The paper introduces a new scheme for data hiding in JPEG-LS modeled on the image source content and rate control. The scheme calls for hiding data in the least significant bits of the error control for the image samp...
详细信息
ISBN:
(纸本)9780769529943
The paper introduces a new scheme for data hiding in JPEG-LS modeled on the image source content and rate control. The scheme calls for hiding data in the least significant bits of the error control for the image samples. Results showed that the image content determines the amount of bits that were hidden. Furthermore, in spatially gradient complex images more data was hidden in the near-lossless compressed domain with acceptable striated distortions. The gradient flat Lenna at NEAR=8 had 497kbits hidden while the gradient complex Baboon at NEAR=8 had 524kbits hidden. Also, Lenna is highly striated distorted while Baboon is not.
Most data embedding techniques distort the original image as a side effect. To overcome such a problem, reversible data embedding is used to restore the original content after the removal of the embedded data. However...
详细信息
ISBN:
(纸本)0769529941
Most data embedding techniques distort the original image as a side effect. To overcome such a problem, reversible data embedding is used to restore the original content after the removal of the embedded data. However, it is assumed that the embedded image is not altered and such a constraint is sometimes considered unnecessary because as long as the image can be restored to an acceptable level, moderate alteration on the embedded image should be allowed. Such a reasoning leads to a new category of techniques called near-reversible data embedding, in which the embedded image is allowed to be manipulated and the image can be restored to some extent that is very close to the original image. In this paper, a novel near-reversible data embedding algorithm is proposed based on projection histogram manipulations. The experimental results demonstrated that proposed algorithm performs very well in terms Of embedding capacity, image fidelity, and robustness against common image processing operations.
The human circulatory system serves as a pathway for transporting oxygen and other important molecules throughout body. To gain a clear view of the hemodynamics behind the arterial circuit mathematically understanding...
详细信息
ISBN:
(纸本)9780889866676
The human circulatory system serves as a pathway for transporting oxygen and other important molecules throughout body. To gain a clear view of the hemodynamics behind the arterial circuit mathematically understanding and describing the mechanics of the cardiovascular system pertaining to the arterial circuit is studied and presented in the paper. Within the constraints of the systemic circuit (left ventricle to capillary bed) the primary goal is to gather as many insights to the functionality of the Arterial Blood Pressure (ABP) system. In this endeavor it was necessary to properly and accurately gather sampled data from patients. After gathering the initial sets of data from 7 patients and applying the Fourier analysis procedures, we used physiological understanding to discover the factors affecting the formulation of ABP signal waveforms. The analysis is emphasized on 1st and 2nd harmonics and their patterns associated with patient conditions in liver transplant operations.
An iterative method for designing efficient, simple and high-capacity lossless embedding method for BAP images with a 256-color grayscale palette is presented The proposed method is based on a palette modification sch...
详细信息
ISBN:
(纸本)0769529941
An iterative method for designing efficient, simple and high-capacity lossless embedding method for BAP images with a 256-color grayscale palette is presented The proposed method is based on a palette modification scheme, which can iteratively embed message bits into pixels with the most occurrence gray value in a BMP image. In each iteration, both the overhead of removing an entry color in the palette and the benefit of copying another entry color to replace it are calculated. If the maximal benefit exceeds the minimal overhead, an entry color is replaced Experimental results and performance comparison with other lossless data hiding schemes are presented to show the effectiveness of the proposed method.
In this paper, a novel data hiding scheme based on virtual window partition technique has been proposed to contribute the high payload capacity, low computation overhead and satisfied security. In addition, the propos...
详细信息
ISBN:
(纸本)9780769529943
In this paper, a novel data hiding scheme based on virtual window partition technique has been proposed to contribute the high payload capacity, low computation overhead and satisfied security. In addition, the proposed scheme has the advantage of stability because the payload capacity depends on a predetermined virtual window size. Some experimental results were performed to show that our proposed method has the superior both in payload and embedding quality in comparison to the data hiding methods based on the exploiting modification direction (EMD) embedding and the binary space partition (BSP) tree. The experimental result shows that our data hiding method based on virtual window partition technique can embed four bits per pixel without incurring any form of perceived distortion.
The main challenge of mining sequential patterns is the high processing cost of support counting for large amount of candidate patterns, and a lot of patterns are not interesting to users. In this paper a novel algori...
详细信息
ISBN:
(纸本)9780769529943
The main challenge of mining sequential patterns is the high processing cost of support counting for large amount of candidate patterns, and a lot of patterns are not interesting to users. In this paper a novel algorithm MSMA (Maximal Sequential Pattern Mining Based on Simultaneous Monotone and Anti-monotone constraints) incorporating both maximal and constraint-based sequential pattern mining in mining process is proposed. It allows the efficient mining of sequential patterns when both monotone and anti-monotone constraints are simultaneously pushed in mining process at different strategic stages. Our experiment shows that MSMA is an efficient algorithm for handling simultaneous monotone and anti-monotone constraints.
Mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In most applications, the security...
详细信息
ISBN:
(纸本)9780769529943
Mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In most applications, the security of mobile agents is of the utmost importance. Obfuscation is a technique in which the mobile code producer enforces the security policy by applying a behavior transformation to the code before sending it to run on different platforms. This paper presents a protection scheme of mobile agent in network application, which combining obfuscated data and time checking technology to verify the security of node. How to obtain important data in time checking is given also. The protection scheme is tested in actual network management environment, which can effectively identify the malicious node.
In this paper, we present a simple but novel method that does not require the original watermark in decoding to embed watermarks into dithered halftone images by bit-interleaving. In general, the sub-image resulted fr...
详细信息
ISBN:
(纸本)9780769529943
In this paper, we present a simple but novel method that does not require the original watermark in decoding to embed watermarks into dithered halftone images by bit-interleaving. In general, the sub-image resulted from bit-interleaving has the property that the sub-image from the consecutive threshold value has increasing number of black pixels. Our method fully utilizes this property such that it not only needs less additive pseudo pixels to eliminate the Non-increased black pixel pairs, but also avoids false positive defection. The experiments show that the technique is sufficiently robust to guard against the cropping and tampering.
data embedding is a technique for delivering secret data over Internet. Digital images are widely used cover media for carrying secret data. This is because the distortion of images is hard to distinguish by human eye...
ISBN:
(纸本)9780769529943
data embedding is a technique for delivering secret data over Internet. Digital images are widely used cover media for carrying secret data. This is because the distortion of images is hard to distinguish by human eyes. Because of the image property, data embedding method embeds as many secret data as possible. This paper presents a high payload data embedding technique by employing the concepts of irreversible data embedding and reversible data embedding. Chang et al.'s embedding method and Tian's embedding method are two key embedding operations used in the proposed method. The proposed method embeds secret data twice. First, secret data is embedded by using Chang et al.'s method. Then, Tian's method is applied to embed the secret data. The experimental results show that the proposed method embeds 2.49 secret bits into one pixel with higher than 39 dB visual quality of stego image.
The digital forensics used in the corporate world primarily in relation to litigation involving computer-related evidence such as civil matters, breach of contract, breach of confidence, and so on, has recently been g...
详细信息
ISBN:
(纸本)0769529941
The digital forensics used in the corporate world primarily in relation to litigation involving computer-related evidence such as civil matters, breach of contract, breach of confidence, and so on, has recently been gaining a great deal of attention. In order to support the digital forensics in a stand-alone environment, we proposed a system named "Dig-Force (Digital Forensic System with Chaining Signature for Evidence)" that uses a USB device with a smart card function and a hysteresis signature based on digital signature technology. In the present paper, we discuss an application suitable for our system, and pro-pose a practical use such as surgical procedures where misconduct and mistakes are not permissible. In such a scene, not only data from a keyboard but also data from a camera are required. We also report on a program for the Dig-Force system that uses a function suitable for a camera application. Moreover, we show the result of an experiment that applies this program. The result shows the system is useful for keyboard as well as camera applications.
暂无评论