Results 221 to 230 of about 320,607 (275)
Some of the next articles are maybe not open access.

Data-Hiding Codes

Proceedings of the IEEE, 2005
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics,and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data ...
P. Moulin, R. Koetter
openaire   +2 more sources

Hiding biometric data

IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of ...
null Anil K. Jain, U. Uludag
openaire   +1 more source

High-Performance Reversible Data Hiding

Fundamenta Informaticae, 2008
This paper proposes a high-performance reversible data hiding algorithm based on the block difference histogram of a cover image. If a message is to be embedded into an image, the difference of the block at the maximum point is increased by 1 or left unchanged if the message bit is "1" or "0", respectively.
Lin, Ching-Chiuan   +2 more
openaire   +2 more sources

Quantized projection data hiding

Proceedings. International Conference on Image Processing, 2002
We propose a novel data hiding procedure called quantized projection (QP), that combines elements from quantization (i.e. quantization index modulation, QIM) and spread-spectrum methods. The method is based on quantizing a diversity projection of the host signal, inspired in the statistic used for detection in spread-spectrum algorithms. We carry out a
F. Perez-Gonzalez, F. Balado
openaire   +1 more source

Hiding data hiding

Pattern Recognition Letters, 2023
Hanzhou Wu   +3 more
openaire   +1 more source

Data hiding in video

Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), 2003
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables a high rate of data embedding and is robust to motion compensated coding, such as MPEG-2.
J.J. Chae, B.S. Manjunath
openaire   +1 more source

Reversible Data Hiding

2005
This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data.
openaire   +1 more source

Quantum data hiding

Optical Fiber Communication Conference and International Conference on Quantum Information, 2001
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication. We prove that the information that Alice and Bob can gain about a hidden bit is exponentially small in n, the number of qubits in each share, and can be made arbitrarily ...
openaire   +1 more source

Techniques for data hiding

IBM Systems Journal, 1996
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to ...
W. Bender, D. Gruhl, N. Morimoto, A. Lu
openaire   +1 more source

Hiding data in Tetris

2011 International Conference on Machine Learning and Cybernetics, 2011
Many kinds of data hiding methods using different cover media have been proposed, several papers use games to do steganography recently. Tetris is a famous puzzle game, and this game randomly generates the tetrominoes pieces to the player. In this paper, we proposed a steganography system for the Tetris game through the generated tetromino sequences. A
Zhan-He Ou, Ling-Hwei Chen
openaire   +1 more source

Home - About - Disclaimer - Privacy