Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables high rate of da...
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
In this paper, we propose a discrete cosine transform (DCT) based spread spectrum data-hiding algorithm that is resilient to statistical attacks. Unlike other spread spectrum base...
Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi