2010 IEEE International Conference on Acoustics, Speech and Signal Processing 2010
DOI: 10.1109/icassp.2010.5495425
|View full text |Cite
|
Sign up to set email alerts
|

Hiding information inside structured shapes

Abstract: This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a casual observer but detectable by a specialized decoder. The message embedding algorithm represents shape outline as a set of cubic Bezier curves and straight line segments. By slightly perturbing the Bezier curves, a single shape can spawn a library of similar-looking shapes each corresponding to a unique message. This library is eff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 8 publications
(5 reference statements)
0
3
0
Order By: Relevance
“…Wu and Liu [1] thought of a plan to utilize parallel pictures and inserting the information in ti dependent on the square based relationship However the picture twists is gigantic in this impact along these lines to beat this downside Yang and Kot [2] proposed the idea of visually impaired information with huge capacity limit and decent visual morals quality anyway this could be appropriate just to the paired components Varna et al [3] proposed another methodology for drubbing information into the content reports with changing long arrangements of characters however this idea can be just relevant to the characters not ASCII esteems. Das et al [4] thought of the thought by changing the other bend parameters in non-straight portions with the predefined shapes also.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Wu and Liu [1] thought of a plan to utilize parallel pictures and inserting the information in ti dependent on the square based relationship However the picture twists is gigantic in this impact along these lines to beat this downside Yang and Kot [2] proposed the idea of visually impaired information with huge capacity limit and decent visual morals quality anyway this could be appropriate just to the paired components Varna et al [3] proposed another methodology for drubbing information into the content reports with changing long arrangements of characters however this idea can be just relevant to the characters not ASCII esteems. Das et al [4] thought of the thought by changing the other bend parameters in non-straight portions with the predefined shapes also.…”
Section: Related Workmentioning
confidence: 99%
“…Because of the above reason, the dark modules are not being changed.The public message(Mpub) that needs to be encrypted will undergo the encryption techniques while key that will be encrypted will also be sent via the QR code. The encryption technique [4] to be utilized here to encode the open key is the all-encompassing slope figure calculation where in which the accompanying advances will be tolerated to make the information scrambled. At first the open information which should be scrambled is taken and there is no imperative on the information both the tally and the information will be masterminded in the request of the square lattice where in which the request is being chosen by the framework and should likewise be possible by the client.…”
Section: A Generationsmentioning
confidence: 99%
“…We have also successfully demonstrated the use of the NSSA for modelbased compression of landmark shape sequence data. In addition, the landmark shape based techniques discussed in this chapter has been extended to steganographic applications for hiding binary information inside structured shapes like text characters and glyphs 2 (more details in [83,84]. A patent has been filed : US Patent No.…”
Section: Discussionmentioning
confidence: 99%