Sciweavers

3147 search results - page 6 / 630
» Statistically Hiding Sets
Sort
View
ICIP
2002
IEEE
14 years 9 months ago
Quantized projection data hiding
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spr...
Fernando Pérez-González, Féli...
JMM2
2008
80views more  JMM2 2008»
13 years 7 months ago
Reliable Transmission of Audio Streams in Lossy Channels Using Application Level Data Hiding
The paper improves the reliability of audio streams in a lossy channel. The mechanism groups audio data samples into source and carrier sets. The carrier set carry the information ...
Parag Agarwal, Balakrishnan Prabhakaran
EUROCRYPT
2009
Springer
14 years 8 months ago
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
The existence of encryption and commitment schemes secure under selective opening attack (SOA) has remained open despite considerable interest and attention. We provide the rst pub...
Mihir Bellare, Dennis Hofheinz, Scott Yilek
ICIP
2004
IEEE
14 years 9 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...
MEDIAFORENSICS
2010
13 years 6 months ago
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Anindya Sarkar, B. S. Manjunath