The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Active detection technology was widely used in the traditional tampering detection. Firstly, those mainstream technologies of active detection were introduced. Then, some necessary improvements for the tampering detection algorithm were proposed in this paper, for example, the steganography information was cross-embedded to enhance the safety of the images, and the chaos function was simplified to...
Echo hiding algorithm is a type of Information hiding technology which has been widely used. This paper introduces the principle and the mathematical model of echo hiding algorithm. Generally, the traditional echo hiding algorithm just allows to hide 180 bits of information in 1 second, in order to increase the hiding capacity, we proposed multiple delayed position of echo hiding algorithm. It permits...
In order to improve the anti detection ability of watermarking and embedding watermark capacity, this paper proposes embedding watermarking algorithm combined with chaotic system chaotic discrete transform. The algorithm uses chaotic system chaotic algorithm, can improve the randomness to embed more watermark bits, and the use of discrete transform technology will be able to destroy the relevance...
Biometric recognition, or simply biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics it is possible to confirm or establish an individual's identity based on “who she is”, rather than by “what she possesses” (e.g., an ID card) or “what she remembers” (e.g., a password). Today, it is becoming more and more...
In this paper an attack on information hiding algorithms used for protection of printed documents or covert communication through them is proposed. This universal attack is applicable to a broad class of algorithms, in which information embedding is carried out by visually imperceptible distortion of background texture of documents. This attack, based on spectral analysis of electronic copies of printed...
Based on auditory masking effect, WAV format audio signal is programmed to embed a DWT (discrete wavelet transform) efficient digital watermarking algorithm of WAV format VF watermarking, conducting the embedding of the watermarking, extraction and anti-piracy properties research by using Matlab7.0 programming. Simulation results show that VF watermarking, embedded in the algorithm has good imperceptibility,...
Digital watermarking has been a practical and interesting research topic in the last decade. Recently, a newly developed branch called reversible data hiding has emerged. It has attracted more and more attention in both researches and applications. With the definition of reversible data hiding, secret message can be hidden by schemes offered by algorithm designers. On the other hand, at the data extraction...
Steganography is the technique to hide secret data in certain media, digital image for example, without leaving any obvious evidence. As a branch of steganography, HVS feature for years has been one of the issues researchers focus on. In this paper, we introduce an improved adaptive steganography algorithm-SVBA algorithm, which fully analyzes the area statistical properties and adopts HVS features...
This paper designs a novel hiding strategy based on an equivalence relation, which can remarkably enhance the quality of stego image without sacrificing the security and capacity of original steganography schemes. According to a constructed equivalence relation based on the capacity of hiding units, all hiding units can be partitioned into equivalence classes. Following that, the hiding procedure...
Digital watermark technology of GIS vector data consists of designing the digital watermark algorithm and evaluating the digital watermark algorithm performance, also, robustness is a most important evaluation indicator of the digital watermark algorithm performance, therefore, this article focuses on evaluating the robustness of digital watermark algorithm of GIS vector data.
One of the important objectives of information hiding research is that secret information is embed as much as possible without the perception of the carrier is affected. A hiding information algorithm of adaptive multiple plane-bit based on space domain in color image is proposed, which has low computing complexity and high capacity of information hiding. The main idea of this algorithm is to judge...
Among the newly explored research areas of digital watermarking, various types of data embedding technologies for vector graphics have drawn more and more attention. The features of vector graphics on the data expression and use were analyzed. The requirements of watermarking for vector graphics are discussed. Utilizing the characteristics of vector graphics, an adaptive classification method is proposed,...
Data hiding has been an interesting research topic since the early 1990's. Among the hiding schemes, reversible data hiding has attracted more and more attention in both researches and applications. With reversible data hiding, at the data extraction stage, both the original content and the hidden message should be perfectly extracted, hence, how to design such schemes seem an interesting task. It...
A new adaptive reversible watermarking algorithm based on wavelet lifting scheme is proposed in this letter. In the algorithm, watermarking image is embedded in the sub-band LL1 generated from 1-level wavelet lifting scheme, and the position information with small size is kept as a secret matrix, the threshold value can be adaptively selected according to the peak-signal to noise rate, such that watermarked...
In recent years, digital maps are used more and more widely, it plays a significant role in the national economy and defense construction, illegal duplication and distribution or forgery of the maps is also easy. Digital watermarking algorithms for vector data are an efficient method to counter such abuses of the maps. Considering the characteristic of vector geo-spatial data for digital watermarking,...
How to ensure the output volume absolutely consistent has been a very important problem the audio broadcast system faced. An auto-equalization system based on DirectShow technology is proposed in this paper. In this system, it processes the audio file with equalize analysis processing. In this process, it compares the average loudness level of the input audio with the standard target loudness level...
Information on the Web has become a production factor. Author of a unique text is unaware of its download, assessment, revision or reuse. At this juncture authorship management becomes a serious issue for digital text. To handle this issue information of the original author must be hidden in the text itself by natural language watermarking. Authorship is protected by linguistically modifying a given...
A most effective way to discourage illicit reproduction of copyrighted documents or verify authenticated documents is to watermark each copy before distribution. Text watermarking technique is widely believed to be such a valid means. In order to provide the convenience of future research in the field of text watermarking, the performance analysis and evaluation of text watermarking is proposed in...
In this paper we indicate the concept of dynamic data flow graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.