Hiding data in spatial domain images with distortion tolerance

IC Lin, YB Lin, CM Wang - Computer Standards & Interfaces, 2009 - Elsevier
Data hiding is a technique that is used to embed secret information into a cover media. It has
been widely used in protecting copyright and transmitting sensitive data over an insecure …

A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability

CW Lee, WH Tsai - IEEE Transactions on Image Processing, 2011 - ieeexplore.ieee.org
A new blind authentication method based on the secret sharing technique with a data repair
capability for grayscale document images via the use of the Portable Network Graphics …

A new data hiding scheme for binary image authentication with small image distortion

Y Lee, H Kim, Y Park - Information Sciences, 2009 - Elsevier
A new data hiding scheme for binary image authentication that has a small distortion of the
cover image is proposed in this paper. Using the data-embedding algorithm that is based on …

[PDF][PDF] A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform

P MeenakshiDevi, M Venkatesan… - Journal of Computer …, 2009 - Citeseer
Problem statement: In recent years, as digital media are gaining wider popularity, their
security related issues are becoming greater concern. Method for authenticating and …

Binocular hand tracking and reconstruction based on 2D shape matching

AA Argyros, MIA Lourakis - 18th International Conference on …, 2006 - ieeexplore.ieee.org
This paper presents a method for real-time 3D hand tracking in images acquired by a
calibrated, possibly moving stereoscopic rig. The proposed method consists of a collection …

Alteration-locating authentication watermarking for binary images

HY Kim, RL de Queiroz - International Workshop on Digital Watermarking, 2004 - Springer
In image authentication watermarking, hidden data is inserted into an image to detect any
accidental or malicious image alteration. In the literature, quite a small number of …

[PDF][PDF] Print-Scan Resilient Text Image Watermarking Based on Stroke Direction Modulation for Chinese Document Authentication.

L Tan, X Sun, G Sun - Radioengineering, 2012 - radioeng.cz
Print-scan resilient watermarking has emerged as an attractive way for document security.
This paper proposes a stroke direction modulation technique for watermarking in Chinese …

Watermarking in dithered halftone images with embeddable cells selection and inverse halftoning

JM Guo - Signal Processing, 2008 - Elsevier
This work proposes a novel technique, named embeddable cells selection (ECS), for
embedding flexible amounts of data in a ready-made dithered halftone image, while still …

A new public-key authentication watermarking for binary document images resistant to parity attacks

HY Kim - IEEE International Conference on Image Processing …, 2005 - ieeexplore.ieee.org
An authentication watermarking technique (AWT) inserts some hidden data into an image in
order to detect any accidental or malicious image alteration. Recent papers have proposed …

A new data hiding scheme with quality control for binary images using block parity

M Venkatesan, PM Devi, K Duraiswamy… - Third International …, 2007 - ieeexplore.ieee.org
Data hiding is usually achieved by alternating some nonessential information in the host
message. A more challenging problem is to hide data in a two-color binary image. Hiding is …