K Shanmuga Vadivel, T Ngo… - Proceedings of the …, 2015 - openaccess.thecvf.com
Visual attention is a crucial indicator of the relative importance of objects in visual scenes to human viewers. In this paper, we propose an algorithm to extract objects which attract visual …
Steganography surpasses other mechanisms of securing data from potential threats. The modern digital arena calls for robust information hiding techniques and, thus, it has always …
The Internet and cloud services are widely used in transmission of large amounts of data over open networks and insecure channels, exposing private and secret data to serious …
This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan …
In this paper, an effective self-embedding fragile watermarking scheme is presented. The watermark is generated by encoding the DCT coefficients of each 2× 2 block and embedded …
JK Mandal, M Sengupta - 2010 International Symposium on …, 2010 - ieeexplore.ieee.org
In this paper a DWT based frequency domain steganographic technique, termed as WTSIC has been proposed where the cover PPM image transform into the time domain through …
N Ghoshal, JK Mandal - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
This paper deals with a novel steganographic technique which demonstrates the colour image authentication technique in frequency domain based on the Discrete Fourier …
JK Mandal, A Khamrui - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Image steganography is the art of hiding information onto the cover image. In this paper a Genetic Algorithm based color image authentication/data hiding technique through …
In this paper a G-Let based authentication technique has been proposed to authenticate digital documents through Hough transform generated signature generated from original …