The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pixel pair modification (PPM) based magic squares is proposed for data hiding. The aim is to improve the drawbacks of payload versus PSNR of LSB. The traditional PPM-related methods did not consider the combination of square contents. In this paper, a heuristic magic square algorithm for PPM is proposed to select the optimal magic square combination for data hiding while the quality of the stego-image...
The embedding capacity and the image quality of a stego image are two important factors to evaluate a data hiding method. The aim is to get the largest embedding capacity with the lowest image distortion. In this paper, a novel mixed data hiding (MDH) method is proposed. MDH combines the non-reversible technique LSB substitution and the reversible technique chessboard prediction to get the benefits...
Information security issues are concerned with the disclosure of important privacy information by unethical employees. In this paper, we proposed the concept of noise data in anti-data mining to protect knowledge in data. The scheme is an anti-classification algorithm which is based on support vector machine (SVM). Experimental results showed that the noise data generated from prediction model of...
Digital audio content protection is part of information security for audio authentication and audio integrity evaluation. Watermarking is widely used in copyright protection. However, watermark requires a third party authentication. It is desirable for the watermark to be robust. In this paper, we proposed a DAWP technique to extract audio characteristics using MCFF and PSL. The combined biometric...
To avoid the drawbacks, namely low security level, of Ni's algorithm, this paper proposed a secure and reversible data hiding method based on odd-even interleaving embedding. This algorithm first constructed the gray level histogram of the cover image, and then used the pixels in peak point set to embed information. In the embedding process, this method embedded information in odd-even interleaving...
A new structure road detection algorithm based on open uniform B-spline curve model is proposed. Firstly, Canny edge detection algorithm is used to extract the road edge. Then road markings are gotten from the edge map by the least square method. Lastly, the road model (B-spline model) is fitted after the central points of the road are gotten from the lane markings. In order to accurate the position...
A new adaptive rational image interpolation algorithm is proposed.For a natural image, according to the difference information of the local pixel gray value in the vertical and horizonal direction, a conic blending spline with large weight parameters is employed to reconstruct sharp edges and image details within the interpolated image, and one with small weight is used to reduced the blocking artifacts...
This paper proposes the design and implementation of image compression comparator (ICC) in a digital image processing simulation system (DIPSS) based on components in detail. The ICC is designed as a component in the form of Java Beans, which improves the developing efficiency, reuses software, and make the system maintainable and expanding. In this paper, we also give an example of comparing results...
Advancements in the application of underground pipeline information have led to the increased complexity in the design and implementation of the information management system. With the underground pipelines data being managed by many different government agencies, it becomes increasing more difficult to ensure their integrity, accuracy and timeliness. In this paper, based on our practice on building...
In this paper, an integer pixel search algorithm based on prediction (PIS) is proposed. The primary characteristic of this algorithm is using quadrangle and flat hexagon as search pattern. To strengthen the flexibility and precision of this algorithm, early termination strategy is adopted. And to prove the validity of the PIS algorithm, besides some theories and computation analysis, several experiments...
In traditional symmetric watermarking schemes, the key used for watermark embedding must be available at the watermark detector. This leads to a security problem if the detectors are implemented in consumer devices that are spread all over the world. So asymmetric watermarking schemes, also named public key digital watermarking schemes attract more and more attentions. In such a public key watermarking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.