WCC 2000 - ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No.00EX420)
DOI: 10.1109/icct.2000.889233
|View full text |Cite
|
Sign up to set email alerts
|

Robust data hiding for images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…Abdulaziz and Pang [55] use vector quantization called Linde-Buzo-Gray (LBG) coupled with Block codes known as BCH code and 1-Stage discrete Haar Wavelet transforms. They reaffirm that modifying data using a wavelet transformation preserves good quality with little perceptual artefacts.…”
Section: Fig 17mentioning
confidence: 99%
“…Abdulaziz and Pang [55] use vector quantization called Linde-Buzo-Gray (LBG) coupled with Block codes known as BCH code and 1-Stage discrete Haar Wavelet transforms. They reaffirm that modifying data using a wavelet transformation preserves good quality with little perceptual artefacts.…”
Section: Fig 17mentioning
confidence: 99%
“…[50] [51] [52].Abdulaziz and Pang [53] is of the view that when the quantization vector is used it is said to be LBG (Linde Buzo Gray) which is paired along the block codes commonly called BCH code and 1-stage discrete Haar wavelet transforms. It is also established fact that data transformation with wavelet transform saves some better quality along with the perceptual aretfacts.…”
Section: Dwt (Discrete Wavelet Transform)mentioning
confidence: 99%
“…In this domain various algorithms are Li and Wang steganography [5], McKeon 2DdiscreteFourier transform (DFT) based steganography [44], Jsteg for jpeg images [6,7], OutGuess [8], -F5''algorithm [9]. Besides some DWT based techniques like W.Y.Chen, Color image steganography scheme using set partitioning in hierarchical trees coding [11], Abdulaziz and Pang technique based upon vector quantization called Linde-Buzo-Gray (LBG)coupled with block codes known as BCH code and 1-stage discrete Haar wavelet transforms [12] are certain wavelet based steganography techniques. The DWT-based embedding technique is still in its infancy.…”
Section: Kerchoff's Principlementioning
confidence: 99%