2014
DOI: 10.4316/aece.2014.02006
|View full text |Cite
|
Sign up to set email alerts
|

A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…(1) Function [EW_img] � Extraction (W_3D_Obj, β, Key 1 , Key 2 , Key 3 ) (2) //W_3D_Obj : Watermarked 3D object vertices, Key 1 , Key 2 and Key 3 : Encryption keys (3) Normalized W_3D_Obj � Normalize(W_3D_Obj) (4) [Vertex x, Vertex y, Vertex z] � Preprocessing(Normalized W_3D_Obj) (5) for j � 1 to length(Msg vector) do (6) [Coefficient 1 , Coefficient 2 , Coefficient 3 ] � DC T(Vertex x(j), Vertex y(j), Vertex z(j)) (7) Extract the RecEncMsg value within the Coefficients values as the following equation system:…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…(1) Function [EW_img] � Extraction (W_3D_Obj, β, Key 1 , Key 2 , Key 3 ) (2) //W_3D_Obj : Watermarked 3D object vertices, Key 1 , Key 2 and Key 3 : Encryption keys (3) Normalized W_3D_Obj � Normalize(W_3D_Obj) (4) [Vertex x, Vertex y, Vertex z] � Preprocessing(Normalized W_3D_Obj) (5) for j � 1 to length(Msg vector) do (6) [Coefficient 1 , Coefficient 2 , Coefficient 3 ] � DC T(Vertex x(j), Vertex y(j), Vertex z(j)) (7) Extract the RecEncMsg value within the Coefficients values as the following equation system:…”
Section: Methodsmentioning
confidence: 99%
“…In modern times, watermarking techniques for a wide range of digital media were utilized as a host cover to hide or embed a piece of information message in such a way that it is imperceptible to a human observer. Usually, the digital media covers can take any form such as images [1][2][3][4][5][6][7], videos [8][9][10][11][12], audio [13][14][15], and DNA sequences [16,17]. Even so the 3D objects are widely available and important, there are a few existing watermarking techniques.…”
Section: Introductionmentioning
confidence: 99%
“…[19]; on the other hand, the vectors of the ranges in Figure 7e are 𝒂 = [𝑎 , 𝑎 , 𝑎 ] = [7,11,12] and 𝒃 = [𝑏 , 𝑏 , 𝑏 ] = [3,9,19].…”
Section: Optimization Processmentioning
confidence: 99%
“…We can identify three basic types of RDH approaches [1], including lossless compression (LC) [2][3][4], difference expansion (DE) [5][6][7][8], and histogram shifting (HS) [9][10][11][12][13][14][15]. Previous methods have been combined to substantially improve results [8,14,[16][17][18][19][20]. In the context of HS schemes, the first HS technique described in [9] selects a range in the histogram between a peak-bin and a zero bin, and then, the bins in the open interval are shifted toward the zero bin to create a vacancy.…”
Section: Introductionmentioning
confidence: 99%
“…The Fourier transform (FT) is a transform function that is used to decompose a function into waves of different amplitudes and frequencies [9]. The Discrete Cosine transform (DCT) [10] and The Discrete Wavelet Transform (DWT) [11] are other transform functions that are typically utilized for image steganography. In fact, WLT decomposes a function into a series of wavelets that are wave-like oscillations which are localized in time [12].…”
Section: Introductionmentioning
confidence: 99%