On the implementation of robust copyright protection scheme using visual attention model

A Basu, SK Sarkar - Information Security Journal: A Global …, 2013 - Taylor & Francis
Perceptual watermarking should always take full advantage of the results from human visual
system (HVS) studies. Based upon visual saliency's modulation effect which incorporates …

Image enhancement in spatial domain

A Das, A Das - Guide to Signals and Patterns in Image Processing …, 2015 - Springer
Image enhancement is a process, rather a preprocessing step, through which an original
image is made suitable for a specific application. The application may vary from thermal …

Steganography: Secret data hiding in multimedia

A Das, A Das - Signal Conditioning: An Introduction to Continuous …, 2012 - Springer
Steganography is the technique of hiding confidential information within multi-media. People
often get confused among steganography and cryptography because both of them are …

Steganalysis of videos using energy associated with each pixel

S Chakraborty, AK Das, C Sinha… - … Conference on Image …, 2017 - ieeexplore.ieee.org
This paper presents a model for detection of a specific steganographic method that embeds
message in the video domain. At first the video frames are extracted from an. avi file. The …

Computational intelligence in telecommunication networks: a review

A Paul, A Mukherjee, A Das… - International Journal of …, 2017 - inderscienceonline.com
The recent increase in the demand for process optimisation, something which we continually
learn from nature, help the telecommunication arena to rapidly evolve into a more scalable …

[PDF][PDF] СТЕГАНОГРАФИЧЕСКОЕ ВСТРАИВАНИЕ ИНФОРМАЦИИ В ПАМЯТЬ ИСПОЛНЯЕМОГО КОДА И КОД ВЕБ-СТРАНИЦЫ

СВ Белим - omgtu.ru
Методы скрытого встраивания данных в легальные сообщения (стеганографические
методы) применяются для решения двух задач: скрытая передача информации и …

Алгоритм выявления стеганографических вставок типа LSB-замещения на основе метода анализа иерархий

СВ Белим, ДЭ Вильховский - Вестник компьютерных и …, 2018 - elibrary.ru
Предложен алгоритм выявления стеганографических вставок, реализуемых в виде
подмены наименее значащих битов. Данный алгоритм основан на методе анализа …

Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking

A Das, S Kavitha - Proceedings of the Fifth International Conference on …, 2012 - dl.acm.org
Watermarking in images is necessary for authentication of digital library based applications,
mostly. For efficient utilization of storage space and bandwidth of communication channel …

Reference Based Image Encoding

SDY Devi, R Santhanakumar… - … Conference on Computer …, 2017 - Springer
This paper describes a scheme to encode an image using another reference image in such
a way that an end user can retrieve the encoded image only with the reference image. Such …

[PDF][PDF] ALGORITHM

D SCHEME - ictactjournals.in
A multiple color image segmented watermarking scheme based on discrete wavelet
transform (DWT) and singular value decomposition (SVD) is presented. In the proposed …