![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
High Capacity Data Hiding Based on AMBTC and Interpolation
Absolute Moment Block Truncation Coding (AMBTC) is a compression method with low complexity and simple computation to easily compress a block. Various AMBTC-like methods have been proposed for develo** data ...
-
Chapter and Conference Paper
Steganography Based on Grayscale Images Using (5, 3) Hamming Code
Steganography is a technique to hide secret data in cover images securely. This technique is used for secret communication. However, steganography is not as strong as watermark against various attacks. “Hammin...
-
Chapter and Conference Paper
Lossless Data Hiding for Binary Document Images Using \(n\) -Pairs Pattern
Lossless data embedding theory has entered a new era for data hiding and information security. In a lossless scheme, the original data and the embedded data should be completely recoverable. Our ...
-
Chapter and Conference Paper
Improving Data Hiding Capacity Based on Hamming Code
Matrix encoding proposed by Crandall can be used in steganography data hiding methods. Hamming codes are kinds of cover codes. “Hamming + 1” proposed by Zhang et al. is an improved version of Matrix encoding s...
-
Chapter and Conference Paper
Steganography Based on Low Density Parity Check(LDPC)
We propose a data hiding scheme based on Low Density Parity Check(LDPC) codes. Our proposed theoretical point of view, the blind watermarking can be transmitted through a noisy channel. Matrix encoding propose...
-
Chapter and Conference Paper
New ID-Based Proxy Signature Scheme with Message Recovery
In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...
-
Chapter and Conference Paper
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules
Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy...
-
Chapter and Conference Paper
Architecture of a Context Aware Framework for Automated Mobile Device Configuration
In this paper an architecture for context aware framework for mobile phones has been represented. The main goal of this proposed architecture is to enable phones to configure themselves based on self-initiated...
-
Chapter and Conference Paper
A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC
We present a secret sharing scheme based on absolute moment block truncation coding (AMBTC) and Hamming code theory. AMBTC is composed of bit planes and two representative gray level pixel values, which are th...
-
Chapter and Conference Paper
New Electronic Acupuncture System Using Intelligence
In recent years, scientific studies of traditional oriental medicine are accelrating. Furthermore, researches of medical examinations and treatments through collaboration of oriental medicine and western medic...
-
Chapter and Conference Paper
An Optimized Sub-texture Map** Technique for an Arbitrary Texture Considering Topology Relations
In recent years, texture map** techniques have become more advanced as providing real-time rendering tasks. However, few methods have been conducted in optimizing a sub-texture map** for an arbitrary textu...
-
Chapter and Conference Paper
Data Hiding in a Halftone Image Using Hamming Code (15, 11)
This paper presents a data hiding technique for a halftone image. Each block of halftone bitmaps is transformed into a sequence of binary bits, and then regarded as a codeword. From the codeword, we can get a ...
-
Chapter and Conference Paper
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications
Steganography provides secure communications over the Internet with a cover image. However, it is difficult to transfer many messages with small-sized images. We have improved EMD (Exploiting Modification Dire...
-
Chapter and Conference Paper
Study of Optimal Traffic Information Using Agents Techniques
Recently in Korea, DMB TPEG service showing the optimal road while esca** the jammed way is popular. Such latest service also provides the traffic information after average 5 minutes of the recent traffic si...
-
Chapter and Conference Paper
iSCSI Protocol Parameter Optimization for Mobile Appliance Remote Storage System at Smart Home Environment Approach
In Mobile appliance, users have a limited amount of storage availability to them due to their limited size and weight. To relieve problem we developed iSCSI remote storage system, which is an excellent solutio...
-
Chapter and Conference Paper
Dynamic EPG Implementation for Ubiquitous Environment
In this paper, we proposed EPG as a suitable method for digital broadcasting in a ubiquitous environment. As an application technique for user custom UI service in a Ubiquitous Environment, a dynamic EPG prese...
-
Chapter and Conference Paper
Product Control System Using RFID Tag Information and Data Mining
In this paper, we suggest a method that applies RFID tag information and a data mining technology to a manufacturing execution system (MES) for efficient process control. The MES is an efficient process contro...
-
Chapter and Conference Paper
Personalized E-Learning Process Using Effective Assessment and Feedback
The amount and quality of feedback provided to the learner has an impact on the learning process. Personalized feedback is particularly important to the effective delivery of e-learning courses. E-learning del...
-
Chapter and Conference Paper
Traffic Signal Planning Using a Smart Agent System
The multi-agent systems approach can provide a new desirable solution to the problems of traffic congestion and traffic accidents. Currently, a traffic simulator is needed to understand and explore the difficu...