Loading [MathJax]/extensions/MathMenu.js
Saeed Sarreshtedari - IEEE Xplore Author Profile

Showing 1-9 of 9 results

Filter Results

Show

Results

LSB matching techniques are widely applied in the field of image steganography. In such algorithms, pixel values of each group must be changed in a way that a predefined function of the pixel group matches the secret digit. The notational system of the secret digits can be every desired number, as well as the size of the pixel groups. In order to preserve the quality of the stego image, it is desi...Show More
In this paper, an unequal error protection (UEP)-based scheme is presented to generate tamper-proof images, in which the lost content of the original image is recoverable despite the malicious tampering. For this purpose, a representation of the original image is embedded into itself, after being protected by the proper channel coding. Since better protection is considered for the more important b...Show More
Authentication and tampering detection of the digital signals is one of the main applications of the digital watermarking. Recently, watermarking algorithms for digital images are developed to not only detect the image tampering, but also to recover the lost content to some extent. In this paper, a new watermarking scheme is introduced to generate digital self-embedding speech signals enjoying the...Show More
Watermarking algorithms have been widely applied to the field of image forensics recently. One of these very forensic applications is the protection of images against tampering. For this purpose, we need to design a watermarking algorithm fulfilling two purposes in case of image tampering: 1) detecting the tampered area of the received image and 2) recovering the lost information in the tampered z...Show More
This paper introduces a new universal steganalysis framework. The required image features are extracted based on the generalized autoregressive conditional heteroskedasticity (GARCH) model and higher-order statistics of the images. The GARCH features are extracted from non-approximate wavelet coefficients. Besides, the second and third order statistics are exploited to develop features very sensit...Show More
Watemarking the original images to protect them against tampering has recently attracted an overgrowing interest. Recent works in this field offer algorithms that not only localize the tampering, but also recover the original content in the lost area. In this paper, we show that this self-restoration problem can be modeled as a source-channel coding problem. The original image is compressed using ...Show More
A new high capacity method for transform domain image steganography is introduced in this paper. The proposed steganography algorithm works on the wavelet transform coefficients of the original image to embed the secret data. As compared to current transform domain data hiding methods, this scheme can provide a larger capacity for data hiding without sacrificing the cover image quality. This is ac...Show More
This paper introduces a new method for the least significant bit (LSB) steganography in spatial domain. The new method, called one-third LSB embedding, reduces the probability of change per pixel to one-third without sacrificing the embedding capacity, as compared to previous LSB steganography techniques. This improvement results in a better imperceptibility and higher robustness against well know...Show More
This paper introduces an efficient scheme to image steganography by introducing the hidden message (payload) insertion in spatial domain and transforming the stego-image to compressed domain. We apply a recently-proposed LSB method in order to obtain better statistical behavior of the stego-message and subsequently, the obtained stego-image is transformed and quantized in order to enhance the secu...Show More