Results 251 to 260 of about 24,642,685 (320)
Some of the next articles are maybe not open access.
Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension
IEEE transactions on circuits and systems for video technology (Print), 2021This paper proposes a new framework of lossless data hiding (LDH) in JPEG images. The proposed framework contains two algorithms, i.e., the optimized basic LDH and the relay transfer based extension.
Yingqiang Qiu +4 more
semanticscholar +1 more source
Proceedings of the IEEE, 2005
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics,and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data ...
P. Moulin, R. Koetter
openaire +2 more sources
This tutorial paper reviews the theory and design of codes for hiding or embedding information in signals such as images, video, audio, graphics,and text. Such codes have also been called watermarking codes; they can be used in a variety of applications, including copyright protection for digital media, content authentication, media forensics, data ...
P. Moulin, R. Koetter
openaire +2 more sources
A data hiding scheme based on U-Net and wavelet transform
Knowledge-Based Systems, 2021As deep learning was used in the field of data hiding, the capacity of data hiding had been greatly increased. In addition, the wavelet transform in the traditional data hiding technology performed well, and the hidden image was invisible compared with ...
Lianshan Liu +3 more
semanticscholar +1 more source
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of ...
null Anil K. Jain, U. Uludag
openaire +1 more source
With the wide spread utilization of biometric identification systems, establishing the authenticity of biometric data itself has emerged as an important research issue. The fact that biometric data is not replaceable and is not secret, combined with the existence of several types of attacks that are possible in a biometric system, make the issue of ...
null Anil K. Jain, U. Uludag
openaire +1 more source
Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding
IEEE Transactions on Information Forensics and Security, 2020Pixel-value-ordering (PVO) is an efficient technique of reversible data hiding (RDH). By PVO, the maximum and minimum in each cover image block are first predicted and then modified to embed data. Actually, many PVO-based methods are essentially based on
Tong Zhang +3 more
semanticscholar +1 more source
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders
IEEE Transactions on Dependable and Secure Computing, 2020The existing models of reversible data hiding in encrypted images (RDH-EI) are based on single data-hider, where the original image cannot be reconstructed when the data-hider is damaged.
Bing Chen +4 more
semanticscholar +1 more source
Multiple Histograms-Based Reversible Data Hiding: Framework and Realization
IEEE transactions on circuits and systems for video technology (Print), 2020Reversible data hiding (RDH) has unique advantage in copyright and integrity protection for multimedia contents. As a typical RDH scheme, histogram shifting technique (HS) has found wide applications due to its high quality of marked image.
Junxiang Wang +4 more
semanticscholar +1 more source
Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling
IEEE transactions on multimedia, 2019This paper first introduces a parametric binary tree labeling scheme (PBTL) to label image pixels in two different categories. Using PBTL, a data embedding method (PBTL–DE) is proposed to embed secret data to an image by exploiting spatial redundancy ...
Shuang Yi, Yicong Zhou
semanticscholar +1 more source
High-Performance Reversible Data Hiding
Fundamenta Informaticae, 2008This paper proposes a high-performance reversible data hiding algorithm based on the block difference histogram of a cover image. If a message is to be embedded into an image, the difference of the block at the maximum point is increased by 1 or left unchanged if the message bit is "1" or "0", respectively.
Lin, Ching-Chiuan +2 more
openaire +2 more sources
Quantized projection data hiding
Proceedings. International Conference on Image Processing, 2002We propose a novel data hiding procedure called quantized projection (QP), that combines elements from quantization (i.e. quantization index modulation, QIM) and spread-spectrum methods. The method is based on quantizing a diversity projection of the host signal, inspired in the statistic used for detection in spread-spectrum algorithms. We carry out a
F. Perez-Gonzalez, F. Balado
openaire +1 more source

