Sciweavers

IJACTAICIT
2010
189views more  IJACTAICIT 2010»
13 years 8 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
ISCIS
2003
Springer
14 years 4 months ago
Multiple Description Coding for Image Data Hiding in the Spatial Domain
In this paper, we develop a robust image data hiding scheme based on multiple description coding of the signature image. At the transmitter, the signature image is encoded by balan...
Mohsen Ashourian, Yo-Sung Ho
ICICS
2003
Springer
14 years 4 months ago
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains
In this paper, we propose a new method for hiding a signature image in the host image. We encode the signature image by a balanced two-description subband coder and embed the descr...
Mohsen Ashourian, Yo-Sung Ho
PCM
2005
Springer
88views Multimedia» more  PCM 2005»
14 years 5 months ago
A Robust Method for Data Hiding in Color Images
In this paper, we propose a methodology for embedding watermark image data into color images. At the transmitter, the signature image is encoded by a multiple description encoder. ...
Mohsen Ashourian, Payman Moallem, Yo-Sung Ho
ISM
2006
IEEE
104views Multimedia» more  ISM 2006»
14 years 5 months ago
A Novel Invisible Color Image Watermarking Scheme Using Image Adaptive Watermark Creation and Robust Insertion-Extraction
In this paper we present a robust and novel strategic invisible approach for insertion-extraction of a digital watermark, a color image, into color images. The novelty of our sche...
Saraju P. Mohanty, Parthasarathy Guturu, Elias Kou...
ICDS
2010
IEEE
14 years 6 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle