Skip to main content

and
  1. No Access

    Article

    An enhanced AMBTC for color image compression using color palette

    Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network band...

    Lizhi **ong, Mengtao Zhang, Ching-Nung Yang in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme

    Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). Th...

    Ching-Nung Yang, Song-Yu Wu, Yung-Shun Chou in Multimedia Tools and Applications (2019)

  3. No Access

    Article

    Generalizing Hamming+k data hiding by overlapped pixels

    Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a w...

    Cheonshik Kim, Dongkyoo Shin, Ching-Nung Yang in Multimedia Tools and Applications (2019)

  4. No Access

    Article

    Dual-source discrimination power analysis for multi-instance contactless palmprint recognition

    Due to the benefits of palmprint recognition and the advantages of biometric fusion systems, it is necessary to study multi-source palmprint fusion systems. Unfortunately, the research on multi-instance palmpr...

    Lu Leng, Ming Li, Cheonshik Kim, Xue Bi in Multimedia Tools and Applications (2017)

  5. No Access

    Article

    Data hiding based on overlapped pixels using hamming code

    Most data hiding schemes change the least significant bits to conceal messages in the cover images. Matrix encoding scheme is a well known scheme in this field. The matrix encoding proposed by Crandall can be ...

    Cheonshik Kim, Ching-Nung Yang in Multimedia Tools and Applications (2016)

  6. Article

    Open Access

    Watermark with DSA signature using predictive coding

    This paper presents a predictor-based watermark scheme that embeds secret bit streams and a DSA signature into an image. For the copyrighting of digital media, a DSA signature is appropriate as a watermarking ...

    Cheonshik Kim, Ching-Nung Yang in Multimedia Tools and Applications (2015)

  7. No Access

    Book and Conference Proceedings

  8. No Access

    Article

    Data hiding by an improved exploiting modification direction

    This paper represents an improved data hiding scheme, CIE, which uses a codebook to improve the Exploiting Modification Direction (EMD) embedding scheme. In our scheme, one secret (2 n + x ...

    Cheonshik Kim in Multimedia Tools and Applications (2014)

  9. No Access

    Chapter and Conference Paper

    Steganography Based on Low Density Parity Check(LDPC)

    We propose a data hiding scheme based on Low Density Parity Check(LDPC) codes. Our proposed theoretical point of view, the blind watermarking can be transmitted through a noisy channel. Matrix encoding propose...

    Cheonshik Kim, Ching-Nung Yang in Future Information Technology (2014)

  10. No Access

    Chapter

    Data Hiding Based on Compressed Dithering Images

    In this paper, we proposed data hiding method for halftone compressed images based on Ordered dither BTC(block truncation coding) [7]. BTC[9] is a simple and efficient image compression technique. However, it ...

    Cheonshik Kim in Advances in Intelligent Information and Database Systems (2010)