![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
An enhanced AMBTC for color image compression using color palette
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network band...
-
Article
Introduction to the special issue on deep learning for real-time information hiding and forensics
-
Article
Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme
Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). Th...
-
Article
Generalizing Hamming+k data hiding by overlapped pixels
Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a w...
-
Article
Exploiting error control in matrix coding-based data hiding over lossy channel
A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may...
-
Article
Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms
-
Article
Special issue: Advanced technology for smart home automation and entertainment
-
Article
Study of detection method for spoofed IP against DDoS attacks
Cybercriminals are learning to harness the power of simpler devices like connected cameras. In September of 2016, Mirai software was used to infect more than 100,000 devices and unleash one of the largest dist...
-
Article
Mining intelligent solution to compensate missing data context of medical IoT devices
When gathering experimental data generated by medical IoT devices, the perennial problem is missing data due to recording instruments, errors introduced which cause data to be discarded, or the data is missed ...
-
Article
Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC
The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the resto...
-
Article
Palmprint recognition system on mobile devices with double-line-single-point assistance
Compared with other biometrics, palmprint has several advantages in authentication on mobile devices. However, some serious challenges severely restrict the development of palmprint recognition on mobile envir...
-
Article
Reversible data hiding scheme with edge-direction predictor and modulo operation
Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cove...
-
Article
A real-time secret image sharing with fairness
When traditional secret image sharing techniques reconstructed the secret, they input the shares over t. While less than t shares can know nothing about the secret, the problem arises when there are more than t s...
-
Article
Lossless data hiding for absolute moment block truncation coding using histogram modification
This paper presents a lossless data hiding method for an absolute moment block truncation coding (AMBTC) images, which is a compressed grayscale image. It is not easy to hide secret data in an AMBTC-compresse...
-
Article
Adaptive real-time reversible data hiding for JPEG images
Data hiding used to embed data, such as copyright information, into various forms of media such as image, audio, or text with a minimum amount of perceivable degradation to the “host” signal. Therefore, in man...
-
Article
Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP
Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images i...
-
Article
Dual-source discrimination power analysis for multi-instance contactless palmprint recognition
Due to the benefits of palmprint recognition and the advantages of biometric fusion systems, it is necessary to study multi-source palmprint fusion systems. Unfortunately, the research on multi-instance palmpr...
-
Article
Data hiding based on overlapped pixels using hamming code
Most data hiding schemes change the least significant bits to conceal messages in the cover images. Matrix encoding scheme is a well known scheme in this field. The matrix encoding proposed by Crandall can be ...
-
Article
An energy-efficient video transport protocol for personal cloud-based computing
Recently, we are surrounded by a collection of heterogeneous computing devices such as desktop computers, laptops, smart phones, smart televisions, and tablet PCs. Each device is operated with its own host ope...
-
Article
Design a new visual cryptography for human-verifiable authentication in accessing a database
Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be sec...