• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 21
Next 10 →

Reversible data hiding using the companding technique and improved

by Shaowei Weng, Yao Zhao, Jeng-shyang Pan, Rongrong Ni, S. Weng, Y. Zhao, R. Ni, Y. Zhao, R. Ni, J. -s. Pan - DE method,” Circuits, Systems, and Signal Processing , 2008
"... Abstract A novel reversible data hiding scheme based on the companding technique and an improved difference expansion (DE) method is presented in this article. The companding technique is employed to embed payload into high frequency bands in the integer wavelet transform (IWT) domain. A refined met ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract A novel reversible data hiding scheme based on the companding technique and an improved difference expansion (DE) method is presented in this article. The companding technique is employed to embed payload into high frequency bands in the integer wavelet transform (IWT) domain. A refined

Novel Spatial Domain Reversible Information Hiding Technique for Content Authentication

by Ali Fahad , Ekram Usmani , Khan
"... Abstract. In this paper we propose a transparent, computationally simple and fast spatial domain data hiding technique for content (image and audio) authentication purposes. It can also be used in data captioning, copyright protection, confidentiality and integrity over the property distributed in ..."
Abstract - Add to MetaCart
Abstract. In this paper we propose a transparent, computationally simple and fast spatial domain data hiding technique for content (image and audio) authentication purposes. It can also be used in data captioning, copyright protection, confidentiality and integrity over the property distributed

Research Article An Efficient Prediction-and-Shifting Embedding Technique for High Quality Reversible Data Hiding

by Wien Hong
"... permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The embedding capacity of a histogram-based reversible data hiding technique is primarily determined by the peak height of the histogram. Recently, some studies have tried to embed d ..."
Abstract - Add to MetaCart
permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The embedding capacity of a histogram-based reversible data hiding technique is primarily determined by the peak height of the histogram. Recently, some studies have tried to embed

A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGES

by S. K. Ghosal
"... In this paper, a novel Binomial Transform based fragile image watermarking technique has been proposed for color image authentication. The Binomial Transform (BT) is used to convert each 2 × 2 sub-image block of the carrier image into transformed block corresponding to red, green and blue channels i ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In this paper, a novel Binomial Transform based fragile image watermarking technique has been proposed for color image authentication. The Binomial Transform (BT) is used to convert each 2 × 2 sub-image block of the carrier image into transformed block corresponding to red, green and blue channels

Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT

by N Sathisha, N Sathisha, Bangalore India, K Suresh Babu, K B Raja, K R Venugopal
"... Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement an ..."
Abstract - Add to MetaCart
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement

MPEG-4 for Interactive Low-delay Real-time Communication

by Olaf L, Gary Minden , 2003
"... ii Internet broadcasting techniques are wide spread and have been the focus off many research projects. Due to high transmission delays these systems often lack interactivity. This thesis introduces a new streaming system to deliver real-time video and audio data with low-delays across the Internet. ..."
Abstract - Add to MetaCart
ii Internet broadcasting techniques are wide spread and have been the focus off many research projects. Due to high transmission delays these systems often lack interactivity. This thesis introduces a new streaming system to deliver real-time video and audio data with low-delays across the Internet

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

LumiNet An Organic Interactive Illumination Network Diploma Thesis at the Media Computing Group

by Prof Dr, Jan Borchers, René Bohne, René Bohne V
"... I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen un ..."
Abstract - Add to MetaCart
I hereby declare that I have created this work completely on my own and used no other sources or tools than the ones listed, and that I have marked any citations accordingly. Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig verfasst und keine anderen als die angegebenen Quellen

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 21
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University