Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we propose a steganography technique to hide a message in an image. The proposed technique combines the stochastic local search meta-heuristic (SLS) with the least significant bits method (LSB). First, we developed the basic technique of LSB to hide information in JPEG images. We found that LSB steganography method is not effective because the size of the image increases greatly after...
In the now-popular two-dimensional code, bits are expressed using white and two black colors in the cell, which forms the element. However, such codes do not have confidentiality. Since confidentiality may be needed according to the use, a large-capacity and high-density two-dimensional code with compatibility and confidentiality can be realized by adding a secrecy part in addition to the existing...
In the image processing domain, researchers all over the world aim at designing algorithms which posses the feature of facilitating multiple advantages amalgamated in one scheme viz. compression, fusion, enhancement, security etc. In various classified applications such as military, medical, forensics etc, the image databases are huge and contain a lot of information. Hence, compression of these high-quality...
Visual cryptography is one of the emerging technology which has been used for sending secret images in highly secure manner without performing the complex operations while encoding. This technology can be used in the many fields like transferring military data, financial scan documents, sensitive image data and so on. In the literature different methods are used for black and white image which produce...
One of the first approaches to proposed to prevent automated attacks on Internet were the Human Interactive Proofs(HIPs). Since their invention, a variety of designs have been proposed, yet most of them have been successfully attacked. In this paper we focus on a new HIP, based on a puzzle solving scheme, created to increase both security and usability: the Capy CAPTCHA. We have analyzed its design,...
Transmission of critical data over the link, in the presence of an attacker has augmented the demand for secure communication. Particularly in the military field, exchange of classified images has to be executed with extreme caution. Advanced digital technologies require encryption, authentication and key distribution techniques to facilitate reliable and secure communication. In this paper, Discrete...
This paper presents a novel approach to develop distributed data-driven storage systems. The core concept behind this approach is the implementation of LH∗ schema that allows highly available distributed data storage to be created. We propose the novel method of image data decomposition and distribution among storage nodes to enhance main characteristics of schema. This method is close to image pyramid...
Steganography is the art of “concealed writing” and it refers to techniques that hide information inside innocuous looking objects known as “Cover Objects”. There are different types of covers available for embedding secret information but images are pervasive in day to day applications and have high redundancy in representation. Thus, they are appealing contenders to be used as cover objects. This...
In this paper, a technique for hiding the data of images using palette based approach with the concept of run length has been proposed. At the source, the image which is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size which will be adjusted by our resize function thereby removing the size constraint. The final...
Palette is organized as- the first three bytes correspond to RGB components and the last byte is reserved / unused but could obviously represent the alpha channel. In this paper, we present a new steganographic technique using the last byte for data hiding in organized pattern through algorithm. The concept of Magic Number has been utilizing hiding of data. Numerical experiments indicate that the...
This research work refers to solution of the practical security, anti-terrorist fighting problems, providing effective tools against different non-authorized penetrations. From the informatics and the software points of view these problems are linked to the image processing and creating of the compression algorithms applicable for the video array frames obtained by standard registration systems. Compression...
Applying the image palette to hide information, we usually embed them into the palette itself or into the index table of the image. Although the hiding schemes in palette could be a simpler way, the palette becomes more complicated and reveals that the information is embedded. In this paper, we will use the index table of image to conceal information. The proposed method selects a threshold value...
This paper presents a novel color medical image authentication scheme based on QR factorization and dual pseudorandom circular chain (DPCC). The red component and the green component of the color image possess more brightness than the blue one, so QR factorization values of the red component and the green component are used to be the initial values of logistic mapping to generate two watermarks. Then,...
A novel watermark algorithm is proposed for copyright protection of JPEG2000 compressed cultural heritage images in digital museum system. Visually meaningful color logo is encoded as the watermark information. Due to its characteristics, the key problem is to decide how to hide as many bits information as possible into the image while ensuring the information can be retrieved correctly, even after...
A modified threshold visual cryptography scheme (k, l, n)-VCS is proposed, which is used to analyze the relationship between the pixel expansion and the range of the participants?? number. Based on (k, l, n)-VCS, a more precise definition of multi-secret sharing visual cryptography scheme is given, and a new method is presented. Experimental results demonstrate that both pixel expansion and relative...
In this paper a masking based data hiding and image authentication technique (MDHIAT) has been proposed by embedding a message/image into a colour image. Bits from authenticating message/image are embedded in single bit position under each byte of the source image by choosing a standard 3 times 3 mask in row major order. Point of insertion of a bit is obtained by computing modulus operation of the...
This paper proposes a novel encryption method with password protection based on an extended version of SHA-1 (secure hash algorithm) that is able to encrypt 2D bulk data such as images. There has been a modest research in the literature on encryption of digital images though. The algorithm benefits also from the conjugate symmetry exhibited in what is termed, herein, an irreversible fast Fourier transform...
Visual cryptography (VC) schemes hide the secret image into two or more images which are called shares. The secret image can be recovered simply by stacking the shares together without any complex computation involved. The shares are very safe because separately they reveal nothing about the secret image. In this paper, a color visual cryptography scheme producing meaningful shares is proposed. These...
In this work we propose a random index modulation (RIM) based fragile watermarking scheme for authenticating RGB colour images. To thwart counterfeiting attacks, block-wise dependence neighbourhood is established, under the control of a secret key, and a content-dependent watermark is created by picking a certain number of bits from the dependence neighbourhood after scrambling its members. To minimise...
We have investigated a technique for recognising faces invariant of facial expressions. We apply multi-linear tensor algebra, which subsumes linear algebra, to analyse and recognise 3D face surfaces. This potent framework possesses a remarkable ability to deal with the shortcomings of principle component analysis in less constrained situations. A set of vector spaces can be used to represent the variation...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.