2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies 2014
DOI: 10.1109/icesc.2014.28
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Data Hiding Using Digital Image Signal Processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
5
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…This gloss cannot be represented by mixing normal color inks. Data hiding techniques have been widely studied in the information security field for protecting the copyright of digital images [1][2][3][4][5][6][7][8][9][10][11][12]. The main purpose of data hiding is to prohibit malicious copying and secondary use without permission by embedding the copyright information into the images.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This gloss cannot be represented by mixing normal color inks. Data hiding techniques have been widely studied in the information security field for protecting the copyright of digital images [1][2][3][4][5][6][7][8][9][10][11][12]. The main purpose of data hiding is to prohibit malicious copying and secondary use without permission by embedding the copyright information into the images.…”
Section: Introductionmentioning
confidence: 99%
“…This gloss cannot be represented by mixing normal color inks. a) Correspondence to: imaizumi@chiba-u.jp * Graduate School of Science and Engineering, Chiba University 1-33 Yayoicho, Inage-ku, Chiba-shi, Chiba 263-8522, Japan * * Institute for Global Prominent Research, Chiba University 1-33 Yayoicho, Inage-ku, Chiba-shi, Chiba 263-8522, Japan * * * Graduate School of Engineering, Chiba University 1-33 Yayoicho, Inage-ku, Chiba-shi, Chiba 263-8522, Japan * * * * Software Design Department, MIMAKI ENGINEERING CO., LTD. 2182-3 Shigeno-otsu, Tomi-shi, Nagano 389-0512, Japan Data hiding techniques have been widely studied in the information security field for protecting the copyright of digital images [1][2][3][4][5][6][7][8][9][10][11][12]. The main purpose of data hiding is to prohibit malicious copying and secondary use without permission by embedding the copyright information into the images.…”
Section: Introductionmentioning
confidence: 99%
“…string is embedded in a pixel such that the SDS of the changed pixel value in the stego image equals the decimal equalent of the 3 bit message string. Sumedha Sirsikar and JagniliSalunkee,[28] proposed a data hiding at method that combines the features of Hamming, Optimal Pixel Adjustment…”
mentioning
confidence: 99%
“…Ultimately, the stego-image is generated with a certain image quality. So, the spatial domain-based approaches can be partitioned into three categories: (i) high embedding capacity approaches with barely acceptable image quality (e.g., [5]- [7]), (ii) high image quality approaches with reasonable hiding capacity (e.g., [8]- [10]), and (iii) restricted embedding capacity approaches with a slight distortion in the image (e.g., [11]- [13]). …”
mentioning
confidence: 99%
“…In [11], authors use the optimal pixel adjustment procedure (OPAP) in combination with a modified Hamming method to improve the imperceptibility of the stego-image, however, with a limited size of the hidden text. In [12], an adaptive LSB substitution method using uncorrelated color space, increasing the property of imperceptibility to embed the encrypted data inside the V -plane of HSV color model based on secret key.…”
mentioning
confidence: 99%