... approaches forrecovery of a single image. Wu and Chang 7 proposed an elegant method based on the JPEG compression ...compression, and then embedded the obtained edge characteristic into some ...
... robustness, and allows the method to have spatial and fre- quency localization of digital data by the nature of multi- resolution discrete wavelet ...Kundur and Hatzinakos 11 proposed one of the ...
... fast and requires a relatively low memory space compared to the octree-based reconstruction ...adequate for use in object recognition and pose determination. And it is also suitable for ...
... distribution, and reproduction in any medium, provided the original work is properly ...digital images across networks has become very popular due to the rapid development of Internet and computer ...
... (c) and 2(c)) to attend the recovery meeting for any ...grey images, it can also be applied to color images by processing the three color components one by ...
... PSS and VC schemes, Alvarez, Encinas, and del Rey also developed a multisecret sharing scheme 10 for color images with different sizes based on modulus opera- ...secret images by n+1 ...
... detection, and tampering repairing using image Lena of ...image authentication methods [8-9] in terms of capabilities of self-recoveryand tampered-pixel ...detection and tampering ...
... 0 and , just leave the two pixels ...1 and are tuned up to become both even or both odd to represent the fact that a “1” is ...is, for one index to become even and the other to become is ...4 ...
... 0 and , just leave the two pixels ...1 and are tuned up to become both even or both odd to represent the fact that a “1” is ...is, for one index to become even and the other to become is ...4 ...
... image authentication, the scaled authentication code from quantized coefficients is represented with binary ...binary authentication code is first embedded and then the second MSB bit plane is ...
... image recovery algorithm for removing visible water- marks is ...source images from watermarked and reference ...uniform and linear-gra- dient watermarks are ...removed, and that ...
... playing multiple videos simultaneously is also dealt with the same ...channels for playing the same video object will be in balancing states with the point of long-term ...workload and ...
... pixels, recovery of edges and curvature-driven diffusions ...selected and then color information is propagated inward from the region boundaries, ...only for filling in small damaged ...
... the recovery data is embedded in DCT co- efficients using lattice embedding to reduce ...The recovery data is dispersed into many blocks by two-layer ...strategy for finding locations to hide ...
... image authentication in multimedia communication with distortion reduction and security enhancement is ...given imagesand verified to accomplish ...
... image authentication scheme based on absolute moment block truncation ...the authentication code for each compressed image ...not. For image authentication, we embed the ...
... Lin and Tsai and Yang et ...steganography andauthentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego ...
... image and rescan the result to become another digital ...printers and scanners are commonly used for distributions and reproductions of ...format and the printed ...therefore, ...
... domain and palettes of imagesfor use in data hiding, we try to explore a new embeddable space for data hiding, aiming at providing more data hiding capacity, better quality of the resulting ...