• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 250
Next 10 →

A Review on Data Hiding using Steganography & Visual Cryptography 1

by Mrs Shweta, A. Gode
"... Abstract — Steganography is the art & science of hiding data in the images. From thousands of year, our ancestors have invented various ways to pass information in hidden form from one place to another place. For eg. Papyrus scroll, cryptex, invisible ink, tattooing, pencil marks on handwritten ..."
Abstract - Add to MetaCart
cryptographic schemes based on share generated is meaningful or meaningless, type of secret images (either binary or color) and number of secret images (either single or multiple) encrypted by the various visual cryptography scheme. Also this paper proposed a new way for hiding data in images by combining

A Novel Approach Towards LSB Substituted Data Hiding In Images

by Ruchira Datta
"... Abstract — In this paper a novel approach towards LSB substituted data hiding in images has been proposed based on random bit substitution which not only improves the robustness and security of the watermarking scheme but also significantly improves the stego image quality which is visually indistin ..."
Abstract - Add to MetaCart
Abstract — In this paper a novel approach towards LSB substituted data hiding in images has been proposed based on random bit substitution which not only improves the robustness and security of the watermarking scheme but also significantly improves the stego image quality which is visually

Sixth Indian Conference on Computer Vision, Graphics & Image Processing Quantization Based Data Hiding Scheme for Efficient Quality Access Control of Images using DWT via Lifting

by Amit Phadikar, Santi P. Maity, Malay K. Kundu
"... This paper proposes a transform domain data-hiding scheme for quality access control of images. The original image is decomposed into tiles by applying n-level liftingbased Discrete Wavelet Transformation (DWT). A binary watermark image (external information) is spatially dispersed using the sequenc ..."
Abstract - Add to MetaCart
This paper proposes a transform domain data-hiding scheme for quality access control of images. The original image is decomposed into tiles by applying n-level liftingbased Discrete Wavelet Transformation (DWT). A binary watermark image (external information) is spatially dispersed using

Fuzzy-ART based adaptive digital watermarking scheme

by Chip-hong Chang, Senior Member, Zhi Ye, Mingyan Zhang - IEEE Transactions on Circuits and Systems for Video Technology 15 (1)pp.6581 , 2005
"... Abstract—In this paper, a novel transform domain digital watermarking scheme that uses visually meaningful binary image as watermark has been developed. The method embeds the watermark information adaptively with localized embedding strength according to the noise sensitivity level of the host image ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract—In this paper, a novel transform domain digital watermarking scheme that uses visually meaningful binary image as watermark has been developed. The method embeds the watermark information adaptively with localized embedding strength according to the noise sensitivity level of the host

An Improved Robust and Secured Image Steganographic Scheme”,

by Nagham Hamid , Abid Yahya , R Badlishah Ahmad , Osamah M Al-Qershi - International journal of Electronics and Communication Engineering & Technology (IJECET), , 2012
"... ABSTRACT Due to the nature of the current digital world, many techniques have become essential for the protection of secret data. The protection of such secret information has led to the development of different kinds of techniques in different categories. Of all of these, steganography has the adv ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
attacks. Moreover, the resultant stego-images demonstrate good visual quality in terms of Peak Signal-to-Noise Ratio (PSNR). Nevertheless, the hiding capacity which is achieved is still limited due to the fact that only part of the image serves to hide the embedding map.

APractical Lattice-based Digital Signature Schemes

by unknown authors
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract - Add to MetaCart
of classical cryptanalytic advances or progress on the development of quantum computers the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of sig-nature schemes based on the hardness of certain lattices problems which are assumed

Xampling in Ultrasound Imaging

by Noam Wagnera, Yonina C. Eldara, Arie Feuera, Gilad Danina, Zvi Friedmanc
"... Recent developments of new medical treatment techniques put challenging demands on ultrasound imaging systems in terms of both image quality and raw data size. Traditional sampling methods result in very large amounts of data, thus, increasing demands on processing hardware and limiting the flexibil ..."
Abstract - Add to MetaCart
Recent developments of new medical treatment techniques put challenging demands on ultrasound imaging systems in terms of both image quality and raw data size. Traditional sampling methods result in very large amounts of data, thus, increasing demands on processing hardware and limiting

Active Mask Framework for Segmentation of Fluorescence Microscope Images

by Gowri Srinivasa, Advisor Prof, Prof Matthew, C. Fickus, Prof Adam, D. Linstedt, Prof Robert, F. Murphy
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract - Add to MetaCart
of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly

A Visual Secret Sharing Technique for Secure and Fast Transmission of Image

by Shruthi H , Ranjan Kumar , Prasanna Kumar
"... ABSTRACT: In the advent of booming communication technology, the needs for information sharing and transfer have increased exponentially which requires more and more new techniques to meet the increasing needs of a modern society. Visual cryptography scheme is a cryptographic technique which allows ..."
Abstract - Add to MetaCart
meaningless and noise like shares. In this paper the idea is to increase the levels of security and to enhance the transmission speed of secret information over the network, as the basic model of Visual Cryptography is not an efficient tool to hide the information. In the proposed scheme initially the image

Visualization of Hash-functions

by Diplomarbeit Timo, Kilian Darmstadt, Fachbereich Informatik, Theoretische Informatik Kryptographie, Vorgelegte Diplomarbeit, Timo Kilian Darmstadt
"... den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents ..."
Abstract - Add to MetaCart
den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents
Next 10 →
Results 1 - 10 of 250
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University