2000
DOI: 10.1147/sj.393.0547
|View full text |Cite
|
Sign up to set email alerts
|

Applications for data hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(34 citation statements)
references
References 23 publications
0
31
0
Order By: Relevance
“…Other applications are video-audio synchronization, companies' safe circulation of secret data, TV broadcasting, TCP/IP packets (for instance a unique ID can be embedded into an image to analyze the network traffic of particular users) [1], and also checksum embedding [15]. Petitcolas [16] demonstrated some contemporary applications, one of which was in Medical Imaging Systems where a separation is considered necessary for confidentiality between patients' image data or DNA sequences and their captions, e.g., physician, patient's name, address and other particulars.…”
Section: Steganography Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Other applications are video-audio synchronization, companies' safe circulation of secret data, TV broadcasting, TCP/IP packets (for instance a unique ID can be embedded into an image to analyze the network traffic of particular users) [1], and also checksum embedding [15]. Petitcolas [16] demonstrated some contemporary applications, one of which was in Medical Imaging Systems where a separation is considered necessary for confidentiality between patients' image data or DNA sequences and their captions, e.g., physician, patient's name, address and other particulars.…”
Section: Steganography Applicationsmentioning
confidence: 99%
“…However, it would be very hard to write a computer program capable of making such intelligent decisions in all possible cases, [70]". "While there are numerous techniques for embedding large quantities of data in images, there is no known technique for embedding this data in a manner that is robust in light of the variety of manipulations that may occur during image manipulation" [15].…”
Section: Originalmentioning
confidence: 99%
“…Watermarking has many different applications [Barnett 1999;Bender et al 2000;Cox and Miller 2002;DWA 2007], such as ownership evidence, fingerprinting, authentication and integrity verification, content labeling and protection, and usage control. Watermarking schemes do not work effectively for all types of media and universally for various diverse applications.…”
Section: Introductionmentioning
confidence: 99%
“…The cover images were divided into 1024 blocks of 8x8 pixels. The confidential message was encrypted and by using raster scan [2], [6], [11], [16], [17], [20], [35], [36] four random scan paths [2], [18], [19], [31], [37] (Z scan SFC, Hilbert SFC, Zigzag SFC, Moore SFC ) message were embedded. The path which results least MSE and Maximum PSNR has been found for each block.…”
Section: Related Workmentioning
confidence: 99%