We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.</p
Nowadays the role of data hiding has become more eminent. The data safety on the Internet is known t...
In the era of easy communications, data is widely transfered through Internet and networks. A lot of...
Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an...
Security has become an important issue with the proliferation of digital communication. Multimedia s...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Abstract. In this paper we propose a transparent, computationally simple and fast spatial domain dat...
A new data hiding scheme for binary image authentication that has a small distortion of the cover im...
[[abstract]]A new approach to binary image authentication in multimedia communication with distortio...
[[abstract]]A new approach to information hiding in binary images with the capabilities of hidden da...
[[abstract]]In this paper, an image authentication technique by embedding digital `watermarks' into ...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
[[abstract]]A new approach to information hiding in binary images with the capabilities of hidden da...
[[abstract]]Visual cryptography is an image secret sharing scheme used to encrypt the secret image i...
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and ...
Abstract. Image authentication is becoming very important for certifying data integrity. A key issue...
Nowadays the role of data hiding has become more eminent. The data safety on the Internet is known t...
In the era of easy communications, data is widely transfered through Internet and networks. A lot of...
Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an...
Security has become an important issue with the proliferation of digital communication. Multimedia s...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Abstract. In this paper we propose a transparent, computationally simple and fast spatial domain dat...
A new data hiding scheme for binary image authentication that has a small distortion of the cover im...
[[abstract]]A new approach to binary image authentication in multimedia communication with distortio...
[[abstract]]A new approach to information hiding in binary images with the capabilities of hidden da...
[[abstract]]In this paper, an image authentication technique by embedding digital `watermarks' into ...
The rapid growth of efficient tools, which generate and edit digital images demands effective method...
[[abstract]]A new approach to information hiding in binary images with the capabilities of hidden da...
[[abstract]]Visual cryptography is an image secret sharing scheme used to encrypt the secret image i...
The advancement in digital technology and multimedia has made it easy to duplicate, manipulate and ...
Abstract. Image authentication is becoming very important for certifying data integrity. A key issue...
Nowadays the role of data hiding has become more eminent. The data safety on the Internet is known t...
In the era of easy communications, data is widely transfered through Internet and networks. A lot of...
Steganography is the art of hiding and transmitting data through apparently innocuous carriers in an...