Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
In this paper, we have investigated several aspects of multiplicative spread spectrum (MSS) embedding for Data Hiding. First, we analyze the probability of error of the maximum lik...
In this paper, we perform double embedding in the quantization index modulation (QIM) framework where a single coefficient is modified twice, using two quantizers, to embed two bi...