On the implementation of robust copyright protection scheme using visual attention model
Perceptual watermarking should always take full advantage of the results from human visual
system (HVS) studies. Based upon visual saliency's modulation effect which incorporates …
system (HVS) studies. Based upon visual saliency's modulation effect which incorporates …
Image enhancement in spatial domain
A Das, A Das - Guide to Signals and Patterns in Image Processing …, 2015 - Springer
Image enhancement is a process, rather a preprocessing step, through which an original
image is made suitable for a specific application. The application may vary from thermal …
image is made suitable for a specific application. The application may vary from thermal …
Steganography: Secret data hiding in multimedia
A Das, A Das - Signal Conditioning: An Introduction to Continuous …, 2012 - Springer
Steganography is the technique of hiding confidential information within multi-media. People
often get confused among steganography and cryptography because both of them are …
often get confused among steganography and cryptography because both of them are …
Steganalysis of videos using energy associated with each pixel
S Chakraborty, AK Das, C Sinha… - … Conference on Image …, 2017 - ieeexplore.ieee.org
This paper presents a model for detection of a specific steganographic method that embeds
message in the video domain. At first the video frames are extracted from an. avi file. The …
message in the video domain. At first the video frames are extracted from an. avi file. The …
Computational intelligence in telecommunication networks: a review
The recent increase in the demand for process optimisation, something which we continually
learn from nature, help the telecommunication arena to rapidly evolve into a more scalable …
learn from nature, help the telecommunication arena to rapidly evolve into a more scalable …
[PDF][PDF] СТЕГАНОГРАФИЧЕСКОЕ ВСТРАИВАНИЕ ИНФОРМАЦИИ В ПАМЯТЬ ИСПОЛНЯЕМОГО КОДА И КОД ВЕБ-СТРАНИЦЫ
СВ Белим - omgtu.ru
Методы скрытого встраивания данных в легальные сообщения (стеганографические
методы) применяются для решения двух задач: скрытая передача информации и …
методы) применяются для решения двух задач: скрытая передача информации и …
Алгоритм выявления стеганографических вставок типа LSB-замещения на основе метода анализа иерархий
СВ Белим, ДЭ Вильховский - Вестник компьютерных и …, 2018 - elibrary.ru
Предложен алгоритм выявления стеганографических вставок, реализуемых в виде
подмены наименее значащих битов. Данный алгоритм основан на методе анализа …
подмены наименее значащих битов. Данный алгоритм основан на методе анализа …
Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking
A Das, S Kavitha - Proceedings of the Fifth International Conference on …, 2012 - dl.acm.org
Watermarking in images is necessary for authentication of digital library based applications,
mostly. For efficient utilization of storage space and bandwidth of communication channel …
mostly. For efficient utilization of storage space and bandwidth of communication channel …
Reference Based Image Encoding
SDY Devi, R Santhanakumar… - … Conference on Computer …, 2017 - Springer
This paper describes a scheme to encode an image using another reference image in such
a way that an end user can retrieve the encoded image only with the reference image. Such …
a way that an end user can retrieve the encoded image only with the reference image. Such …