7 research outputs found

    Text Hiding in Coded Image Based on Quantization Level Modification and Chaotic Function

    Get PDF
    A text hiding method in codded image is presented in this paper that based on quantization level modification. The used image is transformed into wavelet domain by DWT and coefficient of transform is partitioned into predefined block size. Specific threshold has been used to classify these blocks into two types named smooth and complex. Each type has its own method of text hiding (binary data), for smooth blocks, secret bits which represent the text data are switched by the bitmap. In order to reduce distortion, the quantization levels are modified. To reach extra embedding payload the quantization level could carry extra two bits depending on other threshold. The complex block carry one data bit on each block and quantization levels are swapped to reduce distortion with bitmap flipping. The proposed method result shows a high signal to noise ratio, with studying capacity as important in this work

    Application and Theory of Multimedia Signal Processing Using Machine Learning or Advanced Methods

    Get PDF
    This Special Issue is a book composed by collecting documents published through peer review on the research of various advanced technologies related to applications and theories of signal processing for multimedia systems using ML or advanced methods. Multimedia signals include image, video, audio, character recognition and optimization of communication channels for networks. The specific contents included in this book are data hiding, encryption, object detection, image classification, and character recognition. Academics and colleagues who are interested in these topics will find it interesting to read

    Data Hiding and Its Applications

    Get PDF
    Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others

    Discrete Wavelet Transforms

    Get PDF
    The discrete wavelet transform (DWT) algorithms have a firm position in processing of signals in several areas of research and industry. As DWT provides both octave-scale frequency and spatial timing of the analyzed signal, it is constantly used to solve and treat more and more advanced problems. The present book: Discrete Wavelet Transforms: Algorithms and Applications reviews the recent progress in discrete wavelet transform algorithms and applications. The book covers a wide range of methods (e.g. lifting, shift invariance, multi-scale analysis) for constructing DWTs. The book chapters are organized into four major parts. Part I describes the progress in hardware implementations of the DWT algorithms. Applications include multitone modulation for ADSL and equalization techniques, a scalable architecture for FPGA-implementation, lifting based algorithm for VLSI implementation, comparison between DWT and FFT based OFDM and modified SPIHT codec. Part II addresses image processing algorithms such as multiresolution approach for edge detection, low bit rate image compression, low complexity implementation of CQF wavelets and compression of multi-component images. Part III focuses watermaking DWT algorithms. Finally, Part IV describes shift invariant DWTs, DC lossless property, DWT based analysis and estimation of colored noise and an application of the wavelet Galerkin method. The chapters of the present book consist of both tutorial and highly advanced material. Therefore, the book is intended to be a reference text for graduate students and researchers to obtain state-of-the-art knowledge on specific applications

    Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with 4th International Symposium on Mobile Internet Security (MobiSec 2019)

    Get PDF
    The International Symposium on Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) was held on 17–19 October 2019 in Taichung, Taiwan. The symposium provided academic and industry professionals an opportunity to discuss the latest issues and progress in advancing smart applications based on future ICT and its relative security. The symposium aimed to publish high-quality papers strictly related to the various theories and practical applications concerning advanced smart applications, future ICT, and related communications and networks. It was expected that the symposium and its publications would be a trigger for further related research and technology improvements in this field

    Coverless image steganography using morphed face recognition based on convolutional neural network

    Get PDF
    In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed face recognition is proposed. In our proposed data hiding approach, a group of morphed face images is produced from an arranged small-scale face image dataset. Then, a morphed face image which is encoded with a secret message is sent to the receiver. The receiver uses powerful and robust deep learning models to recover the secret message by recognizing the parents of the morphed face images. Furthermore, we design two novel Convolutional Neural Network (CNN) architectures (e.g. MFR-Net V1 and MFR-Net V2) to perform morphed face recognition and achieved the highest accuracy compared with existing networks. Additionally, the experimental results show that the proposed schema has higher retrieval capacity and accuracy and it provides better robustness

    Transmission of compressed images over power line channel

    Get PDF
    In the telecommunications industry, the use of existing power lines has drawn the attention of many researchers in the recent years. PLC suffers from impulsive noise that can affect data transmission by causing bit or burst errors. In this thesis, PLC channel was used as a transmission scheme to transmit compressed still images using FFT-OFDM. When lossy compression is applied to an image, a small loss of quality in the compressed image is tolerated. One of the challenging tasks in image compression and transmission is the trade-off between compression ratio and image quality. Therefore, we utilized the latest developments in quality assessment techniques, SSIM, to adaptively optimize this trade-off to the type of image application which the compression is being used for. A comparison between different compression techniques, namely, discrete cosine transform (DCT), discrete wavelet transform (DWT), and block truncation coding (BTC) was carried out. The performance criteria for our compression methods include the compression ratio, relative root-meansquared (RMS) error of the received data, and image quality evaluation via structural similarity index (SSIM). Every link in a powerline has its own attenuation profile depending on the length, layout, and cable types. Also, the influences of multipath fading due to reflections at branching point vary the attenuation profile of the link. As a result, we observed the effect of different parameters of the PLC channel based on the number of paths, and length of link on the quality of the image. Simulations showed that the image quality is highly affected by the interaction of the distance of PLC channel link and the number of multipath reflections. The PLC channel is assumed to be subjected to Gaussian and impulsive noises. There are two types of impulsive noise: asynchronous impulsive noise and periodic impulsive noise synchronous to the mains frequency. BER analysis was performed to compare the performance of the channel for the two types of impulsive noise under three impulsive scenarios. The first scenario is named as "heavily disturbed" and it was measured during the evening hours in a transformer substation in an industrial area. The second scenario is named as "moderately disturbed" and was recorded in a transformer substation in a residential area with detached and terraced houses. The third scenario is named as "weakly disturbed" and was recorded during night-time in an apartment located in a large building. The experiments conducted showed that both types of noise performed similarly in the three impulsive noise scenarios. We implemented Bose-Chaudhuri-Hocquenghen (BCH) coding to study the performance of Power Line Channel (PLC) impaired by impulsive noise and AWGN. BCH codes and RS codes are related and their decoding algorithms are quite similar. A comparison was made between un-coded system and BCH coding system. The performance of the system is assessed by the quality of the image for different sizes of BCH encoder, in three different impulsive environments. Simulation results showed that with BCH coding, the performance of the PLC system has improved dramatically in all three impulsive scenarios
    corecore