A survey on joint data-hiding and compression techniques based on SMVQ and image inpainting

Author(s):  
Sikha Mary Varghese ◽  
Alphonsa Johny ◽  
Jubilant Job
Keyword(s):  
Author(s):  
S. Poonguzhali ◽  
Avinash Sharma ◽  
V. Vedanarayanan ◽  
A. Aranganathan ◽  
T. Gomathi ◽  
...  

2012 ◽  
Vol 120 (1) ◽  
pp. 59-70 ◽  
Author(s):  
Chuan Qin ◽  
Zhi-Hui Wang ◽  
Chin-Chen Chang ◽  
KuoNan Chen

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 116027-116037 ◽  
Author(s):  
Xiaolong Liu ◽  
Chia-Chen Lin ◽  
Khan Muhammad ◽  
Fadi Al-Turjman ◽  
Shyan-Ming Yuan

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Liyun Dou ◽  
Zichi Wang ◽  
Zhenxing Qian ◽  
Guorui Feng

In this paper, we propose a privacy protection scheme using image dual-inpainting and data hiding. In the proposed scheme, the privacy contents in the original image are concealed, which are reversible that the privacy content can be perfectly recovered. We use an interactive approach to select the areas to be protected, that is, the protection data. To address the disadvantage that single image inpainting is susceptible to forensic localization, we propose a dual-inpainting algorithm to implement the object removal task. The protection data is embedded into the image with object removed using a popular data hiding method. We further use the pattern noise forensic detection and the objective metrics to assess the proposed method. The results on different scenarios show that the proposed scheme can achieve better visual quality and antiforensic capability than the state-of-the-art works.


2014 ◽  
Vol 23 (3) ◽  
pp. 969-978 ◽  
Author(s):  
Chuan Qin ◽  
Chin-Chen Chang ◽  
Yi-Ping Chiu

2018 ◽  
Vol 60 ◽  
pp. 160-172 ◽  
Author(s):  
Chuan Qin ◽  
Zhihong He ◽  
Heng Yao ◽  
Fang Cao ◽  
Liping Gao

2016 ◽  
Vol 2016 (1) ◽  
pp. 213-218
Author(s):  
Kazushige Banzawa ◽  
Kazuma Shinoda ◽  
Madoka Hasegawa

Author(s):  
Manoj Kumar ◽  
Rohit Tanwar

In the computerized age as a result of the broad utilization of web, information covering up in advanced symbolism assumes a fundamental part to guarantee copyright assurance and power from pernicious assaults. Today the exponential development in web clients request secure information correspondence, for that it is required to send the information as encoded or shrouded shape. Numerous data framework security procedures are accessible.Information transmission needs security. Information covering up can be accomplished through numerous techniques. Distinctive information concealing procedures are talked about in this paper which incorporates watermarking, steganography, fingerprinting, cryptography and advanced mark.


Sign in / Sign up

Export Citation Format

Share Document