Results 261 to 270 of about 38,413 (310)
Some of the next articles are maybe not open access.
Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), 2003
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables a high rate of data embedding and is robust to motion compensated coding, such as MPEG-2.
J.J. Chae, B.S. Manjunath
openaire +1 more source
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables a high rate of data embedding and is robust to motion compensated coding, such as MPEG-2.
J.J. Chae, B.S. Manjunath
openaire +1 more source
2005
This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data.
openaire +1 more source
This paper presents a novel reversible data hiding algorithm, which can recover the original image without distortion from the marked image after the hidden data have been extracted. This algorithm utilizes the zero or the minimum point of the histogram and slightly modifies the pixel values to embed data.
openaire +1 more source
Optical Fiber Communication Conference and International Conference on Quantum Information, 2001
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication. We prove that the information that Alice and Bob can gain about a hidden bit is exponentially small in n, the number of qubits in each share, and can be made arbitrarily ...
openaire +1 more source
We present a scheme for hiding bits in Bell states that is secure even when the sharers Alice and Bob are allowed to carry out local quantum operations and classical communication. We prove that the information that Alice and Bob can gain about a hidden bit is exponentially small in n, the number of qubits in each share, and can be made arbitrarily ...
openaire +1 more source
IBM Systems Journal, 1996
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to ...
W. Bender, D. Gruhl, N. Morimoto, A. Lu
openaire +1 more source
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to ...
W. Bender, D. Gruhl, N. Morimoto, A. Lu
openaire +1 more source
2011 International Conference on Machine Learning and Cybernetics, 2011
Many kinds of data hiding methods using different cover media have been proposed, several papers use games to do steganography recently. Tetris is a famous puzzle game, and this game randomly generates the tetrominoes pieces to the player. In this paper, we proposed a steganography system for the Tetris game through the generated tetromino sequences. A
Zhan-He Ou, Ling-Hwei Chen
openaire +1 more source
Many kinds of data hiding methods using different cover media have been proposed, several papers use games to do steganography recently. Tetris is a famous puzzle game, and this game randomly generates the tetrominoes pieces to the player. In this paper, we proposed a steganography system for the Tetris game through the generated tetromino sequences. A
Zhan-He Ou, Ling-Hwei Chen
openaire +1 more source
IBM Systems Journal, 2000
In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of ...
W. Bender +5 more
openaire +1 more source
In an earlier paper, "Techniques for Data Hiding," the overall goals and constraints of information-hiding problem space and a variety of approaches to information hiding in image, audio, and text were described. In this sequel, information-hiding goals and applications are expanded beyond watermarking to encompass the more general concept of ...
W. Bender +5 more
openaire +1 more source
SPIE Proceedings, 1995
Data hiding is the process of embedding data into image and audio signals. The process is constrained by the quantity of data, the need for invariance of the data under conditions where the `host' signal is subject to distortions, e.g., compression, and the degree to which the data must be immune to interception, modification, or removal.
Walter R. Bender +2 more
openaire +1 more source
Data hiding is the process of embedding data into image and audio signals. The process is constrained by the quantity of data, the need for invariance of the data under conditions where the `host' signal is subject to distortions, e.g., compression, and the degree to which the data must be immune to interception, modification, or removal.
Walter R. Bender +2 more
openaire +1 more source
2019
The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This
openaire +1 more source
The chapter presents an application of reversible data hiding for the authentication of image travelling over a hostile and insecure communication channel. The reversible data resides in the image and tracks any changes done to it on a communication channel. The extraction of data and any modification to its structure reveals changes in the image. This
openaire +1 more source
2002
Just like disk or RAM, DNA and RNA can store vast amounts of information, and just like data stored in digital media, DNA data can be easily copied or tampered with. However, unlike in the digital realm, there are no techniques for watermarking, annotating, or encrypting information in DNA and RNA.
Boris Shimanovsky +2 more
openaire +1 more source
Just like disk or RAM, DNA and RNA can store vast amounts of information, and just like data stored in digital media, DNA data can be easily copied or tampered with. However, unlike in the digital realm, there are no techniques for watermarking, annotating, or encrypting information in DNA and RNA.
Boris Shimanovsky +2 more
openaire +1 more source
Minimum Distortion Data Hiding
2010In this paper a new steganographic method is presented with minimum distortion, and better resistance against steganalysis. There are two ways to control detectability of stego message: one is less distortion, and another is less modification. Concerning the less distortion, this paper focuses on DCT rounding error, and optimizes the rounding error in ...
Md. Amiruzzaman +2 more
openaire +1 more source

