Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
A new and efficient steganographic method for embedding secret messages into a gray-valued cover image is proposed. In the process of embedding a secret message, a cover image is partitioned into non-overlapping blocks of two consecutive... more
A new and efficient steganographic method for embedding secret messages into a gray-valued cover image is proposed. In the process of embedding a secret message, a cover image is partitioned into non-overlapping blocks of two consecutive pixels. A difference value is calculated ...
Research Interests:
Research Interests:
... 171 Page 3. He observes that uncompressed scans of images obtained with a digital camera with good resolution are the safest image for steganography. Fredrich et.al, [9] conclude that the cover images stored in the JPEG ...
Research Interests:
Research Interests:
Research Interests:
This paper describes a new and novel steganographic method for inserting secret information into image files. The method uses fractal image compression techniques in the production of these steganographic image files. The method allows a... more
This paper describes a new and novel steganographic method for inserting secret information into image files. The method uses fractal image compression techniques in the production of these steganographic image files. The method allows a user to specify a visual key when hiding the secret information. The visual key must then be used when retrieving the hidden data. The paper describes enhancements to the method which may enable the steganographic data to survive through normal processing which reduces image quality. ...
Research Interests:
Research Interests: Cognitive Science, Information Science, Image Processing, Image Analysis, Watermarking, and 13 moreComputer Security, Cryptography, Image Quality, Digital Watermarking, Steganography, Multivariate Analysis, Regression Analysis, Steganalysis, Analysis of Variance, Multivariate Regression, Classifier, Variance Analysis, and Electrical And Electronic Engineering
Abstract This paper presents an additive approach to trans-form-domain information hiding and the performance analysis for images and video. The watermark embedding method is designed to satisfy the perceptual constraints and improve the... more
Abstract This paper presents an additive approach to trans-form-domain information hiding and the performance analysis for images and video. The watermark embedding method is designed to satisfy the perceptual constraints and improve the detectability as well as the ...
Research Interests: Engineering, Watermarking, Steganography, Authentication, Performance Analysis, and 11 moreFingerPrinting, Information Hiding, Robustness, Fingerprint Recognition, Gaussian distribution, Boolean Satisfiability, Internet, Discrete Wavelet Transforms, Discrete Cosine Transforms, Information Embedding, and Generalized Gaussian Distribution
Research Interests:
Research Interests:
Research Interests: Engineering, Technology, Image Processing, Signal Processing, Data Compression, and 15 moreCryptography, Causality, Digital Watermarking, Steganography, Memory, Real Time, Robustness, Steganalysis, Real-Time Data Processing, Wiener filter, Boolean Satisfiability, Wiener Filtering, Digital Image, Object Oriented, and Frequency Domain
... Faisal Alturki Department of Electronic Engineering College of Tlechnological Studies Shuwaikh, Kuwait 70654 faisaleng @ hotmail.com ... These samples have a Gaus-sian distribution in the transform domain. ... Russell Mersereau ...