Linked e-resources

Details

Preface; Conference Organization; Contents; Part I Information Hiding and Secret Sharing; 1 Demonstration Experiment of Data Hiding into OOXML Document for Suppression of Plagiarism; Abstract; 1 Introduction; 2 Problem Statement; 3 Related Works; 4 OOXML Format; 5 Examined Methods; 5.1 A method based on images; 5.2 A method based on similar fonts; 6 Experiments; 6.1 Experiment 1; 6.2 Experiment 2; 7 Conclusion; References; 2 A Revisit to LSB Substitution Based Data Hiding for Embedding More Information; Abstract; Keywords; 1 Introduction; 2 Review of Chen and Chang's scheme.

3 Proposed scheme4 Experimental results; 5 Conclusions; References; 3 Behavior Steganography in Social Network; Abstract; Keywords; 1 Introduction; 2 System Description; 3 Steganographic method; 4 Conclusion; Acknowledgement; References; 4 Robust Steganography Using Texture Synthesis; Abstract; Keywords; 1 Introduction; 2 Proposed Method; 2.1 Data Hiding; 2.2 Data Extraction; 3 Experimental Results; 4 Conclusions; Acknowledgement; References; 5 A Reversible Data Hiding Scheme in AMBTC Compression Code Using Joint Neighborhood Coding; Abstract; Keywords; 1 Introduction; 2 Related works.

2.1 Absolute Moment Block Truncation Coding2.2 Joint Neighborhood Coding; 3 The proposed method; 3.1 Data hiding phase; 3.2 Data extraction phase; 4 Experimental results; 5 Conclusions; 6 Acknowledgement; References; 6 A Quantization-Based Image Watermarking Scheme Using Vector Dot Product; Abstract; Keywords; 1 Introduction; 2 The Proposed Method; 2.1 An overview; 2.2 Single bit embedding algorithms; 2.3 Image watermarking optimized for pre-specified PSNR; 3 Experimental Results; 4 Conclusions; References; 7 High-capacity Robust Watermarking Approach for Protecting Ownership Right; Abstract.

Keywords1 Introduction; 2 Proposed Method; 3 Experimental Results; 4 Conclusion; References; 8 High Payload Data Hiding Based on Jus tNoticeable Distortion Profile and LSB Substitution; Abstract; Keywords; 1 Introduction; 2 Related Works; 2.1 Swain's data hiding scheme; 2.2 Chou and Li's profile estimation method; 3 The Proposed Scheme; 4 Experimental Results; 5 Conclusions; References; 9 An Improved Data Hiding Method of Five Pixel Pair Differencing and LSB Substitution Hiding Scheme; Abstract; 1 Introduction; 2 Related Work; 2.1 Pixel Value Differencing (PVD); 3 Proposed Method.

3.1 Embedding Phase3.2 Extraction Process; 4 Experimental Results; 5 Conclusion; References; 10 A Data Hiding Method based on Multi-predictor and Pixel Value Ordering; Abstract; Key words; 1 Introduction; 2 Related Works; 2.1 Pixel-based Pixel Value Ordering (PPVO) [9]; 2.2 Media Edge Detect (MED) [17]; 2.3 Data Hiding Method Using Image Interpolation (NMI) [4]; 2.4 Interpolating Neighboring Pixels (INP) [5]; 2.5 High Payload Reversible Data Embedding Method [13]; 3 The Proposed Method; 3.1 The Prediction Phase; 3.2 The Embedding Phase; 3.3 The Data Extraction Phase.

Browse Subjects

Show more subjects...

Statistics

from
to
Export