Modulation and Information Hiding in Images
نویسندگان
چکیده
We use concepts from communication theory to characterize information hiding schemes: the amount of information that can be hidden, its perceptibility, and its robustness to removal can be modeled using the quantities channel capacity, signal-to-noise ratio, and jamming margin. We then introduce new information hiding schemes whose parameters can easily be adjusted to trade o capacity, imperceptibility, and robustness as required in the application. The theory indicates the most aggressive feasible parameter settings. We also introduce a technique called predistortion for increasing resistance to JPEG compression. Analogous tactics are presumably possible whenever a model of anticipated distortion is available.
منابع مشابه
Improving security of double random phase encoding with chaos theory using fractal images
This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...
متن کاملReversible Watermarking Approach for Health Information System
Health Information System [HIS] are gaining augmented acceptability and wide popularity as exchange of medical information and medical images between the healthcare centres are boosted up, which makes reversible watermarking emerge as an upcoming thrust area of research. This paper presents an efficient reversible approach for interleaving patient information in the form of Electro Cardio Graph...
متن کاملModeling the print-scan process for resilient data hiding
Print-scan resilient data hiding finds important applications in document security, and image copyright protection. In this paper, we build upon our previous work on print-scan resilient data hiding with the goal of providing a simple mathematical characterization for guiding the design of more sophisticated methods allowing higher volume of embedded data, or achieving more robustness. A model ...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملCombining and Steganography of 3-D Face Textures
One of the serious issues in communication between people is hiding information from the others, and the best way for this, is to deceive them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography 3-D face images and detecting which by curious people will be impossible. As in detecting face only, its texture is important, we separat...
متن کامل