DC FieldValueLanguage
dc.contributor.authorNtalianis, Klimis-
dc.contributor.authorDoulamis, Anastasios-
dc.contributor.authorKollias, Stefanos-
dc.contributor.authorDoulamis, Nikolaos-
dc.date.accessioned2024-10-10T13:57:21Z-
dc.date.available2024-10-10T13:57:21Z-
dc.date.issued2002-01-01-
dc.identifierscopus-0037670088-
dc.identifier.isbn0-7803-7437-1-
dc.identifier.issn1062-922X-
dc.identifier.urihttps://uniwacris.uniwa.gr/handle/3000/2817-
dc.description.abstractAn automatic video-object based steganographic system is proposed in this paper for multiuse message hiding. Initially video objects from different images are selected and for each video object a message is embedded into its most significant wavelet coefficients to provide invisibility and resistance against lossy transmission or other distortion. The architecture consists of three modules. In the first module initial messages are enciphered using one or more encryption algorithms. The enciphered messages are imprinted onto white-background images to construct the message-images to be hidden. In the second module each of the cover video objects is decomposed into two levels with seven subbands, using the DWT. Next Qualified Significant Wavelet Trees (QSWTs), which are paths of significant wavelet coefficients, are estimated for the highest energy pair of subbands of each video object. During the third module each message-image is redundantly embedded to the coefficients of the best QSWTs of a video object and the IDWT is applied to provide the stego-object. In the last stage stego-objects are combined to provide the final content to be transmitted. Experimental results under various loss rates indicate the robustness and efficiency of the proposed steganographk system.en_US
dc.language.isoenen_US
dc.relation.ispartofProceedings of the IEEE International Conference on Systems, Man and Cyberneticsen_US
dc.subjectQSWTsen_US
dc.subjectSteganographic systemen_US
dc.subjectVideo objecten_US
dc.titleAn automatic video-object based steganographic system for multi-use message hiding using wavelet transformen_US
dc.typeConference Paperen_US
dc.relation.conference2002 IEEE International Conference on Systems, Man and Cybernetics, 6-9 October 2002, Yasmine Hammamet, Tunisiaen_US
dc.identifier.doi10.1109/ICSMC.2002.1176068en_US
dc.identifier.scopus2-s2.0-0037670088-
dcterms.accessRights0en_US
dc.relation.deptDepartment of Business Administrationen_US
dc.relation.facultySchool of Administrative, Economics and Social Sciencesen_US
dc.relation.volume3en_US
dc.identifier.spage361en_US
dc.identifier.epage366en_US
dc.collaborationUniversity of West Attica (UNIWA)en_US
dc.journalsSubscriptionen_US
dc.publicationPeer Revieweden_US
dc.countryGreeceen_US
local.metadatastatusnot verifieden_US
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairetypeConference Paper-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextNo Fulltext-
item.grantfulltextnone-
crisitem.author.deptDepartment of Business Administration-
crisitem.author.facultySchool of Administrative, Economics and Social Sciences-
crisitem.author.parentorgSchool of Administrative, Economics and Social Sciences-
Appears in Collections:Book Chapter / Κεφάλαιο Βιβλίου
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

1
checked on Nov 4, 2024

Page view(s)

8
checked on Nov 5, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.