The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reversible data hiding in encrypted images (RDH-EI) is a new topic drawing more and more attention because of the privacy-preserving requirements from cloud data management. In this paper, a novel reversible data hiding scheme for encrypted image with large embedding capacity is proposed. And it is a client-free RDH-EI scheme in which the RDH algorithm used by the cloud is irrelevant with both the...
As the fundamental technology of autonomous vehicles and high-speed tracking, high-speed vision always suffers from the bottlenecks of on-chip bandwidth and storage due to the resource constraints. To improve the resource efficiency, we propose a hardware-efficient image compression circuit based on the vector quantization for a high-speed image sensor. In this circuit, a self-organizing map is implemented...
With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the same time. Under such demands, reversible data hiding in encrypted images (RDH-EI) attracts more and more researchers’ attention. In this paper, we propose a novel framework for RDH-EI based on reversible image transformation (RIT). Different...
According to the problem that conventional laminated paper counting algorithms have some unavoidable shortcomings such as high dependence on the quality of laminated paper and noise sensitivity, we propose a laminated paper counting algorithm based on compressive sensing (CS) and Hough transform (HT). In the proposed algorithm, the over-complete dictionary which is created by dispersing the Hough...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability of tamper localization and image self-restoration by combining perceptual hashing and digital watermarking technologies. Compared with other perceptual hashing schemes, this proposed approach could locate the maliciously tampered regions and further recover these regions to some extent. Another advantage...
In this paper, a simple, efficient, low power off-chip memory design is proposed, which fully exploits the features of DRAM memory and video application, as well as overcomes the drawbacks of algorithm complexity and system modification of embedded compression, which is a popular way to decrease power consumption of the off-chip memory. The integration of the scheme into video decoder will not involve...
A data hiding scheme with flexible hiding capacity applied in vector quantization (VQ) index tables was proposed by Chang et al. However the minimum bit rate of their scheme is 0.552. To improve the bit rate of Chang et al's method, this paper proposes a novel and efficient reversible data embedding scheme for VQ index tables. The proposed method exploits characteristics of VQ indices and uses two...
Wet paper coding is a technique that can be used to embed secrets into some specific pixels, called dry pixels, of a digital image. The fully exploiting modifications method (FEM) is a method applied to convey secrets securely from senders to receivers using a stego-image that is slightly modified from the original digital image. Based on FEM, before embedding, we randomly choose pixels in the image...
In this paper, we propose an information hiding scheme to embed secret information into the compression code of an index table. First, the codewords neighboring the current processed index along with their closest codewords form a state codebook. Two indices of the state codebook are reserved as indicators. Once the current processed index satisfies some pre-defined conditions, the current processed...
In this paper, we propose a simple reversible data hiding method in spatial domain for digital images by exploiting the correlation characteristic of neighboring pixels in natural images. The proposed method embeds several secret bits into a block of two consecutive cover pixels whose values are equal. The experimental results show that the proposed method achieves very good visual quality at low...
This paper proposes a novel data embedding method for embedding secrets into VQ indices by using the Chinese Remainder Theorem (CRT). In the experimental results, the hiding capacity is flexible which corresponds to the pre-defined prime parameters. In addition, a reversible mechanism is imported into the scheme so the original VQ indices can be restored after extracting secrets retrieval.
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the proposed scheme generates the watermark block-by-block in the cover image. To improve security by preventing malicious attacks, such as the vector quantization attack, a pseudo-random number generator using a private key...
This paper proposes an information hiding method based on block-segmentation strategy. The proposed scheme divides a grayscale image into several 4 times 4 blocks and further segment each block into four small blocks sized 2 times 2. Each small block chooses one reference point to be proceeded with outer embedding process. The chosen points then formed an inner block to be proceeded with inner embedding...
The advances of network technologies and digital devices facilitate users to exchange multimedia data over the public networks. However, this also raises significant concerns about how to protect sensitive multimedia data from being illegally modified. Therefore, this paper proposes a fragile watermarking scheme to detect illegitimate alterations of a watermarked image. The proposed method hides a...
Data embedding is one of the important issues for securely conveying secrets from senders to receivers without arousing any notices to attackers. Wet paper coding (WPC) is one of the data embedding schemes which embeds secrets into a subset of pixels of an image. The pixels in the subset are also called dry pixels. Inspired by wet paper coding, a novel data embedding scheme with a magic matrix is...
A robust digital watermark scheme using wavelet-based is presented for copyright protecting. For security, the watermarking is perturbed firstly. A mark sequence may be gotten. For embed watermark imperceptibility, wavelet decomposition for original image is realized. After the original image decomposed into single resolution level, we connect three detail wavelet coefficient matrixes into a big matrix...
This paper presents a reversible data embedding scheme with prediction and dissimilar techniques for palette-based images. Two embedding rules are imported in the proposed method, and no extra bit map is required to indicate which rules are applied in which pixels to embed secrets. As the experimental results show, when the hiding capacity is 255 Kb, the visual quality of the decoded image for our...
In most data-hiding schemes, the area of interest in the cover image cannot be protected from being modified. In this paper, we propose a data-hiding scheme in which the changeable and unchangeable pixels can be specified by the data-hider. To reduce the size of extra information, the location map used to depict the location information of changeable and unchangeable pixels is compressed by Run Length...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.