The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The proposed encryption method manipulates sub-divided blocks using modified bit position to replace a secret bit. The sub-divided block contains three or more pixels of the host binary image. For every block decides to hide a secret bit. By finding the pixel position to insert a secret bit for each block, the image quality of the overt binary image can be improved. The method is fast calculation,...
Compressive sensing is a new technique in signal processing which can recover a sparse signal vector via a much smaller of non-adaptive, linear measurements than the dimension of the signal vector. In this paper, we applied compressive sensing to a joint source compression-channel coding scheme. With analysis of the reconstruction error of the sparse representation of natural image signals, we argue...
Most VQ based reversible data hiding schemes in the literature generate non-legitimate codes as output. Therefore such schemes are not suitable for some applications. In this paper a reversible data hiding scheme for VQ-compressed images based on search order coding (SOC) is proposed. The output of the proposed scheme is legitimate SOC code. Moreover the proposed scheme doesn't need any side information...
Loss less data hiding, also known as reversible data hiding, is a newly developed research field and relating applications in digital rights management (DRM). Secret information can be hidden into original image at the encoder, and then image containing secret data is delivered to the decoder. For decoding, original image and secret information need to be perfectly recovered from the received image...
For image compression, the better compression rate can be achieved by vector quantization (VQ) scheme, but the quality of the recovered image is about 27 to 30 dB in PSNR, and the methods about quality improvement is limited, so how to improve the VQ decompressed image¡¦s quality is a worth studying issue. In this paper, a new approach of VQ encoding is proposed, that we transform each image into...
Zhang et al. in 2006 proposed a data hiding technique called Exploiting Modification Direction (EMD) with good capacity and high image quality. Related follow-up improvements are proposed by other scholars to raise the change between pixel values thus increasing the capacity and without reversibility. This paper utilizes the high image quality feature of EMD to develop a reversible data hiding method...
Reversible data hiding can be classified into two major research branches, one is by use of the histogram of original image, named the H scheme, and the other is by manipulating pixel relations between adjacent pixels, called the difference expansion (DE) scheme. Both schemes have their own advantages and drawbacks, but the inherent characteristics of original image are seldom considered in existing...
Three dimensional (3D) video technologies have made noticeable progress and become common. The 3D videos using depth image based rendering (DIBR) technique are getting the spotlight due to its visual reality, however, they are exposed to illegal distribution. To protect 3D video contents from copyright infringement, a 3D video watermarking scheme can be employed. Since 3D display itself may give rise...
In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with...
In this paper, Human Visual System (HVS) characteristics are modeled using a Genetic Algorithm (GA) based technique for the determination of weights in a BPN (GA/BPN) for the purpose of image watermarking. The GA based BP network is trained by 27 inference rules comprising of three input HVS features namely luminance sensitivity, edge sensitivity computed using threshold and contrast sensitivity computed...
During video streaming over packet-erasure network, packets may lose due to network congestion. Since video packets have different significance and validity for decoding, the streaming system is expected to transmit the most critical packets when congestion occurs. In this paper, a packet criticality model is proposed and then a video transmission framework based on this model is presented. The criticality...
Recently, scalable video coding technique has attracted a lot of attention for its desired scalable functionality and coding efficiency. H.264/SVC encodes a video in a hierarchical way by which the coded bit stream can satisfy terminals with different capability of display and different condition of network at the same time. However, the huge computational complexity of mode decision causes difficulties...
Secret image sharing, a technology of secret communication, transmits secret images by distributing camouflage images (shares) to a group of participants, where each camouflage image contains a part of secret images. Secret images can be reconstructed under the conditions of a sufficient number of shares gathered and processed using a revealing algorithm. In 2009, Tsai et al. proposed a novel secret...
Digital watermarking schemes based on complete complementary codes have been proposed. It has been pointed out that the watermarking schemes can be extended to the steganography scheme because complete complementary code has good correlation properties. In this paper, we propose a blind steganography algorithm which does not need to refer any cover data in the extraction process. In addition, we theoretically...
In this paper, we propose a new loss less data hiding method by the adaptive coefficient-bias (ACB) algorithm. The proposed ACB algorithm involves two main steps: block-mean removal and pixel isolating. The block-mean removal first generates the difference blocks, which are obtained by subtracting each pixel of the host block from the predicted mean. Then, the pixel isolating minimizes distortion...
In this paper, we examine the effects of embedding in randomly selected locations and present a simple but novel high capacity data hiding method for halftone images. Data hiding smart pair toggling (DHSPT) is a flexible method for hiding data directly into halftone images in high embedded capacity applications. It embedded data into randomly selected locations, having the chance of forced single-pixel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.