Search
Search Results
-
Transactions on Data Hiding and Multimedia Security X
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various... -
Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various... -
On Blind Source Camera Identification
An interesting and challenging problem in digital image forensics is the identification of the device used to acquire an image. Although the source... -
On the minimum size of complete arcs and minimal saturating sets in projective planes
The minimum size of a complete arc in the planes PG (2, 31) and PG (2, 32) and of a 1-saturating set in PG (2, 17) and PG (2, 19) is determined. Also,...
-
Transactions on Data Hiding and Multimedia Security VII
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various... -
Transactions on Data Hiding and Multimedia Security VIII
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various... -
ESSVCS: An Enriched Secret Sharing Visual Cryptography
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster... -
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules
Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance,... -
A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA
The advent of social networks has made social media sharing in social network easier. However, it can also cause serious security and privacy... -
Transactions on Data Hiding and Multimedia Security VI
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various... -
Transactions on Data Hiding and Multimedia Security V
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...
-
Matrix Embedding Using Random Linear Codes and Its Steganalysis
To improve embedding efficiency, one of the most important steganographic scheme isMatrix embedding, otherwise known as syndrome coding. The schemes... -
Enhancing Accountability in the Cloud via Sticky Policies
This paper introduces and discusses a data management solution to provide accountability within the cloud as well as addressing privacy issues. The... -
Improving Code-Based Steganography with Linear Error-Block Codes
We introduce a steganographic protocol based on linear error block codes. Our method is an extension of Westfeld’s F5 algorithm. It allows to grow... -
Plane Transform Visual Cryptography
Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques.... -
Ensuring Message Embedding in Wet Paper Steganography
Syndrome coding has been proposed by Crandall in 1998 as a method to stealthily embed a message in a cover-medium through the use of bounded... -
Transactions on Data Hiding and Multimedia Security IV
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...
-
Basis arrays and successive packing for M-D interleaving
In this paper, we first present a novel concept of 2-D basis interleaving array (also referred to as basis array for short). That is, an m × m ...
-
Security Analysis of ISS Watermarking Using Natural Scene Statistics
Watermarking security has captured great attention from researchers in recent years. The security of watermarking is determined by the difficulty of... -
Transactions on Data Hiding and Multimedia Security III
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various...