1999
DOI: 10.1016/s0167-8655(99)00118-x
|View full text |Cite
|
Sign up to set email alerts
|

Embedding of any type of data in images based on a human visual model and multiple-based number conversion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2001
2001
2020
2020

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Figure 6 and the extracted watermark is illustrated in Figure 6(f), where the watermark has been seriously distorted; however, the word "Mandrill" remains identifiable. Figure 7 demonstrates another robust watermarking scheme in the DCT domain, which is designed to be robust to the JPEG compression (Wu & Tsai, 1999). Figure 7(a) is the watermarked Lena after JPEG compressing with 50% quality, and the smaller logo on the right of Lena is the extracted watermark from the compressed Lena.…”
Section: Robust Watermarkingmentioning
confidence: 99%
“…Figure 6 and the extracted watermark is illustrated in Figure 6(f), where the watermark has been seriously distorted; however, the word "Mandrill" remains identifiable. Figure 7 demonstrates another robust watermarking scheme in the DCT domain, which is designed to be robust to the JPEG compression (Wu & Tsai, 1999). Figure 7(a) is the watermarked Lena after JPEG compressing with 50% quality, and the smaller logo on the right of Lena is the extracted watermark from the compressed Lena.…”
Section: Robust Watermarkingmentioning
confidence: 99%
“…In authentication stage, the one bit authentication code, b i , is extracted in each stego-block B i 90 by following equation: 5 The representation of the 7 pixels in each in each 167 blocks 2 AND 00000010 (2) =2 1 (12) where 1(i((m6m)/2. Any illegal stego-image will fail in authentication stage.…”
Section: Authentication and Secret Image Recovery Proceduresmentioning
confidence: 99%
“…Also, it is a common problem of most steganography methods used for embedding secret data in camouflage images. 1,9,11,12 Therefore, it is the purpose of this study to reduce the enlargement of stego-images and maintain the capability of image authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Due to fast growth of Internet applications and digital equipments, digitized images become more and more popular. Because of the ease of digital duplication and tampering, image security becomes an important issue nowadays [1,[6][7][8][9]. In certain application cases, it is a risk if a set of secret image is held by only one person without extra copies because the secret image set may be lost incidentally or modified intentionally.…”
Section: Introductionmentioning
confidence: 99%