Proceedings ArticleDOI
Robust high capacity data embedding
Tse-Hua Lan,Mohamed F. Mansour,A.H. Tewfik +2 more
- Vol. 1, pp 581-584
Reads0
Chats0
TLDR
A novel algorithm for high capacity data embedding that gives high hiding ratios up to 1/13 (1 embedded bit out of 13 raw image pixels) subject to JPEG compression with quality factor equals 75.Abstract:
We present a novel algorithm for high capacity data embedding The proposed algorithm gives high hiding ratios up to 1/13 (1 embedded bit out of 13 raw image pixels) subject to JPEG compression with quality factor equals 75 With such high capacity, one can easily embed some important regions of an image inside the image itself with very small perceptual distortion In the proposed algorithm, the DCT coefficients of 8/spl times/8 blocks are first rearranged using Hilbert curves Data is embedded using projections on a random orthogonal set The algorithm recovers the embedded data without any reference to the original image, with very low BER (around 01%) Finally, the proposed algorithm shows robustness to JPEG compressionread more
Citations
More filters
Journal ArticleDOI
A quantization-based semi-fragile watermarking scheme for image content authentication
Xiaojun Qi,Xing Xin +1 more
TL;DR: The experimental results show that the proposed semi-fragile watermarking scheme outperforms four peer schemes and is capable of identifying intentional tampering and incidental modification, and localizing tampered regions.
Journal ArticleDOI
Comparative evaluation of semifragile watermarking algorithms
TL;DR: This work compares the performance of eight semifragile watermarking algorithms in terms of their miss probability under forgery attack, and in Terms of false alarm probability under nonma- licious signal processing operations that preserve the content and quality of the image.
Proceedings ArticleDOI
Tamper Detection with Self-Correction Hybrid Spatial-DCT Domains Image Authentication Technique
Y.M.Y. Hasan,Ammar M. Hassan +1 more
TL;DR: A new blind dual-domain self-embedding watermarking scheme with more secure embedding processes of the imagepsilas blocks fragile signatures and robust approximations and more reliable local alterations detection with auto-correction capabilities while surviving normal image content preserving operations is proposed.
Journal ArticleDOI
Edge based image steganography with variable threshold
Srilekha Mukherjee,Goutam Sanyal +1 more
TL;DR: A new image steganography technique facilitating embedding and extraction mechanisms have been proposed, which has quite a remarkable embedding capacity and may be used to deliver a status of security to a system which communicates secure data files through any public surveillance medium.
Journal ArticleDOI
Enhanced Position Power First Mapping (PPFM) based image steganography
Srilekha Mukherjee,Goutam Sanyal +1 more
TL;DR: A new image steganographic approach is proposed that competently masks the secret information bits without enticing the hackers and crackers and incorporates a two-level security mechanism in the form of two-way scrambling.
References
More filters
Book
The Fractal Geometry of Nature
TL;DR: This book is a blend of erudition, popularization, and exposition, and the illustrations include many superb examples of computer graphics that are works of art in their own right.
Journal ArticleDOI
Multimedia watermarking techniques
Frank Hartung,Martin Kutter +1 more
TL;DR: The basic concepts of watermarking systems are outlined and illustrated with proposed water marking methods for images, video, audio, text documents, and other media.
Journal ArticleDOI
Multimedia data-embedding and watermarking technologies
TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Proceedings ArticleDOI
Data hiding for video-in-video
TL;DR: A scheme for hiding high bit-rate supplementary data, such as secondary video, into a digital video stream by directly modifying the pixels in the video frames is introduced, which supports user-defined levels of accessibility and security.
Proceedings ArticleDOI
Fraud detection and self embedding
Tse-Hua Lan,Ahmed H. Tewfik +1 more
TL;DR: This paper designs a powerful high capacity data embedding algorithm with l/167(1 bit out of 167 raw image bits)-l/84 hiding ratios subject to JPEG compression with the quality factor equals to 75.