The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Watermarking is a simple and effective method that is frequently used to protect the copyright of an image. However, watermarks must be strong enough to resist various attacks. In this paper, two-level Discrete Wavelet Transform (DWT) and a trusted third party are applied to ensure the robustness of the watermarks and protect the copyright of an image. The experimental results showed that our proposed...
In this paper, we propose an efficient EMD-based data hiding scheme. To avoid the serious, but usually disregarded, overflow problem in the embedding process, the danger cover pixels, which may result in overflow problem, are modified to safe area. However, the modification will not influence the stego image quality. Comparing to Hong et al.'s scheme proposed in 2008 and Lee et al.'s scheme proposed...
This paper proposes a data hiding with high visual quality in stego-images so that malicious invaders are hardly aware of the existence of the embedded message. Due to high visual quality and good embedding capacity, we also apply our scheme with region of importance (ROI) for protecting the important part of an image. The overload, location map of ROI, is compressed with run length encoding (RLE)...
This paper demonstrates an effective lossless data hiding scheme using modified Huffman coding. The binary secret message is concurrently embedded and encoded with a cover medium such as a video file, an audio file, or even a text file. The proposed scheme not only provides good data hiding capacity and data recovery capability, but also being efficient in space saving (the stego medium is much smaller...
A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding...
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the proposed scheme generates the watermark block-by-block in the cover image. To improve security by preventing malicious attacks, such as the vector quantization attack, a pseudo-random number generator using a private key...
In most data-hiding schemes, the area of interest in the cover image cannot be protected from being modified. In this paper, we propose a data-hiding scheme in which the changeable and unchangeable pixels can be specified by the data-hider. To reduce the size of extra information, the location map used to depict the location information of changeable and unchangeable pixels is compressed by Run Length...
A new method based on coupling with shock filters and anisotropic diffusion is presented for image enhancement and denoising in this work. A new improved shock filters term and a new fidelity term, which are produced adaptive magnitude from image structural information, are proposed for the image enhancement and denoising. The method can not only well restrain noise but also enhance edge and keep...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.