QIM data hiding for tamper detection and correction in digital images using wavelet transform

Author(s):  
Amit Phadikar ◽  
Santi P. Maity ◽  
Mrinal Mandal
2019 ◽  
Vol 36 (2) ◽  
pp. 1311-1321
Author(s):  
Wen-Chung Kuo ◽  
Chun-Cheng Wang ◽  
Shao-Hung Kuo ◽  
Lih-Chyau Wuu
Keyword(s):  

2012 ◽  
Vol 263-266 ◽  
pp. 167-170 ◽  
Author(s):  
Xin Wu Chen ◽  
Jing Ge ◽  
Jin Gen Liu

Contourlet transform is superior to wavelet transform in representing texture information and sparser in describing geometric structures in digital images, but lack of robust character of shift invariance. Non-subsampled contourlet transform (NSCT) alleviates this shortcoming hence more suitable for texture and has been studied for image de-noising, enhancement, and retrieval situations. Focus on improving the retrieval rates of existing contourlet transforms retrieval systems, a new texture retrieval algorithm was proposed. In the algorithm, texture information was represented by four statistical estimators, namely, L2-energy, kurtosis, standard deviation and L1-energy of each sub-band coefficients in NSCT domain. Experimental results show that the new algorithm can make a higher retrieval rate than the combination of standard deviation and energy which is most commonly used today.


2014 ◽  
Vol 6 (4) ◽  
pp. 1-13 ◽  
Author(s):  
Qi Tang ◽  
Guoli Ma ◽  
Weiming Zhang ◽  
Nenghai Yu

As the blueprint of vital activities of most living things on earth, DNA has important status and must be protected perfectly. And in current DNA databases, each sequence is stored with several notes that help to describe that sequence. However, these notes have no contribution to the protection of sequences. In this paper, the authors propose a reversible data hiding method for DNA sequences, which could be used either to embed sequence-related annotations, or to detect and restore tampers. When embedding sequence annotations, the methods works in low embedding rate mode. Only several bits of annotations are embedded. When used for tamper detection and tamper restoration, all possible embedding positions are utilized to assure the maximum restoration capacity.


Sign in / Sign up

Export Citation Format

Share Document