Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data... more
    • by 
    •   19  
      Network SteganographySteganographyImage Processing and steganographyAudio Steganography
    • by 
    •   20  
      MathematicsComputer ScienceNetwork SteganographySteganography
The present time can be characterized as an era of digital revolution which has resulted in a creativity burst in different design applications. Nowadays Computer Aided Architectural Design (CAAD) undoubtedly is recognized as a design... more
    • by 
    •   17  
      Human Computer InteractionInformation TechnologyDesign practiceStatistical Analysis
    • by 
    •   4  
      Lossy CompressionImage AuthenticationFrequency Domaindata embedding
    • by 
    •   10  
      EconomicsConflict of InterestEmpirical ResearchFinancial Sector
    • by 
    •   18  
      Computer ScienceHuman Computer InteractionInformation TechnologyDesign practice
    • by 
    •   8  
      MarketingComputer ScienceTourismSequence alignment
This efficient novel proposes the implementations of [RDH] Reversible data hiding techniquewith an adaptive high embedding capacity by using the [LSB] Least significant method to embed the data into the fused image. RDH can be used in... more
    • by 
    •   4  
      Discrete wavelet transformReversible Data HidingLeast Significant Bitdata embedding
    • by 
    •   7  
      Information SystemsSteganographyComputer SoftwareInformation Hiding
    • by 
    •   6  
      Natural Language ProcessingModular Systems (Architecture)Graphic User Interface DesignText Processing
Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of... more
    • by 
    •   11  
      Information SystemsMultimediaCodingSafety
    • by 
    •   9  
      Channel CodingWavelet TransformImage WatermarkingSpread Spectrum
Page 1. Minimizing Security Threats in Multimedia Systems Harsh Vikram Singh,Ashutosh Kumar Singh*, S.KBalasubramanian, AnandMohan Centre for Research in Microprocessor Applications Department ofElectronics Engineering ...
    • by 
    •   8  
      Computer ScienceMean square errorData HidingMultimedia Systems
We propose a robust and imperceptible spectral watermarking method for high rate embedding of a watermark into 3D polygonal meshes. Our approach consists of four main steps: (1) the mesh is partitioned into smaller sub-meshes, and then... more
    • by 
    •   15  
      MathematicsComputer ScienceModelingMesh generation
    • by 
    •   13  
      Distributed ComputingAccess ControlData HidingRayleigh fading
This paper proposes a high capacity reversible image watermarking scheme based on enhancement of difference expansion method. Reversible watermarking enables the embedding of useful information in a host signal without any loss of host... more
    • by 
    •   4  
      Quality ImprovementWatermarkingImage Watermarkingdata embedding
    • by 
    •   18  
      Digital MediaContent ManagementMagnetic fieldComputer Simulation
    • by 
    •   17  
      Cognitive ScienceImage ProcessingSignal ProcessingModulation
    • by 
    •   4  
      Image WatermarkingSpread SpectrumPerforationdata embedding
    • by 
    •   4  
      High FrequencyData HidingWavelet Decompositiondata embedding
    • by 
    •   7  
      MarketingTourismSequence alignmentCross Section