نتایج جستجو برای: pixel value differencing
تعداد نتایج: 775448 فیلتر نتایج به سال:
Data hiding is an emerging field of research for secure data transmission over internet, ensuring ownership identification and copyright protection. A couple of techniques have been proposed based on pixel value differencing (PVD) and eight queens’ solutions. In this paper, a new data hiding method based on inter-block difference in eight queen’s solutions is presented. The result of inter-bloc...
Internet as a communication media brings easiness, speed, and lower costs, but this media couldn’t give any safety guarantee. That’s why the data should be protected from unauthorized people. Steganograhpy technique could be used to do the protection. This technique inserts data or information into object cover, which is digital image. The succes criteria of steganography implementation is when...
Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper concentrates on integrating Tri way pixel ...
In this paper a novel steganographic method has been proposed to improve the security of embedded data with high capacity and imperceptible visual quality, the proposed method is based on four-pixel block differencing, modified LSB substitution and Knights tour. Secret data is embedded randomly using knights tour in each 8×8 pixels block of cover image and n-bit modified LSB substitution has be...
Steganography is a method of secret communication wherein the very existence of communication is hidden. During the last few decades there have been a tremendous development in digital image steganography and a large number of papers have been published by different researchers. This review paper presents a classification of the spatial domain image steganography techniques. These classificatio...
In this paper we present an approach to object detection in surveillance video based on detecting moving edges using the Hadamard transform. The proposed method is characterized by robustness to illumination changes and ghosting effects and provides high speed detection, making it particularly suitable for surveillance applications. In addition to presenting an approach to moving edge detection...

 A hybrid steganographic technique has been proposed to enlarge the size of secret message and hide several images in one cover image. Initially, were compressed using JPEG 2000 before embedding them Second least significant bit plane image was entirely replaced by while tri-ways-pixel-value-differencing (TPVD) used remaining seven-bit The quality stego enhanced residual coding (RIC). div...
Internet users need to store, send or receive the secret data. The common way to do this is to transform the secret data into another form by the process called encryption. Here, the main drawback is if enough time is given the enemy is allowed to intercept and modify the messages. In order to avoid this we use the technique called steganography. Steganography is the method of storing informati...
An unsupervised change detection problem can be viewed as a classification problem with only two classes corresponding to the change and no-change areas, respectively. Thanks to its simplicity, image differencing is a widely used approach to change detection. It is based on the idea of generating a difference image that represents the modulus of the spectral change vector associated with each p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید