oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Gray-image information hiding based on kinoform
一种应用相息图对灰度图像信息进行隐藏的方法

Yang Xiao-Ping,Zhai Hong-Chen,Wang Ming-Wei,
杨晓苹
,翟宏琛,王明伟

物理学报 , 2008,
Abstract: In this paper, a new method of hiding gray-images in a host image by using double-random phase encryption method based on kinoform iterative is presented, through which not only the volume to be hidden can be compressed, but also the optical efficiency in the information extracting can be improved. The decoding process of which will not rely on the original host image, and this method can also be applied to the hiding of binary-images. In the last part of this paper, the efficiency and the robustness of this method is analyzed. Computer simulations are presented to illustrate the effectiveness of this method.
Gray-image information hiding based on kinoform
一种应用相息图对灰度图像信息进行隐藏的方法

Yang Xiao-Ping,Zhai Hong-Chen,Wang Ming-Wei,
杨晓苹
,翟宏琛,王明伟

中国物理 B , 2008,
Abstract: 一幅灰度图像的相息图被隐藏于一幅宿主图像中,该相息图是采用基于相息图迭代的双随机相位加密技术得到的.由于采用仅含有位相信息的相息图作为待加密灰度图像信息的载体,因而与隐藏图像同时具有振幅和相位信息的情况相比较,需要隐藏的信息量大大降低,从而可在对宿主图像影响较小的情况下,提高提取信息的质量;并可有效地提高信息提取时的光学效率,并且对二元图像信息的隐藏也同样适用.水印图像的剪切对隐藏信息提取质量的影响也被分析,模拟实验结果证明了所采用方法的有效性.
A dichotomy between HSB and LSB galaxies  [PDF]
Marc Verheijen,Brent Tully
Physics , 1998,
Abstract: A complete sample of spiral galaxies in the Ursa Major cluster is imaged at various optical wavelengths and in the Near-Infrared K'-band. HI rotation curves were obtained for all gas rich systems. The Near-Infrared surface brightness distribution of disk galaxies turns out to be bimodal; galaxies avoid a domain around a face-on disk central surface brightness of 18.5 mag/arcsec^2. This bimodality is particularly striking when only the more isolated, non-interacting systems are considered. The Luminosity Function of the HSB family of galaxies is truncated well above the completion limit while the Luminosity Function of the LSB family is still sharply rising at our limiting magnitude. Near-Infrared mass-to-light ratios suggest that HSB galaxies are close to a kinematic maximum-disk situation while LSB galaxies are dark matter dominated at all radii. Assuming equal Near-Infrared mass-to-light ratios for both HSB and LSB systems, we find that the gap in the surface brightness distribution corresponds to a situation in which the baryonic mass is marginally self-gravitating. We finally conclude that the luminosity-line width relation is a fundamental correlation between the amount and distribution of dark matter mass and the total luminosity, regardless of how the luminous mass is distributed within the dark mater halo.
Comparison of photometric parameters of LSB and HSB edge-on galaxies  [PDF]
D. V. Bizyaev
Physics , 2000,
Abstract: Photometric parameters of stellar disks and bulges for several edge-on galaxies from the Catalog of Flat Galaxies (FGC) were determined. We discuss a difference between photometric parameters of LSB and HSB galaxies from our sample. Also we present results of R CCD photometry of edge-on galaxy RFGC 3647. Deprojecting this galaxy we show that it has thin LSB disk (central surface brightness $22^m.2$ in R) and high ratio of radial to vertical scale lengths. It is shown that initially gaseous disk of the galaxy was unstable and its velocity dispersion was low. Stellar disk of this LSB galaxy was not heated significantly since that time.
Data Hiding In Binary Images  [cached]
Rupali D Kasar Kasar
Journal of Global Research in Computer Science , 2010,
Abstract: In this paper, we will overview use of data hiding techniques in binary images. The interest in data hiding has raised with the recent activity in digital copyright protection schemes. The embedding capacity is the major concern in a data-hiding scheme. Several methods for hiding data in specific types of binary images have been proposed. Digital watermarking techniques are used to address digital rights management, protect information, and conceal secrets. This paper will review recent developments in data hiding techniques of binary images.
Quantum Data Hiding  [PDF]
David P. DiVincenzo,Debbie W. Leung,Barbara M. Terhal
Physics , 2001,
Abstract: We expand on our work on Quantum Data Hiding -- hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits can be hidden bitwise with our scheme. We give a preparation of the hiding states as an efficient quantum computation that uses at most one ebit of entanglement. A candidate data hiding scheme that does not use entanglement is presented. We show how our scheme for quantum data hiding can be used in a conditionally secure quantum bit commitment scheme.
Information Hiding and Attacks : Review  [PDF]
Richa Gupta
Computer Science , 2014, DOI: 10.14445/22312803/IJCTT-V10P105.
Abstract: Information Hiding is considered very important part of our lives. There exist many techniques for securing the information. This paper briefs on the techniques for information hiding and the potential threats to those methods. This paper briefs about cryptanalysis and stegananlysis, two methods for breaching into the security methods.
Hiding Quantum Data  [PDF]
David P. DiVincenzo,Patrick Hayden,Barbara M. Terhal
Physics , 2002, DOI: 10.1023/A:1026013201376
Abstract: Recent work has shown how to use the laws of quantum mechanics to keep classical and quantum bits secret in a number of different circumstances. Among the examples are private quantum channels, quantum secret sharing and quantum data hiding. In this paper we show that a method for keeping two classical bits hidden in any such scenario can be used to construct a method for keeping one quantum bit hidden, and vice--versa. In the realm of quantum data hiding, this allows us to construct bipartite and multipartite hiding schemes for qubits from the previously known constructions for hiding bits. Our method also gives a simple proof that two bits of shared randomness are required to construct a private quantum channel hiding one qubit.
Reversible Data Hiding Techniques
Dhananjay Yadav,Vipul Singhal,Devesh Kumar Bandil
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the exact or original data is not visible. The hidden data can be retrieved as and when required. There are several methods that are used in reversible data hiding techniques like Watermarking, Lossless embedding and encryption. In this paper we present a review of reversible watermarking techniques and show different methods that are used to get reversible data hiding technique with higher embedding capacity and invisible objects. Watermark need not be hidden. Watermarking can be applied to 1. Images, 2. Text, 3. Audio/video, 4. Software.
Art of Hiding: An Introduction to Steganography  [PDF]
Maninder Singh Rana,Bhupender Singh Sangwan,Jitendra Singh Jangir
International Journal of Engineering and Computer Science , 2012,
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden.. This paper in tends to give an overview of image steganography, its use sand techniques. It also attempts to identify the requirements of a good steganographical go rithmand briefly reflectson which steganographic techniques are more suitable for which applications
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.