sensitive to data hiding such as absolute central moments, skewness, kurtosis, and Markov features are used as classifying statistics...
Nowadays the compressed format files such as JPEG are used widely, but the existing compressed-domain fragile watermarking algorithms can not recognize whether the modification made to the watermarked image is on the image contents or the embedded watermark or both tampered by attackers. In this paper, a compressed-domain fragile watermarking scheme with discrimination of tampers on image content...
In this paper, we propose a novel robust audio watermarking scheme based on DCT (discrete cosine transform). The key point lies in the fact that centroid of each audio frame will not be changed much in order to maintain high auditory quality. Each audio segment carrying the centroid of one audio frame is performed with DCT. Then the direct-current component of each audio segment is embedded scrambled...
-With developing of computer networks and digital techniques, the electronic image are easily created, edited, reproduced and distributed. Unfortunately, illegal copy and malicious tamper are also facilitated. At present, fragile watermark is researched greatly to authenticate the veracity and integrity of electronic contents. In this paper, a chaotic watermarking scheme for authentication of popular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.