Study on the Technology of Information Hiding Based on HTML Tags

2013 ◽  
Vol 798-799 ◽  
pp. 423-426
Author(s):  
Xiao Feng Wang

Through the analysis of the hypertext markup, proposed and implemented several new methods of text information hiding. The concealment of these methods is better, Comprehensive utilization of these methods can obtain large information hiding capacity, better concealed. And they have better robustness for traditional attack.

Author(s):  
Kitahiro Kaneda ◽  
Keiichi Iwamura

Digital watermarks provide the capability to insert additional information onto various media such as still images, movies, and audios, by utilizing features of the media content. Several techniques that use content features such as text or images have already been proposed for printed documents. The authors propose two new techniques using a single dot pattern and an Artificial Fiber (AF) pattern in order to address the disadvantages of conventional information hiding technologies for paper media. In this chapter, the authors describe each scheme’s characteristics, and how to improve its robustness. As a result, they have attained greater than 80% extraction rate with an information hiding capacity of 91 Kbits in the case of the single dot pattern, and a 100% extraction rate with color characters as the foreground in the case of using artificial fiber patterns.


2020 ◽  
Vol 104 (sp1) ◽  
Author(s):  
Zheng Ma ◽  
Yan Ma ◽  
Xiaohong Huang ◽  
Manjun Zhang ◽  
Yanxiao Liu ◽  
...  

2008 ◽  
Vol 178 (14) ◽  
pp. 2950-2959 ◽  
Author(s):  
Fan Zhang ◽  
Zhigeng Pan ◽  
Kui Cao ◽  
Fengbin Zheng ◽  
Fangming Wu

2013 ◽  
Vol 850-851 ◽  
pp. 483-486
Author(s):  
Xiao Feng Wang

This paper designs and implements an information hiding algorithms by using the equivalent characteristics of attributes and sub-elements in the XML document. Experimental results show that the algorithm has large information hiding capacity, better hiding features and robustness.


2005 ◽  
pp. 173-206
Author(s):  
Ching-Yung Lin

Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital signature, the theoretical bound of information hiding capacity of images, an introduction of the self-authentication-and-recovery image (SARI) system, and a novel technique for image/video authentication in the semantic level. This chapter provides an overview of these image authentication issues.


Sign in / Sign up

Export Citation Format

Share Document