Description |
1 online resource (338 pages) |
Series |
Smart Innovation, Systems and Technologies ; v. 63 |
|
Smart innovation, systems, and technologies ; 63.
|
Contents |
Preface; Conference Organization; Contents; Part I Information Hiding and Secret Sharing; 1 Demonstration Experiment of Data Hiding into OOXML Document for Suppression of Plagiarism; Abstract; 1 Introduction; 2 Problem Statement; 3 Related Works; 4 OOXML Format; 5 Examined Methods; 5.1 A method based on images; 5.2 A method based on similar fonts; 6 Experiments; 6.1 Experiment 1; 6.2 Experiment 2; 7 Conclusion; References; 2 A Revisit to LSB Substitution Based Data Hiding for Embedding More Information; Abstract; Keywords; 1 Introduction; 2 Review of Chen and Chang's scheme |
|
3 Proposed scheme4 Experimental results; 5 Conclusions; References; 3 Behavior Steganography in Social Network; Abstract; Keywords; 1 Introduction; 2 System Description; 3 Steganographic method; 4 Conclusion; Acknowledgement; References; 4 Robust Steganography Using Texture Synthesis; Abstract; Keywords; 1 Introduction; 2 Proposed Method; 2.1 Data Hiding; 2.2 Data Extraction; 3 Experimental Results; 4 Conclusions; Acknowledgement; References; 5 A Reversible Data Hiding Scheme in AMBTC Compression Code Using Joint Neighborhood Coding; Abstract; Keywords; 1 Introduction; 2 Related works |
|
2.1 Absolute Moment Block Truncation Coding2.2 Joint Neighborhood Coding; 3 The proposed method; 3.1 Data hiding phase; 3.2 Data extraction phase; 4 Experimental results; 5 Conclusions; 6 Acknowledgement; References; 6 A Quantization-Based Image Watermarking Scheme Using Vector Dot Product; Abstract; Keywords; 1 Introduction; 2 The Proposed Method; 2.1 An overview; 2.2 Single bit embedding algorithms; 2.3 Image watermarking optimized for pre-specified PSNR; 3 Experimental Results; 4 Conclusions; References; 7 High-capacity Robust Watermarking Approach for Protecting Ownership Right; Abstract |
|
Keywords1 Introduction; 2 Proposed Method; 3 Experimental Results; 4 Conclusion; References; 8 High Payload Data Hiding Based on Jus tNoticeable Distortion Profile and LSB Substitution; Abstract; Keywords; 1 Introduction; 2 Related Works; 2.1 Swain's data hiding scheme; 2.2 Chou and Li's profile estimation method; 3 The Proposed Scheme; 4 Experimental Results; 5 Conclusions; References; 9 An Improved Data Hiding Method of Five Pixel Pair Differencing and LSB Substitution Hiding Scheme; Abstract; 1 Introduction; 2 Related Work; 2.1 Pixel Value Differencing (PVD); 3 Proposed Method |
|
3.1 Embedding Phase3.2 Extraction Process; 4 Experimental Results; 5 Conclusion; References; 10 A Data Hiding Method based on Multi-predictor and Pixel Value Ordering; Abstract; Key words; 1 Introduction; 2 Related Works; 2.1 Pixel-based Pixel Value Ordering (PPVO) [9]; 2.2 Media Edge Detect (MED) [17]; 2.3 Data Hiding Method Using Image Interpolation (NMI) [4]; 2.4 Interpolating Neighboring Pixels (INP) [5]; 2.5 High Payload Reversible Data Embedding Method [13]; 3 The Proposed Method; 3.1 The Prediction Phase; 3.2 The Embedding Phase; 3.3 The Data Extraction Phase |
Summary |
This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. |
Notes |
3.4 Overflow and Underflow Handling |
|
Print version record |
Subject |
Multimedia systems -- Congresses
|
|
Image processing -- Congresses
|
|
Signal processing -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Digital watermarking -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
TECHNOLOGY & ENGINEERING -- Engineering (General)
|
|
TECHNOLOGY & ENGINEERING -- Reference.
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
|
Digital watermarking
|
|
Image processing
|
|
Multimedia systems
|
|
Signal processing
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Pan, Jeng-Shyang.
|
|
Tsai, Pei-Wei
|
|
Huang, Hsiang-Cheh
|
ISBN |
9783319502090 |
|
3319502093 |
|