Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005.
DOI: 10.1109/icassp.2005.1415544
|View full text |Cite
|
Sign up to set email alerts
|

Multivariate Entropy Detector Based Hybrid Image Registration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…The proposed approach extracts salient descriptors from the two images using a multivariate entropy-based detector. The transformation parameters are obtained after establishing the correspondence between the salient descriptors of the two images [9]. 365 H. H. Pang, K. L. Tan, and X. Zhou, in 2004 introduced StegFD, a steganographic file driver that securely hides user-selected files in a file system so that, without the corresponding access keys, an attacker would not be able to deduce their existence.…”
Section: Earlier Workmentioning
confidence: 99%
“…The proposed approach extracts salient descriptors from the two images using a multivariate entropy-based detector. The transformation parameters are obtained after establishing the correspondence between the salient descriptors of the two images [9]. 365 H. H. Pang, K. L. Tan, and X. Zhou, in 2004 introduced StegFD, a steganographic file driver that securely hides user-selected files in a file system so that, without the corresponding access keys, an attacker would not be able to deduce their existence.…”
Section: Earlier Workmentioning
confidence: 99%
“…Data hiding [1] in the image has become an important technique for image authentication and identification. Ownership verification [8] and authentication is the major task for military people, research institute, and scientist. Image authentication is a technique for inserting information into an image for identification and authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Dumitrescu et al [4] construct an algorithm for detecting LSB steganography. Pavan et al [8] used entropy based technique for detecting the suitable areas in the document image where data can be embedded with minimum distortion. S-Tools [11] works by spreading the bit pattern of the file that you want to hide across least significant bits (LSBs) of the color levels in the image to prevent the prediction of potential enemy.…”
Section: Introductionmentioning
confidence: 99%
“…Because of the continual changes at the cutting edge of steganography and the large amount of data involved, steganalysists have suggested using machine learning techniques to characterize images as suspicious or nonsuspicious developed by Mittal et al [7] . Pavan et al [8] used entropy based technique for detecting the suitable areas in the document image where data can be embedded with minimum distortion. When using a 24 bit colour image, a bit of each of the red, green and blue colour components can be used, so a total of 3 bits can be stored in each pixel.…”
Section: Introductionmentioning
confidence: 99%
“…We discuss two types of attacks to be sure that our process for embedded data is worked efficiently. The first attack concerns to work against visual attacks [7,9] to make the ability of humans is unclearly discern between noise and visual patterns, and the second attack concerns to work against statistical attacks [3,8,10,11] to make it much difficult to automate.…”
Section: Introductionmentioning
confidence: 99%