No-reference image quality assessment in the spatial domain

A Mittal, AK Moorthy, AC Bovik - IEEE Transactions on image …, 2012 - ieeexplore.ieee.org
We propose a natural scene statistic-based distortion-generic blind/no-reference (NR)
image quality assessment (IQA) model that operates in the spatial domain. The new model …

Efficient reversible data hiding using multiple predictors

IF Jafar, KA Darabkh, RT Al-Zubi… - The Computer …, 2016 - ieeexplore.ieee.org
Reversible data hiding (RDH) algorithms are concerned with the recovery of the original
cover image upon the extraction of the secret data. In some RDH algorithms, embedding …

Novel image authentication scheme with fine image quality for BTC-based compressed images

W Li, CC Lin, JS Pan - Multimedia tools and applications, 2016 - Springer
A novel image authentication scheme which can protect the image integrity of the
compressed images for block truncation coding (BTC) is proposed in this paper. In the …

Combining Haar wavelet and Karhunen Loeve transforms for medical images watermarking

MA Hajjaji, EB Bourennane… - BioMed research …, 2014 - Wiley Online Library
This paper presents a novel watermarking method, applied to the medical imaging domain,
used to embed the patient's data into the corresponding image or set of images used for the …

Reversible and irreversible data hiding technique

T Sarkar, S Sanyal - arXiv preprint arXiv:1405.2684, 2014 - arxiv.org
Steganography (literally meaning covered writing) is the art and science of embedding
secret message into seemingly harmless message. Stenography is practice from olden days …

[PDF][PDF] A comparative study of image steganography in wavelet domain

S Kumar, SK Muttoo - International Journal of Computer Science and …, 2013 - academia.edu
In this paper we present a comparative study of four different image steganography
algorithms based on orthogonal Haar Wavelet Transform and biorthogonal CDF9/7 …

SARDH: A novel sharpening-aware reversible data hiding algorithm

IF Jafar, KA Darabkh, RR Saifan - Journal of Visual Communication and …, 2016 - Elsevier
Reversible data hiding (RDH) algorithms allow data protection and exact recovery of the
original cover image upon data extraction. Most of RDH algorithms attempt to embed data …

Information hiding based on two-level mechanism and look-up table approach

JS Pan, XX Sun, H Yang, V Snášel, SC Chu - Symmetry, 2022 - mdpi.com
Information hiding can be seen everywhere in our daily life, and this technology improves
the security of information. The requirements for information security are becoming higher …

[PDF][PDF] A High Secure and robust Image Steganography using Dual wavelet and blending Model.

P Ganesan, R Bhavani - J. Comput. Sci., 2013 - Citeseer
Steganography is an ability of concealing information inside the cover in such a way it looks
like simple cover though it has concealed information. There are many techniques to carry …

Secret image sharing using grayscale payload decomposition and irreversible image steganography

S Chakraborty, AS Jalal, C Bhatnagar - Journal of information security and …, 2013 - Elsevier
To provide an added security level most of the existing reversible as well as irreversible
image steganography schemes emphasize on encrypting the secret image (payload) before …