Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tseng, YC | en_US |
dc.contributor.author | Pan, HK | en_US |
dc.date.accessioned | 2014-12-08T15:26:44Z | - |
dc.date.available | 2014-12-08T15:26:44Z | - |
dc.date.issued | 2001 | en_US |
dc.identifier.isbn | 0-7803-7016-3 | en_US |
dc.identifier.issn | 0743-166X | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/18996 | - |
dc.description.abstract | In an earlier paper [1], we propose a steganography scheme for hiding a piece of critical information in a host binary image. That scheme ensures that in each m x n image block of the host image, as many as [log(2) (mn+ 1)] bits can be hidden in the block by changing at most 2 bits In the block. As a sequel of that work, in this paper we propose a revised scheme that can maintain higher quality of the host image by sacrificing some data hiding space. The new scheme can still offer a good data hiding ratio. It ensures that for any bit that is modified in the host image, the bit is adjacent to another bit which has a value equal to the former's new value. Thus, the hiding effect is quite invisible. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | binary image processing | en_US |
dc.subject | coding | en_US |
dc.subject | cryptography | en_US |
dc.subject | information hiding | en_US |
dc.subject | prisoners' problem | en_US |
dc.subject | security | en_US |
dc.subject | steganography | en_US |
dc.title | Secure and invisible data hiding in 2-color images | en_US |
dc.type | Proceedings Paper | en_US |
dc.identifier.journal | IEEE INFOCOM 2001: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: TWENTY YEARS INTO THE COMMUNICATIONS ODYSSEY | en_US |
dc.citation.spage | 887 | en_US |
dc.citation.epage | 896 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000172440900095 | - |
Appears in Collections: | Conferences Paper |