Results 221 to 230 of about 320,607 (275)
Some of the next articles are maybe not open access.
Proceedings of the IEEE, 2005
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics,and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data ...
P. Moulin, R. Koetter
openaire +2 more sources
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics,and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data ...
P. Moulin, R. Koetter
openaire +2 more sources
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of ...
null Anil K. Jain, U. Uludag
openaire +1 more source
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of ...
null Anil K. Jain, U. Uludag
openaire +1 more source
High-Performance Reversible Data Hiding
Fundamenta Informaticae, 2008This paper proposes a high-performance reversible data hiding algorithm based on the block difference histogram of a cover image. If a message is to be embedded into an image, the difference of the block at the maximum point is increased by 1 or left unchanged if the message bit is "1" or "0", respectively.
Lin, Ching-Chiuan +2 more
openaire +2 more sources
Quantized projection data hiding
Proceedings. International Conference on Image Processing, 2002We propose a novel data hiding procedure called quantized projection (QP), that combines elements from quantization (i.e. quantization index modulation, QIM) and spread-spectrum methods. The method is based on quantizing a diversity projection of the host signal, inspired in the statistic used for detection in spread-spectrum algorithms. We carry out a
F. Perez-Gonzalez, F. Balado
openaire +1 more source
Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), 2003
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables a high rate of data embedding and is robust to motion compensated coding, such as MPEG-2.
J.J. Chae, B.S. Manjunath
openaire +1 more source
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables a high rate of data embedding and is robust to motion compensated coding, such as MPEG-2.
J.J. Chae, B.S. Manjunath
openaire +1 more source
2005
This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data.
openaire +1 more source
This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data.
openaire +1 more source
Optical Fiber Communication Conference and International Conference on Quantum Information, 2001
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication. We prove that the information that Alice and Bob can gain about a hidden bit is exponentially small in n, the number of qubits in each share, and can be made arbitrarily ...
openaire +1 more source
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication. We prove that the information that Alice and Bob can gain about a hidden bit is exponentially small in n, the number of qubits in each share, and can be made arbitrarily ...
openaire +1 more source
IBM Systems Journal, 1996
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to ...
W. Bender, D. Gruhl, N. Morimoto, A. Lu
openaire +1 more source
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to ...
W. Bender, D. Gruhl, N. Morimoto, A. Lu
openaire +1 more source
2011 International Conference on Machine Learning and Cybernetics, 2011
Many kinds of data hiding methods using different cover media have been proposed, several papers use games to do steganography recently. Tetris is a famous puzzle game, and this game randomly generates the tetrominoes pieces to the player. In this paper, we proposed a steganography system for the Tetris game through the generated tetromino sequences. A
Zhan-He Ou, Ling-Hwei Chen
openaire +1 more source
Many kinds of data hiding methods using different cover media have been proposed, several papers use games to do steganography recently. Tetris is a famous puzzle game, and this game randomly generates the tetrominoes pieces to the player. In this paper, we proposed a steganography system for the Tetris game through the generated tetromino sequences. A
Zhan-He Ou, Ling-Hwei Chen
openaire +1 more source

