Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, Shan-Chunen_US
dc.contributor.authorTsai, Wen-Hsiangen_US
dc.date.accessioned2014-12-08T15:24:13Z-
dc.date.available2014-12-08T15:24:13Z-
dc.date.issued2012-10-01en_US
dc.identifier.issn1556-6013en_US
dc.identifier.urihttp://dx.doi.org/10.1109/TIFS.2012.2204250en_US
dc.identifier.urihttp://hdl.handle.net/11536/16824-
dc.description.abstractA new method of combining art image generation and data hiding to enhance the camouflage effect for various information-hiding applications is proposed. First, a new type of computer art, called line-based Cubism-like image, which keeps a characteristic of the Cubism art-abstraction by prominent lines and regions from multiple viewpoints-is proposed. In the creation process with an input source image, prominent line segments in the image are detected and rearranged to form an abstract region-type art image of the Cubism flavor. Data hiding with the minimal distortion is carried out skillfully during the process of recoloring the regions in the generated art image by shifting the pixels' colors for the minimum amount of +/- 1 while keeping the average colors of the regions unchanged. Based on a rounding-off property in integer-valued color computation, the proposed data hiding technique is proved by theorems to be reversible, and thus useful for lossless recovery of the cover art image from the stego-image. Four security enhancement measures are also adopted to prevent hackers from extracting embedded data correctly. Experimental results show the feasibility of the proposed method.en_US
dc.language.isoen_USen_US
dc.subjectComputer art imageen_US
dc.subjectcover imageen_US
dc.subjectline-based Cu-bism-like imageen_US
dc.subjectreversible data hidingen_US
dc.subjectstego-imageen_US
dc.titleLine-Based Cubism-Like Image-A New Type of Art Image and its Application to Lossless Data Hidingen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TIFS.2012.2204250en_US
dc.identifier.journalIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYen_US
dc.citation.volume7en_US
dc.citation.issue5en_US
dc.citation.spage1448en_US
dc.citation.epage1458en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000308711100004-
dc.citation.woscount1-
Appears in Collections:Articles


Files in This Item:

  1. 000308711100004.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.