Zero-error information hiding capacity of digital images

Author(s):  
Ching-Yung Lin ◽  
Shih-Fu Chang
2008 ◽  
Vol 178 (14) ◽  
pp. 2950-2959 ◽  
Author(s):  
Fan Zhang ◽  
Zhigeng Pan ◽  
Kui Cao ◽  
Fengbin Zheng ◽  
Fangming Wu

2013 ◽  
Vol 798-799 ◽  
pp. 423-426
Author(s):  
Xiao Feng Wang

Through the analysis of the hypertext markup, proposed and implemented several new methods of text information hiding. The concealment of these methods is better, Comprehensive utilization of these methods can obtain large information hiding capacity, better concealed. And they have better robustness for traditional attack.


Author(s):  
Kitahiro Kaneda ◽  
Keiichi Iwamura

Digital watermarks provide the capability to insert additional information onto various media such as still images, movies, and audios, by utilizing features of the media content. Several techniques that use content features such as text or images have already been proposed for printed documents. The authors propose two new techniques using a single dot pattern and an Artificial Fiber (AF) pattern in order to address the disadvantages of conventional information hiding technologies for paper media. In this chapter, the authors describe each scheme’s characteristics, and how to improve its robustness. As a result, they have attained greater than 80% extraction rate with an information hiding capacity of 91 Kbits in the case of the single dot pattern, and a 100% extraction rate with color characters as the foreground in the case of using artificial fiber patterns.


2020 ◽  
Vol 104 (sp1) ◽  
Author(s):  
Zheng Ma ◽  
Yan Ma ◽  
Xiaohong Huang ◽  
Manjun Zhang ◽  
Yanxiao Liu ◽  
...  

2013 ◽  
Vol 850-851 ◽  
pp. 483-486
Author(s):  
Xiao Feng Wang

This paper designs and implements an information hiding algorithms by using the equivalent characteristics of attributes and sub-elements in the XML document. Experimental results show that the algorithm has large information hiding capacity, better hiding features and robustness.


2005 ◽  
pp. 173-206
Author(s):  
Ching-Yung Lin

Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the self-authentication-and-recovery image (SARI) system, and a novel technique for image/video authentication in the semantic level. This chapter provides an overview of these image authentication issues.


2018 ◽  
Vol 22 ◽  
pp. 01026 ◽  
Author(s):  
Yucel Inan

Several methods developed and applied for protecting the information. One of these is the stenography. Steganographic techniques are used to transmit the information in the image to the receiver in a secure manner. There are two main principles in the steganographic process. The first one is to hide the message in the image and the second one is to reduce the distortion on the image caused by information hiding. By making changes on digital images, a lot of information can be placed in the image. Nevertheless, changes in the image should not be noticed. In this paper, the effect of using various bit length of the steganographic LSB method on the image distortion is studied. The PSNR, SNR and MSE were used to assess the distortion rates of the images. Histograms were drawn to visualize the differences between original and encoded, “stego-images”.


Sign in / Sign up

Export Citation Format

Share Document