Two-Description Image Coding With Steganography
نویسندگان
چکیده
منابع مشابه
Multiple-Description Wavelet based Image Coding
We consider the problem of coding images for transmission over error-prone channels. The impairments we target are transient channel shutdowns, as would occur in a packet network when a packet is lost, or in a wireless system during a deep fade: when data is delivered it is assumed to be error-free, but some of the data may never reach the receiver. The proposed algorithms are based on a combin...
متن کاملMultiple Description Image Coding with Block-Coherent Redundant Dictionaries
This paper presents a method for multiple description coding, by clustering generic redundant dictionaries into blocks of N atoms. Since these blocks are likely to gather coherent atoms, the encoder can distribute atoms from the same coherent block to different descriptions, without important penalty on the side distortion. In the same time, atoms from the same blocks are sufficiently different...
متن کاملImage Steganography
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all...
متن کاملA Reliable Image Steganography with Image Clustering and Robust Steganography using IWT
Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography plan concealing a largesize dim picture into a little size dark picture. Preprocessing is initially performed both on spread and mystery pictures. Arnold change is performed on the my...
متن کاملSecret image sharing with steganography and authentication
A novel approach to secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is first processed into n shares which are then hidden in n user-selected camouflage images. It is suggested to select these camouflage images to contain well-known contents, like famous character images, well-known scene pi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Signal Processing Letters
سال: 2008
ISSN: 1070-9908
DOI: 10.1109/lsp.2008.2006710