نتایج جستجو برای: pixel value differencing

تعداد نتایج: 775448  

Journal: :J. Visual Communication and Image Representation 2011
Xin Liao Qiaoyan Wen Jie Zhang

To improve the embedding capacity and provide an imperceptible visual quality, a novel steganographic method based on four-pixel differencing and modified least significant bit (LSB) substitution is presented. The average difference value of a four-pixel block is exploited to classify the block as a smooth area or an edge area. Secret data are hidden into each pixel by the k-bit modified LSB su...

2001
Wei Koh

This paper explores the subject of compression in the graphics pipeline. While there are several components of the pipeline that could stand to benefit from compression, we chose to focus on the Z-buffer and the framebuffer. We describe a method of compression using pixel differencing and Huffman coding along with a caching system designed around tiles. We examine the effects of tile size, pixe...

Journal: :Journal of Systems and Software 2008
Chung-Ming Wang Nan-I Wu Chwei-Shyong Tsai Min-Shiang Hwang

In this paper, we shall propose a new image steganographic technique capable of producing a secret-embedded image that is totally indistinguishable from the original image by the human eye. In addition, our new method avoids the falling-off-boundary problem by using pixel-value differencing and the modulus function. First, we derive a difference value from two consecutive pixels by utilizing th...

2011
Tao Ran Zhang Tao

According to the analysis of the effect of the texture complexity on steganalysis, we propose a data hiding algorithm based on texture complexity and difference pixel value. Firstly, the image is decomposed into blocks, after which the texture complexity of each block is calculated and blocks with high complexity are selected. Then the different pixel values on two directions of the selected bl...

2014
Mukesh Garg A. P. Gurudev Jangra

Steganography is hiding the secret data into a cover object to protect it from unauthorized access. It is a technique of invisible communication which hides the existence of the message. If the cover object used is an image, the steganography is known as image steganography. It has many applications like Online transactions, military communication etc. In this paper we are discussing Existing i...

Journal: :I. J. Network Security 2016
Biswapati Jana Debasis Giri Shyamal Kumar Mondal

In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n − 1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit is embedded using Difference Expansion (DE). We consider two consecutive pixels from cover image, calculate the difference between them and then embed n − 1 bits secret message by...

Object detection plays an important role in successfulness of a wide range of applications that involve images as input data. In this paper we have presented a new approach for background modeling by nonconsecutive frames differencing. Direction and velocity of moving objects have been extracted in order to get an appropriate sequence of frames to perform frame subtraction. Stationary parts of ...

Object detection plays an important role in successfulness of a wide range of applications that involve images as input data. In this paper we have presented a new approach for background modeling by nonconsecutive frames differencing. Direction and velocity of moving objects have been extracted in order to get an appropriate sequence of frames to perform frame subtraction. Stationary parts of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید