A simple unpredictable pseudo random number generator
SIAM Journal on Computing
Algorithms (2nd ed.)
Introduction to data compression (2nd ed.)
Introduction to data compression (2nd ed.)
Information hiding: steganography and watermarking—attacks and countermeasures
Information hiding: steganography and watermarking—attacks and countermeasures
Algorithms and Theory of Computation Handbook
Algorithms and Theory of Computation Handbook
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Spatial domain digital watermarking of multimedia objects for buyer authentication
IEEE Transactions on Multimedia
A universal algorithm for sequential data compression
IEEE Transactions on Information Theory
Interword distance changes represented by sine waves for watermarking text images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper extends the bandwidth of Lempel-Ziv-Welch (LZW) and Lempel Ziv Fiala Greene (LZFG) compression schemes to hide information in the compressed codes for compressed data authentication. The proposed schemes are designed for two objectives; one is to compress a text file; the other is to hide secret information to warrant its authenticity. According to the results of experiment, the proposed scheme could easily and efficiently reach the objective of hiding secret information and only with negligible degradation in compression performance. In addition, the proposed scheme can be even used to hide secret information in medical images without distorting the image quality.