The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2007
DOI: 10.1016/j.patcog.2006.07.015
|View full text |Cite
|
Sign up to set email alerts
|

An image-hiding method with high hiding capacity based on best-block matching and k-means clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(25 citation statements)
references
References 11 publications
0
25
0
Order By: Relevance
“…The main objective in clustering applications is to group samples into clusters of similar features (e.g., the SPNs). Among a wide variety of methods, k-means [23,24] and fuzzy c-means [25][26][27] have been intensively employed in various applications. However, classical k-means and fuzzy c-means clustering methods rely on the user to provide the number of clusters and initial centroids.…”
Section: The Challenges Of Source-oriented Image Clustering and Relatmentioning
confidence: 99%
“…The main objective in clustering applications is to group samples into clusters of similar features (e.g., the SPNs). Among a wide variety of methods, k-means [23,24] and fuzzy c-means [25][26][27] have been intensively employed in various applications. However, classical k-means and fuzzy c-means clustering methods rely on the user to provide the number of clusters and initial centroids.…”
Section: The Challenges Of Source-oriented Image Clustering and Relatmentioning
confidence: 99%
“…Besides [15], we also compare in Table 2 some other image hiding methods [16][17][18] reported in 2005-2007. We bypass the detail introduction of [16][17][18] to save the paper length.…”
Section: Experiments and Comparisonsmentioning
confidence: 99%
“…We bypass the detail introduction of [16][17][18] to save the paper length. In Tests 1 and 2, since Ref.…”
Section: Experiments and Comparisonsmentioning
confidence: 99%
“…Cryptography, watermarking and steganography technologies are effective tools for communicating secret messages and data protection [3][4][5] . Researchers have proposed various methods to protect biometric data through information hiding techniques [6][7][8][9][10][11][12][13][14][15] . According to the hiding domain, there are spatial domain methods 8 , frequency domain methods 6,11,12 , and combination method of spatial and frequency domain 15 .…”
Section: Introductionmentioning
confidence: 99%