The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Watermarking is a simple and effective method that is frequently used to protect the copyright of an image. However, watermarks must be strong enough to resist various attacks. In this paper, two-level Discrete Wavelet Transform (DWT) and a trusted third party are applied to ensure the robustness of the watermarks and protect the copyright of an image. The experimental results showed that our proposed...
In this paper, we propose an efficient EMD-based data hiding scheme. To avoid the serious, but usually disregarded, overflow problem in the embedding process, the danger cover pixels, which may result in overflow problem, are modified to safe area. However, the modification will not influence the stego image quality. Comparing to Hong et al.'s scheme proposed in 2008 and Lee et al.'s scheme proposed...
This paper proposes a data hiding with high visual quality in stego-images so that malicious invaders are hardly aware of the existence of the embedded message. Due to high visual quality and good embedding capacity, we also apply our scheme with region of importance (ROI) for protecting the important part of an image. The overload, location map of ROI, is compressed with run length encoding (RLE)...
This paper demonstrates an effective lossless data hiding scheme using modified Huffman coding. The binary secret message is concurrently embedded and encoded with a cover medium such as a video file, an audio file, or even a text file. The proposed scheme not only provides good data hiding capacity and data recovery capability, but also being efficient in space saving (the stego medium is much smaller...
A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding...
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the proposed scheme generates the watermark block-by-block in the cover image. To improve security by preventing malicious attacks, such as the vector quantization attack, a pseudo-random number generator using a private key...
In most data-hiding schemes, the area of interest in the cover image cannot be protected from being modified. In this paper, we propose a data-hiding scheme in which the changeable and unchangeable pixels can be specified by the data-hider. To reduce the size of extra information, the location map used to depict the location information of changeable and unchangeable pixels is compressed by Run Length...
This paper presents a fast and accurate real-time optical auto-focusing system, which utilizes a frequency component of the discrete cosine transform (DCT) as the focus measure. Besides, a nonlinear regression routine is combined in the algorithm to quickly move a rotational stepper motor to the best focus. The concise and effective algorithm can be applied to digital cameras, microscopes and optical...
Lossless data hiding enables the embedding of messages in a host image without any loss of content. In this paper, we present a lossless data hiding technique based on histogram modification for image authentication that is lossless in the sense that if the marked image is deemed authentic, the embedding distortion can be completely removed from the marked image after the embedded message has been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.