• No results found

[PDF] Top 20 Minimum Rate Prediction and Optimized Histograms Modification for Efficient Data Hiding

Has 10000 "Minimum Rate Prediction and Optimized Histograms Modification for Efficient Data Hiding" found on our website. Below are the top 20 most common "Minimum Rate Prediction and Optimized Histograms Modification for Efficient Data Hiding".

Minimum Rate Prediction and Optimized Histograms Modification for Efficient Data Hiding

Minimum Rate Prediction and Optimized Histograms Modification for Efficient Data Hiding

... earlier, data hiding offers a way to embed data into host cover medium for the purposes of ownership protection, authentication, fingerprinting, secret communication and annotation in medical, ... See full document

7

Data Hiding On Image By Using Particle Swarm Optimization And Histogram Modification

Data Hiding On Image By Using Particle Swarm Optimization And Histogram Modification

... based prediction technique here used has better accuracy, this project has a greater embedding rate and produces better visual quality than that of previous ...of prediction, this project only ... See full document

6

Efficient reversible hiding technique based  on pairwise prediction error expansion

Efficient reversible hiding technique based on pairwise prediction error expansion

... 2006], prediction-error expansion (PEE)based algorithms [Thodi, 2007; Hu, 2009; Sachnev et ...its efficient capacity distortion ...derived prediction-error histograms (PEH) has more rapidly ... See full document

6

Steganography integration into a low-bit rate speech codec

Steganography integration into a low-bit rate speech codec

... information hiding into the process of speech ...performs data embedding while pitch period prediction is conducted during low bit-rate speech encoding, thus maintaining synchronization ... See full document

30

Data Hiding using JPEG Steganography

Data Hiding using JPEG Steganography

... The fig 1 shows how a secret data is embedded into an image. The first step is to take an image as an input which can be either in JPEG or PNG or bmp format. Then the input image is separated from its blue plane. ... See full document

5

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference

... The data hiding algorithm take the advantage of difference ...the prediction value and the real value are calculated, and then modified the errors with histogram shifting ...the prediction ... See full document

6

Sequential Recovery Based Lossless Data Hiding in RGB Images with Increased Embedding Capacity

Sequential Recovery Based Lossless Data Hiding in RGB Images with Increased Embedding Capacity

... a modification of separable reversible data ...owner, data hider, and recipient. The data-hider divides the encrypted image into three sets and embeds message into each set to generate a ... See full document

6

A Lightweight Algorithm to Optimize Power Consumption in Sensor Node through Parametric Tuning Of Communication Interface

A Lightweight Algorithm to Optimize Power Consumption in Sensor Node through Parametric Tuning Of Communication Interface

... Hybrid algorithm is combination of a proximity search technique and section search technique. The proximity search technique looks for the parameter values in its proximity for optimization. This technique takes ... See full document

7

Comparison of neural networks and regression time series in estimating the Czech Republic and China trade balance

Comparison of neural networks and regression time series in estimating the Czech Republic and China trade balance

... Abstract. Foreign trade has been and is considered to be very important. Trade balance measurement provides one of the best analyzes of a country's external economic relations. It serves as a monetary expression of ... See full document

13

A Literature analysis on Privacy Preserving Data Mining

A Literature analysis on Privacy Preserving Data Mining

... in data mining aims to preserve these data against disclosure or ...preserving data mining (PPDM) [1,2] is a new research direction in data mining and statistical databases [3], where ... See full document

5

Efficient Data Hiding System using Cryptography and Steganography

Efficient Data Hiding System using Cryptography and Steganography

... of hiding communication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s ...with data from the hidden message ... See full document

6

Efficient Minimum Error Rate Training and Minimum Bayes Risk Decoding for Translation Hypergraphs and Lattices

Efficient Minimum Error Rate Training and Minimum Bayes Risk Decoding for Translation Hypergraphs and Lattices

... be optimized for the translation task instead of a criterion such as like- lihood that is unrelated to the evaluation met- ...are Minimum Error Rate Train- ing (MERT) (Och, 2003) and Minimum ... See full document

9

A Survey on Time Efficient and Secure Data Hiding Algorithm

A Survey on Time Efficient and Secure Data Hiding Algorithm

... In this thesis, we proposed an architecture, which will combine the two proposed algorithms: shown in figure 1 and reverse architecture used in receiver end is shown in figure 2. The key feature of this thesis is to ... See full document

6

Efficient Data Hiding Scheme Using Image Steganography

Efficient Data Hiding Scheme Using Image Steganography

... hide data as lossy and lossless. In lossy method, only MSB of data set is hidden in carrier data set where as in the lossless method MSB as well as LSB of data set is hidden in the carrier ... See full document

7

Lossless Data Hiding using Histogram Modification and Hash Encryption Scheme

Lossless Data Hiding using Histogram Modification and Hash Encryption Scheme

... Rijndael the advanced encryption standard is a symmetric block cipher.It uses the same key between the sender and receiver to encrypt and decrypt the message.Speed and cost make symmetric algorithms as the algorithm of ... See full document

9

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... The most common and simplest form of high bit-rate encoding is the least significant bit insertion (LSB)[6]. This method embeds the message into one or more least significant bits of some selected pixels. Not ... See full document

9

Efficient Data Hiding Scheme Using Audio Steganography

Efficient Data Hiding Scheme Using Audio Steganography

... system which is utilized to shroud the private or mystery information. This mystery information is inserted or hid in a manner that no other individual separated from the sender or beneficiary can seize it. Audio ... See full document

6

An Efficient and Secure Data Hiding Technique – Steganography

An Efficient and Secure Data Hiding Technique – Steganography

... secret data can be hidden without perceptually deteriorating the quality of the image and also gives the idea of where to inject the embedding bits in order to achieve the best result in terms of length of the ... See full document

9

An Efficient Prediction-and-Shifting Embedding Technique for High Quality Reversible Data Hiding

An Efficient Prediction-and-Shifting Embedding Technique for High Quality Reversible Data Hiding

... In this paper, we have presented a reversible data hiding scheme based on prediction-and-shifting embedding tech- nique and achieved high payload and high image quality. The proposed method employs ... See full document

12

AN EFFICIENT DATA HIDING IN ENCRYPTED IMAGE

AN EFFICIENT DATA HIDING IN ENCRYPTED IMAGE

... secret data to be transmitted are encrypted, a channel provider without any knowledge of the cryptographic key may tend to compress the encrypted data due to the limited channel ...and rate- ... See full document

13

Show all 10000 documents...