scholarly journals A Dynamic Steganography Method for Web Images with Average Run-Length-Coding

2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Jin Liu ◽  
Yiwen Zhang

Web page has many redundancies, especially the dynamic html multimedia object. This paper proposes a novel method to employ the commonly used image elements on web pages. Due to the various types of image format and complexity of image contents and their position information, secret message bits could be coded to embed in these complex redundancies. Together with a specific covering code called average run-length-coding, the embedding efficiency could be reduced to  a low level and the resulting capacity outperforms traditional content-based image steganography, which modifies the image data itself and causes a real image quality degradation. Our experiment result demonstrates that the proposed method has limited processing latency and high embedding capacity. What’s more, this method has a low algorithm complexity and less image quality distortion compared with existing steganography methods.

1991 ◽  
Vol 37 (4) ◽  
pp. 860-866 ◽  
Author(s):  
S.-I. Arazaki ◽  
M. Saigusa ◽  
S. Hashiguchi ◽  
M. Ohki ◽  
M. Uchiyama ◽  
...  

2019 ◽  
Vol 2019 (1) ◽  
pp. 360-368
Author(s):  
Mekides Assefa Abebe ◽  
Jon Yngve Hardeberg

Different whiteboard image degradations highly reduce the legibility of pen-stroke content as well as the overall quality of the images. Consequently, different researchers addressed the problem through different image enhancement techniques. Most of the state-of-the-art approaches applied common image processing techniques such as background foreground segmentation, text extraction, contrast and color enhancements and white balancing. However, such types of conventional enhancement methods are incapable of recovering severely degraded pen-stroke contents and produce artifacts in the presence of complex pen-stroke illustrations. In order to surmount such problems, the authors have proposed a deep learning based solution. They have contributed a new whiteboard image data set and adopted two deep convolutional neural network architectures for whiteboard image quality enhancement applications. Their different evaluations of the trained models demonstrated their superior performances over the conventional methods.


Axioms ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 154
Author(s):  
Anderson Fonseca ◽  
Paulo Henrique Ferreira ◽  
Diego Carvalho do Nascimento ◽  
Rosemeire Fiaccone ◽  
Christopher Ulloa-Correa ◽  
...  

Statistical monitoring tools are well established in the literature, creating organizational cultures such as Six Sigma or Total Quality Management. Nevertheless, most of this literature is based on the normality assumption, e.g., based on the law of large numbers, and brings limitations towards truncated processes as open questions in this field. This work was motivated by the register of elements related to the water particles monitoring (relative humidity), an important source of moisture for the Copiapó watershed, and the Atacama region of Chile (the Atacama Desert), and presenting high asymmetry for rates and proportions data. This paper proposes a new control chart for interval data about rates and proportions (symbolic interval data) when they are not results of a Bernoulli process. The unit-Lindley distribution has many interesting properties, such as having only one parameter, from which we develop the unit-Lindley chart for both classical and symbolic data. The performance of the proposed control chart is analyzed using the average run length (ARL), median run length (MRL), and standard deviation of the run length (SDRL) metrics calculated through an extensive Monte Carlo simulation study. Results from the real data applications reveal the tool’s potential to be adopted to estimate the control limits in a Statistical Process Control (SPC) framework.


2021 ◽  
Vol 11 (15) ◽  
pp. 6741
Author(s):  
Chia-Chen Lin ◽  
Thai-Son Nguyen ◽  
Chin-Chen Chang ◽  
Wen-Chi Chang

Reversible data hiding has attracted significant attention from researchers because it can extract an embedded secret message correctly and recover a cover image without distortion. In this paper, a novel, efficient reversible data hiding scheme is proposed for absolute moment block truncation code (AMBTC) compressed images. The proposed scheme is based on the high correlation of neighboring values in two mean tables of AMBTC-compressed images to further losslessly encode these values and create free space for containing a secret message. Experimental results demonstrated that the proposed scheme obtained a high embedding capacity and guaranteed the same PSNRs as the traditional AMBTC algorithm. In addition, the proposed scheme achieved a higher embedding capacity and higher efficiency rate than those of some previous schemes while maintaining an acceptable bit rate.


2017 ◽  
Vol 14 (1) ◽  
pp. 1
Author(s):  
Hakan Eygü ◽  
M. Suphi Özçomak

The sample of the study was formed using simple random sampling, ranked set sampling, extreme ranked set sampling and median ranked set sampling. At the end of this process, the researcher created Hotelling’s T2 control charts, a multivariate statistical process control method. The performances of SRS, RSS, ERSS and MRSS sampling methods were compared to one another using these control charts. A simulation was performed to see the average run-length values for Hotelling’s T2 control charts, and these findings were also used for the comparison of the sampling performances.At the end of the study, the researcher formed a sample using median ranked set sampling and created the Hotelling’s T2 control chart. As a result of this operation, the researcher found that there was an out-of-control signal in the process, while there was no such signal in other sampling methods. When the average run-length values obtained from Hotelling’s T2 control charts were compared, it was seen that a shift in the process was detected by the ranked set sampling earlier, when compared to other sampling methods. This paper it can be said that the methods used are unique to the literature because they are applied to multivariate data.


Sign in / Sign up

Export Citation Format

Share Document