Fuzzy sets, uncertainty, and information
Fuzzy sets, uncertainty, and information
Secure Steganographic Methods for Palette Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
Steganography Preserving Statistical Properties
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Improving BTC image compression using a fuzzy complement edge operator
Signal Processing
The optimized copyright protection system with genetic watermarking
Soft Computing - A Fusion of Foundations, Methodologies and Applications - Special Issue on Bio-Inspired Information Hiding; Guest editors: Jeng-Shyang Pan, Ajith Abraham
Constructing good covering codes for applications in steganography
Transactions on data hiding and multimedia security III
Exploiting preserved statistics for steganalysis
IH'04 Proceedings of the 6th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
IEEE Transactions on Signal Processing - Part II
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Matrix embedding for large payloads
IEEE Transactions on Information Forensics and Security
A geometric approach to edge detection
IEEE Transactions on Fuzzy Systems
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Hi-index | 0.00 |
Data hiding technique can facilitate security and the safe transmission of important information in the digital domain, which generally requires a high embedding payload and good stego image quality. Recently, a steganographic framework known as wet paper coding has been utilized as an effective strategy in image hiding to achieve the requirements of high embedding payload, good quality and robust security. In this paper, besides employing this mechanism as a fundamental stage, we take advantage of two novel techniques, namely, an efficient n-indicator and a fuzzy edge detector. The first is to increase the robustness of the proposed system to guard against being detected or traced by the statistics methods while allowing the receiver without knowledge of secret data positions to retrieve the embedded information. The second is to improve the payload and enhance the quality of stego image. The experimental results show that our proposed scheme outperforms its ability to reduce the conflict among three steganography requirements.