The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steganography deals with embedding secret data within inoffensive looking objects called “Cover Objects.” To accomplish this, intensive computations are required to be performed. Modern day steganography can be implemented using both software and hardware for the purpose of obscurity based security or Kerckhoffs's principle based Shannon's maxim. The algorithm used in both the implementations may...
A new spatial domain steganography method for the grayscale image is presented in this paper. The method has used neighboring pixel pair difference value and Least Significant Bit (LSB) substitution, which provides enhanced embedding capacity. This method uses a 3×3 block structure to divide the cover image into some non-overlapping blocks horizontally. k-LSBs of the center pixel of the cover image...
The technique, digital steganography is a secret data hiding scheme which involves hiding data in multimedia files. Steganographic methods embed secret data in the cover media with minimum visual and statistical distortion. This paper introduces a new steganographic method in transform domain based on contourlet PDFB (pyramidal directional filter bank) based transform. Contourlet is a multiscale and...
A multiresolution singular value decomposition (MR-SVD) based watermarking algorithm is presented here. The performance of this algorithm has the advantage of human visual system (HVS) based masking on the MR-SVD domain, which has been implemented pixel by pixel. The method employed here is adaptive adding of the watermark via texture and luminance content of the subbands obtained via MR-SVD. Correlation...
Detection of life threatening arrhythmia like ventricular flutter (VFL) or ventricular tachycardia (VT) and atrial flutter (AFL) at the earlier stage may save life by defibrillation therapy. Different type of mechanism has been proposed earlier in time domain or by spectral analysis of ECG signal. In this work a frequency domain approach is proposed by spectral decomposition of ECG signal. Spectral...
These are the days of cloud computing, big data analysis, smart phones all around and 24×7 internet connectivity. This has both pros and cons of so much of data all around. Therefore securities of these data are a major concern as well. Present day trend is to use our biological information as a key for biometrics, human computer interaction, biomimetics, etc. Of these biometrics are the most popularly...
The core target of this paper is to estimate human age automatically through facial image analysis. In this research study we put forward a system constructed on the basis of Gene Expression Programming (GEP) to estimate human ages using face features. Gene expression programming (GEP) is a handy tool to find out functions. Due to prompt developments in machine vision and computer graphics, age estimation...
These days, with technological advancement, it is very easy for miscreants to produce illegal multimedia data copies. Various techniques of copyright protection of free data are being developed daily. Digital watermarking is one such technique, where digital embedding of the copyright information/watermark into the data to be protected. The two major ways of doing so are spatial domain and the robust...
In this paper, an adaptive spatial domain image watermarking scheme is proposed which embeds watermark information to the uneven bit depth salient image pixels. Watermarked image thus produced has better visual transparency with respect to human visual system (HVS) with high payload capacity. In proposed scheme, salient pixels are determined using the bottom-up Graph-Based Visual Saliency (GBVS) model...
Copyright protection of intellectual property is a very large and growing business. This is due to the easier availability of all multimedia data with just a click of a mouse, resulting to the increase of piracy. Watermarking is one of the popular methods of authentication to help protect intellectual property rights. Of the various forms of multimedia data image is one of the most popular variant...
This paper presents a robust and imperceptible methodology of watermark embedding in the transform domain using Discrete Wavelet Transform (DWT). The robustness is brought about by hiding the watermark in the Eigen values after computing the Singular Value Decomposition (SVD) on low frequency sub-band after DWT. While for the imperceptibility the Contrast Sensitivity Function (CSF) has been employed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.