Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
In this paper we present a new technique to enhance embedding capacity of a steganographic channel by preprocessing the secret data. Here we limit ourselves to textual data only. By preprocessing we don't mean compression; secret data can be compressed after it has been preprocessed by our tech...
| Main Authors: | Potdar, Vidyasagar, Han, Song, Chang, Elizabeth |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE
2005
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/44899 |
Similar Items
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Penggunaan Multimedia Dalam Perkamusan di Sekolah Menengah
by: Siron, Hazim
Published: (2005)
by: Siron, Hazim
Published: (2005)
Electronic Dictionary for Herb's Plant
Published: (2008)
Published: (2008)
Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals
by: Xiang, Y., et al.
Published: (2015)
by: Xiang, Y., et al.
Published: (2015)
Does the abundance of hoverfly mimics (Syrphidae) depend on the numbers of their hymenopteran models ?
by: Howarth, Brigitte, et al.
Published: (2004)
by: Howarth, Brigitte, et al.
Published: (2004)
Electrical performance and reliability characterization of a SiC MOSFET power module with embedded decoupling capacitors
by: Yang, Li, et al.
Published: (2018)
by: Yang, Li, et al.
Published: (2018)
Sistem Bantuan Pembinaan Kamus Berasaskan Pangkalan Data Teks Bebas
by: Abdullah, Muhamad Taufik
Published: (1992)
by: Abdullah, Muhamad Taufik
Published: (1992)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Model guided algorithm for mining unordered embedded subtrees
by: Hadzic, Fedja, et al.
Published: (2010)
by: Hadzic, Fedja, et al.
Published: (2010)
GNSS Phase Ambiguity Validation: A Review
by: Teunissen, Peter, et al.
Published: (2007)
by: Teunissen, Peter, et al.
Published: (2007)
IMB3-Miner: Mining induced/embedded subtrees by constraining the level of embedding
by: Tan, H., et al.
Published: (2006)
by: Tan, H., et al.
Published: (2006)
Optimal control of three-phase embedded power grids
by: Formentini, Andrea, et al.
Published: (2016)
by: Formentini, Andrea, et al.
Published: (2016)
‘In both our languages’: Greek-Latin code-switching in Roman literature
by: Mullen, Alex
Published: (2015)
by: Mullen, Alex
Published: (2015)
Declarative modelling for Bayesian inference by shallow embedding
by: Nilsson, Henrik, et al.
Published: (2014)
by: Nilsson, Henrik, et al.
Published: (2014)
Combined coding and modulation in frequency-selective mobile communications.
by: Caldera, Manora K.
Published: (2000)
by: Caldera, Manora K.
Published: (2000)
Mathematical Aspects of Word Embeddings
by: Carrington, Rachel
Published: (2021)
by: Carrington, Rachel
Published: (2021)
Effects of V1 surround modulation tuning on visual saliency and the tilt illusion
by: Keemink, Sander Wessel, et al.
Published: (2018)
by: Keemink, Sander Wessel, et al.
Published: (2018)
Struktur mega, makro dan mikro dalam penerbitan bidang leksikografi: satu pengenalan
by: Suhaimi, Mohamad Suhaizi
Published: (2017)
by: Suhaimi, Mohamad Suhaizi
Published: (2017)
Design of a pneumatic muscle based continuum robot with embedded tendons
by: Kang, Rongjie, et al.
Published: (2016)
by: Kang, Rongjie, et al.
Published: (2016)
The collected letters of Robert Southey. Part six, 1819-1821
by: Southey, Robert
Published: (2017)
by: Southey, Robert
Published: (2017)
Guidelines for reporting embedded recruitment trials
by: Madurasinghe, Vichithranie W., et al.
Published: (2016)
by: Madurasinghe, Vichithranie W., et al.
Published: (2016)
Detection of delamination between steel bars and concrete using embedded piezoelectric actuators/sensors
by: Zhu, X., et al.
Published: (2013)
by: Zhu, X., et al.
Published: (2013)
User contribution measurement model for web-based discussion forums
by: Chai, Kevin, et al.
Published: (2009)
by: Chai, Kevin, et al.
Published: (2009)
Visual search strategies of children with and without autism spectrum disorders during an embedded figures task
by: Horlin, Chiara, et al.
Published: (2014)
by: Horlin, Chiara, et al.
Published: (2014)
Simultaneous wireless information and GaN-based power transfer exploiting a dual frequency band
by: Placzek, J. Maximilian, et al.
Published: (2018)
by: Placzek, J. Maximilian, et al.
Published: (2018)
An improved MOEA/D algorithm for multi-objective multicast routing with network coding
by: Xing, Huanlai, et al.
Published: (2017)
by: Xing, Huanlai, et al.
Published: (2017)
Deep word embeddings for visual speech recognition
by: Stafylakis, Themos, et al.
Published: (2018)
by: Stafylakis, Themos, et al.
Published: (2018)
Razor: Mining distance-constrained embedded subtrees
by: Tan, H., et al.
Published: (2006)
by: Tan, H., et al.
Published: (2006)
The role of orthography and visual form on word recognition
by: Kelly, Andrew N.
Published: (2016)
by: Kelly, Andrew N.
Published: (2016)
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
by: Badawi, Bakri
Published: (2022)
by: Badawi, Bakri
Published: (2022)
A quantum inspired evolutionary algorithm for dynamic multicast routing with network coding
by: Xing, Huanlai, et al.
Published: (2016)
by: Xing, Huanlai, et al.
Published: (2016)
An examination of the ethical influences on the work of tax practitioners
by: Frecknall-Hughes, Jane, et al.
Published: (2017)
by: Frecknall-Hughes, Jane, et al.
Published: (2017)
Subjective and objective watermark detection using a novel approach: Bar-coded watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Pullout behaviour of suction embedded plate anchors in clay
by: Song, Zhenhe
Published: (2008)
by: Song, Zhenhe
Published: (2008)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
OFDPv2 : an efficient protocol for topology discovery in openflow-based software defined networking
by: Tanko, Abubakar Musa AlKali
Published: (2017)
by: Tanko, Abubakar Musa AlKali
Published: (2017)
A Letter of Consequence: Referral Letters from General Practitioners to Secondary Mental Health Services
by: Shaw, Ian, et al.
by: Shaw, Ian, et al.
A study on the relationship between employee's workplace attitudes and intention to turnover at MISC Berhad / Noor Arbaah Abdul Mutalef
by: Abdul Mutalef, Noor Arbaah
Published: (2007)
by: Abdul Mutalef, Noor Arbaah
Published: (2007)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Similar Items
-
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005) -
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Penggunaan Multimedia Dalam Perkamusan di Sekolah Menengah
by: Siron, Hazim
Published: (2005) -
Electronic Dictionary for Herb's Plant
Published: (2008) -
Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals
by: Xiang, Y., et al.
Published: (2015)