DC FieldValueLanguage
dc.contributor.authorNtalianis, Klimis-
dc.contributor.authorDoulamis, Anastasios-
dc.contributor.authorKollias, Stefanos-
dc.contributor.authorDoulamis, Nikolaos-
dc.date.accessioned2024-10-11T07:20:01Z-
dc.date.available2024-10-11T07:20:01Z-
dc.date.issued2002-11-02-
dc.identifierscopus-21444454351-
dc.identifier.isbn0-7803-7304-9-
dc.identifier.other21444454351-
dc.identifier.urihttps://uniwacris.uniwa.gr/handle/3000/2818-
dc.description.abstractA wavelet-based steganographic method is proposed for robust message hiding. The message is embedded into the most significant wavelet coefficients of a cover image to provide invisibility and resistance against lossy transmission, compression or other distortion. The architecture consists of three modules. In the first module, the initial message is enciphered by an encryption algorithm. The enciphered message is imprinted onto a white-background image to construct the message-image to be hidden. In the second module, the cover image is decomposed into two levels with seven subbands, using the DWT. Next, qualified significant wavelet trees (QSWTs), which are paths of significant wavelet coefficients, are estimated for the highest energy pair of subbands. In the third module, the message-image is redundantly embedded to the coefficients of the best QSWTs and the IDWT is applied to provide the stego-image. The robustness and efficiency of the proposed steganographic system is evaluated under various loss rates, combined with different JPEG compression ratios.en_US
dc.language.isoenen_US
dc.relation.ispartofProceedings of the 2002 IEEE International Conference on Multimedia and Expo (ICME 2002)en_US
dc.titleA robust steganographic wavelet-based system for resistant message hiding under error prone networksen_US
dc.typeConference Paperen_US
dc.relation.conference2002 IEEE International Conference on Multimedia and Expo (ICME 2002), 26-29 August 2002, Lausanne, Switzerlanden_US
dc.identifier.doi10.1109/ICME.2002.1035678en_US
dc.identifier.scopus2-s2.0-21444454351-
dcterms.accessRights0en_US
dc.relation.deptDepartment of Business Administrationen_US
dc.relation.facultySchool of Administrative, Economics and Social Sciencesen_US
dc.relation.volume2en_US
dc.identifier.spage561en_US
dc.identifier.epage564en_US
dc.collaborationUniversity of West Attica (UNIWA)en_US
dc.journalsSubscriptionen_US
dc.publicationPeer Revieweden_US
dc.countryGreeceen_US
local.metadatastatusnot verifieden_US
item.fulltextNo Fulltext-
item.languageiso639-1en-
item.grantfulltextnone-
item.cerifentitytypePublications-
item.openairetypeConference Paper-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
crisitem.author.deptDepartment of Business Administration-
crisitem.author.facultySchool of Administrative, Economics and Social Sciences-
crisitem.author.parentorgSchool of Administrative, Economics and Social Sciences-
Appears in Collections:Book Chapter / Κεφάλαιο Βιβλίου
CORE Recommender
Show simple item record

SCOPUSTM   
Citations

3
checked on Oct 12, 2024

Page view(s)

4
checked on Oct 16, 2024

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.