The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a reversible fragile watermarking scheme for the authentication of demosaicked images. Each authentication code is embedded into the two rebuilt components of each color pixel by using a designed authentication table (ACT). The utilization of ACT secures the watermarking procedure and the watermarked image can be recovered back to the original demosaicked image by the proposed...
With the purpose of improving the visual quality of an original block truncation coding (BTC) compressed image, an optimal modified BTC scheme (OMBTC) is proposed. The binary search tree (BST) technique is utilized to determine the optimal quantization of each image block. The proposed scheme is compared with several existing modification BTC schemes, the experimental results demonstrate that the...
This study presents a novel scheme called a dual verifying (t, n) visual secret sharing scheme. In our proposed scheme, each participant receives a public key and an encrypted shadow instead of the original secret image through the public communication network. There are three goals achieved. The first is to generate a reconstructed secret image, which satisfies the general criteria high security,...
This paper modifies an elegant data hiding method of Chang et alpsilas [Pattern Recog. Lett. 2004, vol. 25, no. 11, 1253-1261]. The embedding employs a modified search-order coding (SOC) technique to hide binary secret data in the vector quantization (VQ) index file of a host image. The recovered host image is identical to the one recovered by traditional VQ; the compression rate is competitive to...
Visual cryptography (VC) was introduced by Naor and Shamir. In general, a (k, n)-threshold scheme shares a given secret image S among n so-called shadow images. People can "view" the secret image by simply stacking any k of these n shadows (k < n is a threshold value). In most of the reported VC schemes, the size of each shadow is greater than that of S. This paper, we use Hilbert curve...
Many researchers have studied reversible data hiding techniques in recent years and most have proposed reversible data hiding schemes that guarantee only that the original cover image can be reconstructed completely. Once the secret data are embedded in the compression domain and the receiver wants to store the cover image in a compression mode to save storage space, the receiver must extract the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.