Grid and Pervasive Computing
8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings
Article
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network band...
Article
Article
Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). Th...
Article
Matrix coding based data hiding (MCDH) using linear codes (syndrome coding) is an efficient coding method for steganographic schemes to improve their embedding efficiency. Hamming code data hiding (HDH) is a w...
Article
A steganographic scheme, matrix coding-based data hiding (MCDH), is constructed from covering function to enhance embedding efficiency, and, meanwhile, decrease the required changed bits. However, the MCDH may...
Article
Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cove...
Article
When traditional secret image sharing techniques reconstructed the secret, they input the shares over t. While less than t shares can know nothing about the secret, the problem arises when there are more than t s...
Article
This paper presents a lossless data hiding method for an absolute moment block truncation coding (AMBTC) images, which is a compressed grayscale image. It is not easy to hide secret data in an AMBTC-compresse...
Article
Data hiding used to embed data, such as copyright information, into various forms of media such as image, audio, or text with a minimum amount of perceivable degradation to the “host” signal. Therefore, in man...
Article
Some medical accidents in hospitals are related to mismanagement of medical images X-ray and computer tomography (CT). A counterfeit medical image leads to medical accidents. Thus, security of medical images i...
Article
Due to the benefits of palmprint recognition and the advantages of biometric fusion systems, it is necessary to study multi-source palmprint fusion systems. Unfortunately, the research on multi-instance palmpr...
Article
Most data hiding schemes change the least significant bits to conceal messages in the cover images. Matrix encoding scheme is a well known scheme in this field. The matrix encoding proposed by Crandall can be ...
Article
Recently, we are surrounded by a collection of heterogeneous computing devices such as desktop computers, laptops, smart phones, smart televisions, and tablet PCs. Each device is operated with its own host ope...
Article
Visual cryptographic scheme (VCS) has an attractive property of decoding that can be performed directly by the human visual system without any computation. This novel stacking-to-see property of VCS can be sec...
Article
This paper presents a predictor-based watermark scheme that embeds secret bit streams and a DSA signature into an image. For the copyrighting of digital media, a DSA signature is appropriate as a watermarking ...
Article
This paper represents an improved data hiding scheme, CIE, which uses a codebook to improve the Exploiting Modification Direction (EMD) embedding scheme. In our scheme, one secret (2 n + x ...
Book and Conference Proceedings
8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings
Chapter and Conference Paper
In 2012, Singh-Verma proposed an ID-based proxy signature scheme with message recovery. Unfortunately, by giving two concrete attacks, Tian et al. showed that Singh-Verma’s scheme is not secure. This paper pro...
Chapter and Conference Paper
Many steganography schemes were invented for the purpose of safe communication. Such previous schemes often show good and reasonable performance, however, few have been based on paletted images; it is not easy...
Chapter and Conference Paper
In this paper an architecture for context aware framework for mobile phones has been represented. The main goal of this proposed architecture is to enable phones to configure themselves based on self-initiated...