Results 231 to 240 of about 320,607 (275)
Some of the next articles are maybe not open access.
IBM Systems Journal, 2000
In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of ...
W. Bender +5 more
openaire +1 more source
In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of ...
W. Bender +5 more
openaire +1 more source
SPIE Proceedings, 1995
Data hiding is the process of embedding data into image and audio signals. The process is constrained by the quantity of data, the need for invariance of the data under conditions where the `host' signal is subject to distortions, e.g., compression, and the degree to which the data must be immune to interception, modification, or removal.
Walter R. Bender +2 more
openaire +1 more source
Data hiding is the process of embedding data into image and audio signals. The process is constrained by the quantity of data, the need for invariance of the data under conditions where the `host' signal is subject to distortions, e.g., compression, and the degree to which the data must be immune to interception, modification, or removal.
Walter R. Bender +2 more
openaire +1 more source
2019
The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This
openaire +1 more source
The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This
openaire +1 more source
2002
Just like disk or RAM, DNA and RNA can store vast amounts of information, and just like data stored in digital media, DNA data can be easily copied or tampered with. However, unlike in the digital realm, there are no techniques for watermarking, annotating, or encrypting information in DNA and RNA.
Boris Shimanovsky +2 more
openaire +1 more source
Just like disk or RAM, DNA and RNA can store vast amounts of information, and just like data stored in digital media, DNA data can be easily copied or tampered with. However, unlike in the digital realm, there are no techniques for watermarking, annotating, or encrypting information in DNA and RNA.
Boris Shimanovsky +2 more
openaire +1 more source
Minimum Distortion Data Hiding
2010In this paper a new steganographic method is presented with minimum distortion, and better resistance against steganalysis. There are two ways to control detectability of stego message: one is less distortion, and another is less modification. Concerning the less distortion, this paper focuses on DCT rounding error, and optimizes the rounding error in ...
Md. Amiruzzaman +2 more
openaire +1 more source
An overview of real‐world data sources for oncology and considerations for research
Ca-A Cancer Journal for Clinicians, 2022Lynne Penberthy +2 more
exaly
2003
Virtually all sophisticated steganographic methods hide a message by embedding it as low-level noise in an image or audio file which then becomes the cover file. This approach has two disadvantages: the information hiding capacity of a cover file is small, so a large cover file is needed to hide a substantial amount of data; and once data are hidden in
openaire +1 more source
Virtually all sophisticated steganographic methods hide a message by embedding it as low-level noise in an image or audio file which then becomes the cover file. This approach has two disadvantages: the information hiding capacity of a cover file is small, so a large cover file is needed to hide a substantial amount of data; and once data are hidden in
openaire +1 more source

