Sciweavers

24 search results - page 2 / 5
» Performance study of common image steganography and steganal...
Sort
View
JDFP
2006
139views more  JDFP 2006»
13 years 7 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
SSWMC
2004
13 years 8 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
MTA
2006
283views more  MTA 2006»
13 years 7 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
ICIP
2004
IEEE
14 years 9 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...
VISUALIZATION
2005
IEEE
14 years 1 months ago
Visualizing intersecting surfaces with nested-surface techniques
This paper describes the adaptation and evaluation of existing nestedsurface visualization techniques for the problem of displaying intersecting surfaces. For this work, we collab...
Chris Weigle, Russell M. Taylor II