Skintone detection based steganography using wavelet transform
M Kude, M Borse - 2016 International Conference on Automatic …, 2016 - ieeexplore.ieee.org
This paper present a unique method in which secret data can be embedded within skin, as it
is not that much critical to HVS (Human Visual System). Biometric features like skin-ton is …
is not that much critical to HVS (Human Visual System). Biometric features like skin-ton is …
[PDF][PDF] Survey and analysis of 3D steganography
K Rama, K Thilagam, SM Priya… - International Journal of …, 2011 - academia.edu
Steganography is the science that involves communicating secret data in an appropriate
multimedia carrier, eg., images, audio, and video files. The remarkable growth in …
multimedia carrier, eg., images, audio, and video files. The remarkable growth in …
Extracting an embedded database from a physical object
JD Levine, DM Pangrazio III, DR Vandervort… - US Patent …, 2021 - Google Patents
A method of extracting data embedded in a 3D object includes a 3D scanning device
scanning a 3D object and extracting data embedded as physical representations in the 3D …
scanning a 3D object and extracting data embedded as physical representations in the 3D …
Embedding a database in a physical object
JD Levine, DM Pangrazio III, DR Vandervort… - US Patent …, 2021 - Google Patents
(57) ABSTRACT A method and system for embedding a database in a 3D object uses a 3D
dimensional printing device and a com puter-readable memory that stores a build sequence …
dimensional printing device and a com puter-readable memory that stores a build sequence …
[PDF][PDF] Watermarking 3D-Models
F Elmaghraby - 2022 - researchgate.net
Watermarking digital image is used to protect copyrights and authenticate digital media. This
thesis explains the idea of watermarking, digital images, as well as steganography. In …
thesis explains the idea of watermarking, digital images, as well as steganography. In …
[PDF][PDF] Image Encryption Using Different Cryptographic Algorithms: A Survey Paper
FJS Arackaparampil, M Tom, MEB Sebastian, NM Viby… - ijera.in
Nowadays while transferring and receiving the data like images, messages and other
information, certain encryption methods are used to increase the security of that data. By …
information, certain encryption methods are used to increase the security of that data. By …
Extracting an embedded database from a physical object
JD Levine, DM Pangrazio III, DR Vandervort… - US Patent …, 2019 - Google Patents
US10201938B2 - Extracting an embedded database from a physical object - Google
Patents US10201938B2 - Extracting an embedded database from a physical object …
Patents US10201938B2 - Extracting an embedded database from a physical object …
Integration of Spatial and Transform Domain in LSB Steganography
KB Shiva Kumar, KB Raja, RK Chhotaray… - Computer Networks and …, 2011 - Springer
In this paper, we propose an integration of spatial and transform domains in LSB
steganography (ISTDLS) where both the cover image as well as payload are divided into …
steganography (ISTDLS) where both the cover image as well as payload are divided into …
[引用][C] A new secure storing system for biometric templates based encryption and concealment
ET Khalaf, N Sulaiman - Journal of Applied Sciences, 2015 - ui.adsabs.harvard.edu
A New Secure Storing System for Biometric Templates Based Encryption and Concealment -
NASA/ADS Now on home page ads icon ads Enable full ADS view NASA/ADS A New Secure …
NASA/ADS Now on home page ads icon ads Enable full ADS view NASA/ADS A New Secure …