The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new high capacity color barcode. The barcode we propose uses the cyan, magenta, and yellow (C,M,Y) colorant separations available in color printers and enables high capacity by independently encoding data in each of these separations. In each colorant channel, payload data is conveyed by using a periodic array of elliptically shaped dots whose individual orientations are modulated to...
In this paper, we will propose a data hiding method to embed the color information into the grayscale image and then only authorized users can recover the original color image. At the same time, according to the viewer's reliability, image owners can distribute the different embedding color image information. In other words, they will assign the more closer to the original image color information...
In the daily life, secret data delivery is an important application for privately communicated to each other over computer networks. Data hiding technique is a good way to achieve the secret data delivery, thus the color image is a popular cover media used to send the secret. Block truncation coding (BTC) is a lossy image compression technique, which can significantly reduce the size of image. In...
Reversible data hiding is a technique not only the secret data can be extracted from a covered image but also the cover image can be completely rebuilt after the extraction process. Therefore, it is the choice in cases of secret data hiding where the full recovery of the cover image is essential. In this paper, we propose a reversible data hiding technique based on Neighbor Mean Interpolation (NMI)...
In this paper, a technique for hiding the data of images using palette based approach with the concept of run length has been proposed. At the source, the image which is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size which will be adjusted by our resize function thereby removing the size constraint. The final...
A blind color image steganalyzer is proposed, in which the features are extracted from Contourlet domain. Statistical features of Contourlet coefficients and cooccurrence metrics of subband images are used as features. For evaluating the proposed steganalysis method, some popular steganography methods such as OutGuess, JPHS, Model-based and Jsteg are used with payloads of 10% to 25%. To reduce the...
Plagiarism is a problem for educators all over the world. With the popularity of computers and networks, many teachers give the electronic assignment to their students in the university. But students copy electronic assignment more and more commonly. Information hiding technology is mainly used in the image copyright protection and covert communication currently, here information hiding technology...
Data hiding technique is using a cover medium to conceal secret data and delivering it to receiver over public computer networks for secret data delivery. A color image is a good cover medium because a color image consists of more redundant space than a gray scale image or halftone image, that means, a color image can be used to carry more secret data. Block truncation coding (BTC) is a lossy compression...
Digital images are the most common cover files used for steganography. This paper investigates the pros and cons of colour and grayscale versions of images when used as steganography covers. Therefore, it comparatively evaluates the performance of both grayscale and colour versions of a given cover image when they are used with a given steganography method. Moreover, this paper examines the capability...
This paper proposes a new approach based on the Histogram Shifting Algorithm (HSA) to reversible data hiding in bitmap image. The embedding is not carried out in the whole image but in small blocks in order to enhance the capacity. Firstly, the blocks are classified, and then, coding methods specific to each type of block are designed. Secondly, some blocks become unavailable for a second time embedding...
This paper proposes novel method of embedding and extraction of data in Black and White picture images. The main focus of this method is on steganography in Black & white picture image. This method embeds more number of bits in a block as compared to earlier methods, which are limited to one or two bits. This method suggests the searching of the block of suitable size and choosing it for data...
Take advantage of the feature that the energy of the image would gather and spread on four components in the subimage after first-order GHM multi-wavelet transform. Propose an information hiding algorithm based on modifying the direction of color mod vector structure (CMVS) of four GHM first-order sub-images (LL2, LH2, HL2 and HH2). The direction of CMVS represents the information. The maximum change...
This paper introduces a method of hiding information in a 24-bit BMP image. The key technique of encryption is to convert the hidden messages into a bit stream, and fills it in the certain position of the BMP file. The size of the cover image file is not changed after data embedding and the color variations of each byte of the image are changed at most 1/256, which will not detected by human eyes...
In recent years, a lot of research has been conducted into watermarking for the purpose of protecting the copyright of a variety of electronic content. Very recently, watermarking methods that resist analog conversion, such as that for printing, have been studied and systems have been proposed that provide instructions for converting from analog to digital data, such as those for mobile telephones...
This paper proposes a new method to embed data in binary images, including scanned text, figures, and cartoon images. The proposed method is based on the manipulating of chains, which are a representation of binary image, to hide data. The chain records the edge information of an image, and the modifications of chains are modifications of edge area. It is difficult to be recognized by human eyes....
A new color image watermarking algorithm with resistance to JPEG lossy compression based on quantization index modulation (QIM) is proposed in this paper. As it is known, QIM method can achieve a good balance between the embedding bit rate, robustness and distortion between the original image and the composited image by modulating the source signal into different clusters. The corresponding DCT coefficients...
Applying the image palette to hide information, we usually embed them into the palette itself or into the index table of the image. Although the hiding schemes in palette could be a simpler way, the palette becomes more complicated and reveals that the information is embedded. In this paper, we will use the index table of image to conceal information. The proposed method selects a threshold value...
In this paper we propose an algorithm for embedding data a into color image which uses Increased multiple peaks histogram. The scheme does not require the knowledge of original image for recovery of watermark. The watermark is embedded in spatial domain in red, green and blue components (planes). This scheme can embed more data as compared to the existing schemes and maintain higher quality of host...
Information hiding techniques have received much attention in the fields of the copyright protection and covert communication etc. This paper proposes a new data hiding method in a still image. With color quantization technique, redundant space in a color still image is created, and the palette of the image is amended. Then secret information is embedded into the most significant bit of pixels of...
We present a lossless data hiding method for JPEG2000 compressed data based on the reversible information hiding for binary images we have proposed. In JPEG2000 compression, full color images with RGB three colors are transformed to YCrCb color space, and then, for each color component, wavelet transform, quantization and entropy coding are performed independently. The wavelet coefficients of each...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.