Results 1 - 10
of
250
A Review on Data Hiding using Steganography & Visual Cryptography 1
"... Abstract — Steganography is the art & science of hiding data in the images. From thousands of year, our ancestors have invented various ways to pass information in hidden form from one place to another place. For eg. Papyrus scroll, cryptex, invisible ink, tattooing, pencil marks on handwritten ..."
Abstract
- Add to MetaCart
cryptographic schemes based on share generated is meaningful or meaningless, type of secret images (either binary or color) and number of secret images (either single or multiple) encrypted by the various visual cryptography scheme. Also this paper proposed a new way for hiding data in images by combining
A Novel Approach Towards LSB Substituted Data Hiding In Images
"... Abstract — In this paper a novel approach towards LSB substituted data hiding in images has been proposed based on random bit substitution which not only improves the robustness and security of the watermarking scheme but also significantly improves the stego image quality which is visually indistin ..."
Abstract
- Add to MetaCart
Abstract — In this paper a novel approach towards LSB substituted data hiding in images has been proposed based on random bit substitution which not only improves the robustness and security of the watermarking scheme but also significantly improves the stego image quality which is visually
Sixth Indian Conference on Computer Vision, Graphics & Image Processing Quantization Based Data Hiding Scheme for Efficient Quality Access Control of Images using DWT via Lifting
"... This paper proposes a transform domain data-hiding scheme for quality access control of images. The original image is decomposed into tiles by applying n-level liftingbased Discrete Wavelet Transformation (DWT). A binary watermark image (external information) is spatially dispersed using the sequenc ..."
Abstract
- Add to MetaCart
This paper proposes a transform domain data-hiding scheme for quality access control of images. The original image is decomposed into tiles by applying n-level liftingbased Discrete Wavelet Transformation (DWT). A binary watermark image (external information) is spatially dispersed using
Fuzzy-ART based adaptive digital watermarking scheme
- IEEE Transactions on Circuits and Systems for Video Technology 15 (1)pp.6581
, 2005
"... Abstract—In this paper, a novel transform domain digital watermarking scheme that uses visually meaningful binary image as watermark has been developed. The method embeds the watermark information adaptively with localized embedding strength according to the noise sensitivity level of the host image ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Abstract—In this paper, a novel transform domain digital watermarking scheme that uses visually meaningful binary image as watermark has been developed. The method embeds the watermark information adaptively with localized embedding strength according to the noise sensitivity level of the host
An Improved Robust and Secured Image Steganographic Scheme”,
- International journal of Electronics and Communication Engineering & Technology (IJECET),
, 2012
"... ABSTRACT Due to the nature of the current digital world, many techniques have become essential for the protection of secret data. The protection of such secret information has led to the development of different kinds of techniques in different categories. Of all of these, steganography has the adv ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
attacks. Moreover, the resultant stego-images demonstrate good visual quality in terms of Peak Signal-to-Noise Ratio (PSNR). Nevertheless, the hiding capacity which is achieved is still limited due to the fact that only part of the image serves to hide the embedding map.
APractical Lattice-based Digital Signature Schemes
"... Digital signatures are an important primitive for building secure systems and are used in most real world security protocols. However, almost all popular signature schemes are either based on the factoring as-sumption (RSA) or the hardness of the discrete logarithm problem (DSA/ECDSA). In the case o ..."
Abstract
- Add to MetaCart
of classical cryptanalytic advances or progress on the development of quantum computers the hardness of these closely related problems might be seriously weakened. A potential alternative approach is the construction of sig-nature schemes based on the hardness of certain lattices problems which are assumed
Xampling in Ultrasound Imaging
"... Recent developments of new medical treatment techniques put challenging demands on ultrasound imaging systems in terms of both image quality and raw data size. Traditional sampling methods result in very large amounts of data, thus, increasing demands on processing hardware and limiting the flexibil ..."
Abstract
- Add to MetaCart
Recent developments of new medical treatment techniques put challenging demands on ultrasound imaging systems in terms of both image quality and raw data size. Traditional sampling methods result in very large amounts of data, thus, increasing demands on processing hardware and limiting
Active Mask Framework for Segmentation of Fluorescence Microscope Images
"... m]]l]]s¶D]]¿÷mB]iv]b]oD]m¶¨]iv]§]iv]r]j]t¿rv]]irj]]t]]m] / | ap]]r¿]ÎNy]s¶D]]mb¶r]ix} Û]Ix]]rd]mb]} p—N]t]o%ism] in]ty]m] / || Û]Is]¡uÎc]rN]]riv]nd]p]*N]m]st¶ I always bow to Śri ̄ Śāradāmbā, the limitless ocean of the nectar of compassion, who bears a rosary, a vessel of nectar, the symbol of ..."
Abstract
- Add to MetaCart
of knowledge and a book in Her lotus hands. Dedicated to the Lotus Feet of the revered Sadguru. This thesis presents a new active mask (AM) framework and an algorithm for segmenta-tion of digital images, particularly those of punctate patterns from fluorescence microscopy. Fluorescence microscopy has greatly
A Visual Secret Sharing Technique for Secure and Fast Transmission of Image
"... ABSTRACT: In the advent of booming communication technology, the needs for information sharing and transfer have increased exponentially which requires more and more new techniques to meet the increasing needs of a modern society. Visual cryptography scheme is a cryptographic technique which allows ..."
Abstract
- Add to MetaCart
meaningless and noise like shares. In this paper the idea is to increase the levels of security and to enhance the transmission speed of secret information over the network, as the basic model of Visual Cryptography is not an efficient tool to hide the information. In the proposed scheme initially the image
Visualization of Hash-functions
"... den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents ..."
Abstract
- Add to MetaCart
den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents
Results 1 - 10
of
250