无弹性 发表于 2025-3-26 23:30:50

Reversible Data Hiding by Coefficient Adjustment Algorithm,hm mainly consists of three steps, which are block-mean removal, pixel squeezing, and pixel isolation. To provide a large hiding space, the mean removal firstly generates the differenced blocks from an input image. A pixel in the differenced blocks can be obtained by subtracting the original pixel v

废墟 发表于 2025-3-27 02:09:24

ICA-Based Image and Video Watermarking,o human visual system and compact representation of images and videos are the key points in the field of image and video analysis. As an unsupervised learning method, Independent Component Analysis (ICA) has been used widely in image and video processing, because it is proved to match human visual s

大骂 发表于 2025-3-27 05:41:06

Content Based Invariant Image Watermarking with High Capacity,T). The underlying idea of this kind of method is to align the geometric transforms before watermark embedding and extraction. These schemes are usually preceded by watermark synchronization, an operation to determine some local regions for watermark embedding and extraction. Due to the small size o

是突袭 发表于 2025-3-27 13:28:36

Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization,l BTC method compresses a block of a grayscale image into a bitmap and a pair of quantization numbers. For a color image, which is encoded using R, G, and B channels, the BTC method enhances the compression rate using a common bitmap instead of three naturally formed bitmaps. However, it is difficul

Calculus 发表于 2025-3-27 15:33:51

Application of Genetic-Based Wavelet Packet Watermarking for Copyright Protection, genetic watermarking scheme based on the wavelet packet transform (WPT) for the applications of copyright protection and trusted communication. Wavelet packet transform can be regarded as a generalization of the discrete wavelet transformh (DWT). For the WPT, a best wavelet basis in the sense of ev

姑姑在炫耀 发表于 2025-3-27 19:58:38

http://reply.papertrans.cn/83/8228/822775/822775_36.png

准则 发表于 2025-3-27 23:47:13

A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme,s. The security of acoustic data is an important issue. Particularly, a real-time acoustic steganography is required in a public broadcasting or mobile communication system. This chapter proposes a new steganography scheme with capacity variability and synchronization for secure transmission of acou

思乡病 发表于 2025-3-28 02:09:40

http://reply.papertrans.cn/83/8228/822775/822775_38.png

不可侵犯 发表于 2025-3-28 07:12:48

http://reply.papertrans.cn/83/8228/822775/822775_39.png

exhilaration 发表于 2025-3-28 12:46:39

An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring,t messages. Then the scheme hidden data into the compression code through replacing one codeword in a color with another codeword in another color. The performance of the proposed scheme was evaluated on the basis of embedding capacity and imperceptibility, which proved the scheme’s validity.
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Recent Advances in Information Hiding and Applications; Jeng-Shyang Pan,Hsiang-Cheh Huang,Yao Zhao Book 2013 Springer-Verlag Berlin Heidel