The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The multiplications of binary numbers are implemented very easy. In this paper, we will propose a data hiding scheme based on radix 2 for digital images with high embedding capacity, faster embedding and secret extraction data processing, and maintain security. The experimental results showed that the embedded capacity of at least 1 bpp when the number of pixels in a group increases and stego image...
The hidden secret message capacity, stego-image quality and security are three important conditions for data hiding technology. According to these requirements, an effective security protection with high hiding capacity steganographic method based on general multi-EMD is proposed in this paper. The major contribution of this method is not to need more complicated embedded steps when the secret data...
Using the EMD method to enhance the capacity of embedding secret message were introduced by ZhangWang and Lee et al., respectively. There are particular characteristics such as good stego-image quality and more embedding capacities in these two schemes. However, there are still drawbacks such as the embedding base is the special base or just only 8-base in the Zhang-Wang scheme and the Lee et al.'s...
A novel secret image sharing scheme was proposed by Lin and Tsai in 2004. They claimed that their scheme can achieve the goal of secret image sharing with the additional capabilities of steganography and authentication. After that, Yang et al. indicated that the Lin-Tsai scheme has three weaknesses, and further proposed an improved scheme in 2007. This scheme not only achieved authentication ability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.