Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Chiang Lung Liu"'
Publikováno v:
2020 International Symposium on Computer, Consumer and Control (IS3C).
Although the Pixel-Value Differencing (PVD) steganography can avoid being detected by the RS steganalysis, the histogram of the pixel-value differences poses an abnormal distribution. Based on this hiding characteristic, this paper proposes a PVD ste
Publikováno v:
Multimedia Tools and Applications. 76:6031-6050
Concomitant with the rapid advancements in information technology, the issue of secure data transmission through the Internet has become increasingly important. Hiding data in images is an important technique in digital media; it facilitates confiden
Autor:
Hsing Han Liu, Chiang Lung Liu
Publikováno v:
Applied Mechanics and Materials. :3517-3521
Reversible data hiding techniques can completely recover the cover images after extracting the secret message from the stego images and become a hot research topic recently. The histogram shift-based steganography, which is a kind of reversible data
Publikováno v:
Applied Mechanics and Materials. :3413-3417
Since Naor and Shamir introduced visual cryptography in 1994, numerous image sharing techniques have been proposed to protect the security of binary, gray, and color images. However, only few of them focus on grayscale image sharing. Because the size
Publikováno v:
International Journal of Advancements in Computing Technology. 4:525-535
Autor:
Chiang-Lung Liu, Tai-Hung Lai
Publikováno v:
Advanced Science Letters. 8:801-806
Publikováno v:
Applied Mechanics and Materials. 145:272-276
Cloud computing is a new service style with many significant advantages and becoming a trend in the world nowadays. Although cloud computing can provide many significant advantages, it also brings us new security problems which present strong barrier
Publikováno v:
Computer Standards & Interfaces. 31:420-427
To prevent misusing of the steganography from the terrorists, effective steganalysis schemes which discriminate the stego-images from suspicious images are necessary. Some steganalysis methods can accurately estimate the length of embedded messages b
Autor:
Shiang-Rong Liao, Chiang-Lung Liu
Publikováno v:
Pattern Recognition. 41:2945-2955
A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detecti
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9783642416705
The amount of digital data has rapidly increased at a rate of double per year since 2009. Adopting cloud computing storage services will consequently be an alternative approach to gain cost flexibility. Data encryption and access control are common d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b0871ac35db5b7a8b815e2df54e796f6
https://doi.org/10.1007/978-3-642-41671-2_23
https://doi.org/10.1007/978-3-642-41671-2_23