Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Shan-Chun | en_US |
dc.contributor.author | Tsai, Wen-Hsiang | en_US |
dc.date.accessioned | 2014-12-08T15:24:13Z | - |
dc.date.available | 2014-12-08T15:24:13Z | - |
dc.date.issued | 2012-10-01 | en_US |
dc.identifier.issn | 1556-6013 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/TIFS.2012.2204250 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/16824 | - |
dc.description.abstract | A new method of combining art image generation and data hiding to enhance the camouflage effect for various information-hiding applications is proposed. First, a new type of computer art, called line-based Cubism-like image, which keeps a characteristic of the Cubism art-abstraction by prominent lines and regions from multiple viewpoints-is proposed. In the creation process with an input source image, prominent line segments in the image are detected and rearranged to form an abstract region-type art image of the Cubism flavor. Data hiding with the minimal distortion is carried out skillfully during the process of recoloring the regions in the generated art image by shifting the pixels' colors for the minimum amount of +/- 1 while keeping the average colors of the regions unchanged. Based on a rounding-off property in integer-valued color computation, the proposed data hiding technique is proved by theorems to be reversible, and thus useful for lossless recovery of the cover art image from the stego-image. Four security enhancement measures are also adopted to prevent hackers from extracting embedded data correctly. Experimental results show the feasibility of the proposed method. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Computer art image | en_US |
dc.subject | cover image | en_US |
dc.subject | line-based Cu-bism-like image | en_US |
dc.subject | reversible data hiding | en_US |
dc.subject | stego-image | en_US |
dc.title | Line-Based Cubism-Like Image-A New Type of Art Image and its Application to Lossless Data Hiding | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/TIFS.2012.2204250 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | en_US |
dc.citation.volume | 7 | en_US |
dc.citation.issue | 5 | en_US |
dc.citation.spage | 1448 | en_US |
dc.citation.epage | 1458 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000308711100004 | - |
dc.citation.woscount | 1 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.