The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wet paper coding is a technique that can be used to embed secrets into some specific pixels, called dry pixels, of a digital image. The fully exploiting modifications method (FEM) is a method applied to convey secrets securely from senders to receivers using a stego-image that is slightly modified from the original digital image. Based on FEM, before embedding, we randomly choose pixels in the image...
In this paper, we propose an information hiding scheme to embed secret information into the compression code of an index table. First, the codewords neighboring the current processed index along with their closest codewords form a state codebook. Two indices of the state codebook are reserved as indicators. Once the current processed index satisfies some pre-defined conditions, the current processed...
This paper proposes a data hiding method by secret sharing. The proposed method embeds a k-bit secret digit in a secret message (i.e., a bit stream, a secret image) into a cover pixel of a grayscale cover image at a time by generating two shadow pixels. The two shadow images produced by the proposed scheme are meaningful. The experimental results show that the proposed scheme achieves good visual...
In this paper, we propose a simple reversible data hiding method in spatial domain for digital images by exploiting the correlation characteristic of neighboring pixels in natural images. The proposed method embeds several secret bits into a block of two consecutive cover pixels whose values are equal. The experimental results show that the proposed method achieves very good visual quality at low...
This paper proposes a novel data embedding method for embedding secrets into VQ indices by using the Chinese Remainder Theorem (CRT). In the experimental results, the hiding capacity is flexible which corresponds to the pre-defined prime parameters. In addition, a reversible mechanism is imported into the scheme so the original VQ indices can be restored after extracting secrets retrieval.
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the proposed scheme generates the watermark block-by-block in the cover image. To improve security by preventing malicious attacks, such as the vector quantization attack, a pseudo-random number generator using a private key...
Authorization takes a significant role in grid security, and the function of the agent is more and more obvious in the grid environment. However, some popular grid toolkits (e.g., Globus) do not support agent technology. In order to enhance the real-time validity of the authorization process, lighten the userspsila burden, reduce the cost of management and apply intelligent authorization, this paper...
The advances of network technologies and digital devices facilitate users to exchange multimedia data over the public networks. However, this also raises significant concerns about how to protect sensitive multimedia data from being illegally modified. Therefore, this paper proposes a fragile watermarking scheme to detect illegitimate alterations of a watermarked image. The proposed method hides a...
Techniques for text data hiding are different from image data hiding, video data hiding and audio data hiding. To break through the difficulty of text data hiding, Sun, Lou and Huang proposed a novel Chinese text data hiding scheme called the L-R scheme. In the L-R scheme, Sun et al. embedded secrets into Chinese characters that can be divided into left and right components. This paper describes how...
Data embedding is one of the important issues for securely conveying secrets from senders to receivers without arousing any notices to attackers. Wet paper coding (WPC) is one of the data embedding schemes which embeds secrets into a subset of pixels of an image. The pixels in the subset are also called dry pixels. Inspired by wet paper coding, a novel data embedding scheme with a magic matrix is...
This paper presents a reversible data embedding scheme with prediction and dissimilar techniques for palette-based images. Two embedding rules are imported in the proposed method, and no extra bit map is required to indicate which rules are applied in which pixels to embed secrets. As the experimental results show, when the hiding capacity is 255 Kb, the visual quality of the decoded image for our...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.