Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hung, Shi-Chei | en_US |
dc.contributor.author | Wu, Da-Chun | en_US |
dc.contributor.author | Tsai, Wen-Hsiang | en_US |
dc.date.accessioned | 2020-07-01T05:21:14Z | - |
dc.date.available | 2020-07-01T05:21:14Z | - |
dc.date.issued | 2020-04-01 | en_US |
dc.identifier.issn | 1745-1361 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1587/transinf.2019EDP7239 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/154317 | - |
dc.description.abstract | The two issues of art image creation and data hiding are integrated into one and solved by a single approach in this study. An automatic method for generating a new type of computer art, called stained glass image, which imitates the stained-glass window picture, is proposed. The method is based on the use of a tree structure for region growing to construct the art image. Also proposed is a data hiding method which utilizes a general feature of the tree structure, namely, number of tree nodes, to encode the data to be embedded. The method can be modified for uses in three information protection applications, namely, covert communication, watermarking, and image authentication. Besides the artistic stego-image content which may distract the hacker's attention to the hidden data, data security is also considered by randomizing both the input data and the seed locations for region growing, yielding a stego-image which is robust against the hacker's attacks. Good experimental results proving the feasibility of the proposed methods are also included. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | computer art | en_US |
dc.subject | stained glass image | en_US |
dc.subject | data hiding | en_US |
dc.subject | region growing | en_US |
dc.subject | covert communication | en_US |
dc.subject | watermarking | en_US |
dc.subject | image authentication | en_US |
dc.title | Data Hiding in Computer-Generated Stained Glass Images and Its Applications to Information Protection | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1587/transinf.2019EDP7239 | en_US |
dc.identifier.journal | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | en_US |
dc.citation.volume | E103D | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 0 | en_US |
dc.citation.epage | 0 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000530667500014 | en_US |
dc.citation.woscount | 0 | en_US |
Appears in Collections: | Articles |