Index Terms
(auto-classified)Editorial: Embedded Security Challenge: Cyber Security Contests in the Embedded Computing Domain
Recommendations
A region-adaptive semi-fragile dual watermarking scheme
Since existing watermarking schemes usually have only a single function, a region-adaptive semi-fragile dual watermarking scheme is proposed, taking into account both watermark embedding capacity and security. The dual watermarks refer to the robust ...
A steganographic method based upon JPEG and quantization table modification
Special issue: Intelligent multimedia computing and networkingIn this paper, a novel steganographic method based on joint photographic expert-group (JPEG) is proposed. The proposed method modifies the quantization table first. Next, the secret message is hidden in the cover-image with its middle-frequency of the ...
Data Hiding Using Flexible Multi-bit MER
ISBAST '13: Proceedings of the 2013 International Symposium on Biometrics and Security TechnologiesMulti-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak robustness. Moreover, ...






Comments