نتایج جستجو برای: integer wavelet transform iwt

تعداد نتایج: 184953  

2012
R. Krishnamoorthy K. Rajavijayalakshmi R. Punidha

In this paper, a new lossy to lossless image coding scheme combined with Orthogonal Polynomials Transform and Integer Wavelet Transform is proposed. The Lifting Scheme based Integer Wavelet Transform (LS-IWT) is first applied on the image in order to reduce the blocking artifact and memory demand. The Embedded Zero tree Wavelet (EZW) subband coding algorithm is used in this proposed work for pr...

2015
T Gomathi

Hiding capacity is very important for efficient covert communications. For JPEG compressed images, it is necessary to enlarge the hiding capacity because the available redundancy is very limited. Steganography enables to have a secret communication in modern information technology using Dual Transform Technique for Robust Steganography (DTTRS) [1]. The implementation of the Dual transform techn...

Journal: :Jurnal Teknologi Informasi dan Ilmu Komputer 2023

<p class="Abstrak">Kemudahan untuk mengakses dan berbagi media digital saat ini menimbulkan kekhawatiran mengenai pelanggaran hak cipta atau pembajakan. Sehingga perlu memberikan identitas kepada setiap agar tidak mudah dibajak diklaim oleh pihak-pihak yang bertanggung jawab. Salah satu cara pada suatu tanpa mengurangi kualitas dari medianya sendiri yaitu dengan menggunakan watermarking. ...

2014
Gangadhar Tiwari Marpe Sora

This paper proposes a novel compression combined digital image watermarking scheme based on singular value replacement technique. Image compression is achieved using Huffman encoding technique. Huffman encoding is an entropy encoding algorithm offering lossless image compression. The proposed watermarking scheme combines Integer wavelet transform (IWT) with singular value decomposition (SVD). F...

2010
Ching-Yu Yang Wu-Chih Hu

Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands o...

2014
Balakrishnan Ramalingam Rengarajan Amirtharajan John Bosco Balaguru Rayappan

A reconfigurable hardware architecture for the implementation of integer wavelet transform (IWT) based adaptive random image steganography algorithm is proposed. The Haar-IWT was used to separate the subbands namely, LL, LH, HL, and HH, from 8 × 8 pixel blocks and the encrypted secret data is hidden in the LH, HL, and HH blocks using Moore and Hilbert space filling curve (SFC) scan patterns. Ei...

Journal: :CoRR 2013
S. Hemalatha U. Dinesh Acharya A. Renuka Priya R. Kamath

Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover im...

2012
K. Seetharaman R. Ragupathy E. Maiorana P. Campisi A. Neri P. Tzouveli K. Ntalianis S. Kollias Ajay Kumar Arun Passi Nick Bartlow Nathan Kalka Bojan Cukic Arun Ross

This paper introduces an efficient approach to protect the ownership by hiding iris code from iris recognition system into digital image for an authentication purpose using the reversible watermarking scheme. This scheme embeds bookkeeping data of histogram modification and iris code into the first level high frequency sub-bands of images found by Integer Wavelet Transform (IWT) using threshold...

2012
Ching-Yu Yang Chih-Hung Lin Wu-Chih Hu W. C. Hu

This article presents a simple reversible data hiding scheme based on the integer wavelet transform (IWT). By adjusting the coefficient values, data bits are effectively embedded into the low-high (LH) and high-low (HL) subbands of the IWT domain. Simulations show that both the host media and secret message can be completely recovered, without distortion, if the stego-images remain intact. More...

2011
Luis Rosales-Roldan Manuel Cedillo-Hernández Mariko Nakano-Miyatake Héctor Pérez-Meana

In this paper we present a watermarking algorithm for image content authentication with localization and recovery capability of the modified areas. We use a halftone image generated by the Floyd-Steinberg kernel as an approximate version of the host image. We adopt this halftone image as a watermark sequence and embed it using the quantization watermarking method into the sub-band LL of the Int...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید