• 沒有找到結果。

[PDF] Top 20 A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

Has 10000 "A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding" found on our website. Below are the top 20 most common "A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding".

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

... domain and palettes of images for use in data hiding, we try to explore a new embeddable space for data hiding, aiming at providing more data ... See full document

16

A Data Hiding Method Based on Information Sharing  via PNG Images for Applications of Color Image

A Data Hiding Method Based on Information Sharing via PNG Images for Applications of Color Image

... Abstract A new data hiding method via PNG images based on Shamir’s (k, n)-threshold secret sharing scheme is ...coefficients of the polynomial ... See full document

36

A New Steganographic Method Based on Information Sharing via PNG Images

A New Steganographic Method Based on Information Sharing via PNG Images

... value of t is chosen to be, the lower the visual quality of the stego-image will ...that a larger value of t, according to Step 2 of Algorithm 1, implies that a larger ... See full document

5

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability

... blind authentication method based on the se- cret sharing technique with a data repair capability for grayscale document images via the use of ... See full document

12

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability

... blind authentication method based on the secret sharing technique with a data repair capability for gray- scale document images via the use of ... See full document

11

Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection

Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection

... automatic method for generating a type of stained glass image has been ...seen on church win- dows. The color regions of an image of such a ... See full document

16

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images

... 0 and , just leave the two pixels unchanged. In the proposed method, the even-odd relationship of the two chosen pixels is utilized to embed a binary bit of annotation ...1 and ... See full document

11

Data Hiding and Image Authentication for Color-Palette Images

Data Hiding and Image Authentication for Color-Palette Images

... 0 and , just leave the two pixels unchanged. In the proposed method, the even-odd relationship of the two chosen pixels is utilized to embed a binary bit of annotation ...1 and ... See full document

11

Authentication of Binary Document Images in PNG Format Based on A  Secret Sharing Technique

Authentication of Binary Document Images in PNG Format Based on A Secret Sharing Technique

... — image authentication, binary document image, secret sharing, data hiding, PNG ...purpose of preserving important documents, transforming them into digital form, ... See full document

6

Lossless Data Hiding for Color Images Based on Block Truncation Coding

Lossless Data Hiding for Color Images Based on Block Truncation Coding

... The secret data then are embedded in the common bitmap and the quantization levels of each block use the properties of side matching and the order of these quantization levels to achi[r] ... See full document

1

A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding

A Data Embedding Scheme for Color Images Based on Genetic Algorithm and Absolute Moment Block Truncation Coding

... Recently, embedding a large amount of secret data into gray-level and color images with low distortion has become an important research issue in ...propose a ... See full document

1

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

... distribution, and reproduction in any medium, provided the original work is properly ...Transmission of digital images across networks has become very popular due to the rapid development of ... See full document

17

A Large Payload Data Embedding Technique for Color Images

A Large Payload Data Embedding Technique for Color Images

... proposes a large payload data embedding method for color ...advancement of digital equipments, color images have become a common medium in many ... See full document

1

A Large Payload Data Embedding Technique for Color Images

A Large Payload Data Embedding Technique for Color Images

... 摘要: High embedding capacity and low image distortion factors are main concerns of information hiding researchers.. No scheme can achieve these two factors simultaneously.[r] ... See full document

1

A New Steganographic Method for Color and Grayscale Image Hiding

A New Steganographic Method for Color and Grayscale Image Hiding

... present a steganographic method for embedding a color or a grayscale image in a true color ...types of secret images can be carried by ... See full document

1

A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function

A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function

... Concealing data in images is increasingly important and has numerous applications ...Although hiding data by replacing the least signi2cant bits (LSB) of the gray level ... See full document

7

Authentication and recovery of an image by sharing and lattice-embedding

Authentication and recovery of an image by sharing and lattice-embedding

... recovery data is embedded in DCT co- efficients using lattice embedding to reduce ...recovery data is dispersed into many blocks by two-layer ...percentage of the tampered blocks does not ex- ... See full document

14

A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality

A Generalized Image Interpolation-based Reversible Data Hiding Scheme with High Embedding Capacity and Image Quality

... shows a comparison of the cover and stego image quality for the proposed and previous algorithms after the secret message has been ...Baboon, and F16 images have ... See full document

16

Secret Multimedia Sharing with Steganographic Effects via PNG Images

Secret Multimedia Sharing with Steganographic Effects via PNG Images

... Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010 Email: ...new method by secret sharing with steganographic effects for sharing secret images by ... See full document

12

Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images

Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images

... original image that has gone through the embedding process to be completely restored after the extraction of the embedded ...propose a reversible scheme with a high embedding ... See full document

1

Show all 10000 documents...