Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Adaptive and Effective Data Hiding Scheme for AMBTC Compression Codes
ASSE '24: Proceeding of the 2024 5th Asia Service Sciences and Software Engineering ConferencePages 66–72https://doi.org/10.1145/3702138.3702143In this paper, to achieve high payload and high efficiency, the AMBTC blocks are classified into four block types. The corresponding data hiding methods are designed for each block type so that the size of stego AMBTC compression codes will not cause ...
- research-articleDecember 2024
Reversible Data Hiding Algorithm in Encrypted Domain Based on Image Interpolation and Substitution
ASSE '24: Proceeding of the 2024 5th Asia Service Sciences and Software Engineering ConferencePages 102–109https://doi.org/10.1145/3702138.3702142In this paper, a novel reversible data hiding scheme for encrypted images based on interpolation technique and substitution is proposed. With our proposed scheme, the distribution of neighboring pixels in the encrypted image is relatively uniform, ...
- research-articleMarch 2023
High-performance reversible data hiding in encrypted images with adaptive Huffman code
Digital Signal Processing (DISP), Volume 133, Issue Chttps://doi.org/10.1016/j.dsp.2022.103870AbstractWith the development of cloud computing, reversible data hiding in encrypted images (RDHEI) has attracted increasing attention. In this paper, a high-performance RDHEI algorithm with Adaptive Huffman Code (RDHEI-AHC) is proposed for ...
- research-articleOctober 2022
High payload watermarking based on enhanced image saliency detection
Multimedia Tools and Applications (MTAA), Volume 82, Issue 10Pages 15553–15571https://doi.org/10.1007/s11042-022-13907-8AbstractNowadays, images are circulated rapidly over the internet and they are subject to some risk of misuses. To address this issue, various watermarking methods are proposed in the literature. However, most conventional methods achieve a certain trade-...
- research-articleFebruary 2022
A magnetic crawler wall-climbing robot with capacity of high payload on the convex surface
Robotics and Autonomous Systems (ROAS), Volume 148, Issue Chttps://doi.org/10.1016/j.robot.2021.103907AbstractThere are two challenges for wall-climbing robots in the maintenance and inspection of large vertical ferromagnetic structures: the requirement of high load capacity and the curved appearance of the wall. An improved magnetic crawler ...
- research-articleJanuary 2022
Reversible data hiding with adaptive difference recovery for encrypted images
Information Sciences: an International Journal (ISCI), Volume 584, Issue CPages 89–110https://doi.org/10.1016/j.ins.2021.10.050Highlights- We propose a novel data hiding technique using adaptive difference recovery (ADR).
- We design an efficient RDHEI method using the ADR-based technique.
- The proposed RDHEI method outperforms some state-of-the-art RDHEI methods in ...
Vacating room after encryption (VRAE) is a popular framework of reversible data hiding for encrypted images (RDHEI). Most VRAE based RDHEI methods do not make a desirable payload. To address this issue, this paper proposes a novel data hiding ...
- research-articleSeptember 2020
A novel high payload steganography scheme based on absolute moment block truncation coding
Multimedia Tools and Applications (MTAA), Volume 79, Issue 33-34Pages 24241–24264https://doi.org/10.1007/s11042-020-09015-0AbstractIn this paper, we propose an efficient steganography method in the compressed codes of absolute moment block truncation coding (AMBTC). Many recent related schemes focus on implementing reversible data hiding in compressed AMBTC bit stream. ...
- research-articleMarch 2020
Magnetic crawler climbing detection robot basing on metal magnetic memory testing technology
Robotics and Autonomous Systems (ROAS), Volume 125, Issue Chttps://doi.org/10.1016/j.robot.2020.103439AbstractFailure detection of high facilities always presents a tremendous challenge. Climbing-wall robot with detection capacity has become a main approach. But owing to their limitations in overcoming obstacles and complicated wall situation, ...
Highlights- An anti-overturning mechanism and a double-linked module mechanism are developed.
- articleFebruary 2017
Data hiding using pseudo magic squares for embedding high payload in digital images
Multimedia Tools and Applications (MTAA), Volume 76, Issue 3Pages 3715–3729https://doi.org/10.1007/s11042-016-3974-1In this paper, a novel information hiding scheme based on pseudo magic squares is proposed. The pseudo magic square pattern is generated using the Knight's move algorithm, whereas diamond encoding (DE) and adaptive pixel pair matching (APPM) embedding ...
- research-articleNovember 2015
New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization
Computers and Security (CSEC), Volume 55, Issue CPages 21–45https://doi.org/10.1016/j.cose.2015.06.012Proposed five layers of protection.Extract byte characteristics.Construct image segmentation.Learning system.Embedding and extracting secret message. A new steganography algorithm based on five protection layers has been suggested in this paper for ...
- articleNovember 2015
High payload image steganography with minimum distortion based on absolute moment block truncation coding
Multimedia Tools and Applications (MTAA), Volume 74, Issue 21Pages 9117–9139https://doi.org/10.1007/s11042-014-2059-2This paper presents an improved image steganography scheme based on absolute moment block truncation coding (AMBTC). The purpose of the proposed scheme is to achieve high payload, good visual quality and low computation complexity at the same time. In ...
- research-articleAugust 2015
Reversible steganography using extended image interpolation technique
Computers and Electrical Engineering (CENG), Volume 46, Issue CPages 447–455https://doi.org/10.1016/j.compeleceng.2015.04.014Display Omitted By analysis of statistical properties of adjacent pixels as well as image interpolation techniques, a novel interpolation method is put forward.Under the conditions of ensuring the image quality, the proposed image interpolation method ...
- articleJune 2013
High payload data-hiding in audio signals based on a modified OFDM approach
Expert Systems with Applications: An International Journal (EXWA), Volume 40, Issue 8Pages 3055–3064https://doi.org/10.1016/j.eswa.2012.12.021This paper presents a high payload data-hiding scheme for audio signals following the OFDM concept. It is based on changing the phase component of the audio signal via a reduced-arc M-order Phase Shift Keying (MPSK) modulator on selected frequency ...
- articleJanuary 2013
Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization
Journal of Systems and Software (JSSO), Volume 86, Issue 1Pages 47–59https://doi.org/10.1016/j.jss.2012.06.057This paper proposes a collusion resilient optimized spread spectrum (SS) image watermarking scheme using genetic algorithms (GA) and multiband (M-band) wavelets. M-band decomposition of the host image offers advantages of better scale-space tiling and ...
- articleOctober 2012
High-payload climbing and transitioning by compliant locomotion with magnetic adhesion
Robotics and Autonomous Systems (ROAS), Volume 60, Issue 10Pages 1308–1316https://doi.org/10.1016/j.robot.2012.06.003This paper presents a new climbing robotic mechanism for high-payload climbing and wall-to-wall transitioning. Payload capacity and transition ability are very important in climbing-robot applications for heavy industries and construction industries. ...
- ArticleNovember 2009
Spread Spectrum Watermarking: Zero Rate Embedding to High Payload System
MINES '09: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01Pages 525–529https://doi.org/10.1109/MINES.2009.262This article presents a brief review on non-blind and blind spread spectrum (SS) watermarking developed for multimedia signals. The discussion gradually moves from zero-rate embedding to high payload and variable embedding systems that take into ...