Articles with "host image" as a keyword



Photo from wikipedia

FFT-ETM based distortion less and high payload image steganography

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-7664-7

Abstract: This paper is presenting a novel high capacity based imperceptible and robust image steganography technique for obscured communication. A considerable literature studied on this domain reveals distortion that drastically affects image quality. These techniques obscure… read more here.

Keywords: host image; image steganography; image; covert image ... See more keywords
Photo by osillbury from unsplash

Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Image Processing"

DOI: 10.1109/tip.2017.2706502

Abstract: A novel watermarking scheme is proposed that could substantially improve current watermarking techniques. This scheme exploits the features of micro images of watermarks to build association rules and embeds the rules into a host image… read more here.

Keywords: features classification; forest novel; image; watermarking techniques ... See more keywords
Photo by usgs from unsplash

Image steganography based on digital holography and saliency map

Sign Up to like & get
recommendations!
Published in 2019 at "Optical Engineering"

DOI: 10.1117/1.oe.58.1.013102

Abstract: Abstract. A gray-level intensity image can be employed as a host image for hiding a watermark image to protect information security. Past research works demonstrate that a gray-level hidden image can be embedded into the… read more here.

Keywords: image; holography; saliency; host image ... See more keywords