Paper Abstract and Keywords |
Presentation |
2006-02-20 16:05
Information Hiding Technique Based on Morphing Technology Satoshi Kondo, Qiangfu Zhao (Aizu Univ.), Hideyuki Takagi (Kyushu Univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
This paper proposes a new technique for information hiding based on morphing technology. In the proposed technique, the morphing image (stego image) is generated with warping of the source image (embedded data) by morphing. This corresponds to embedding of data in conventional information hiding. Therefore, the cover data which is necessary in conventional information hiding is unnecessary. Also, information of the source image appears on the morphing image which corresponds to the stego data according to the morphing rate. Besides extracting the embedded data from the stego image, it is also possible to use the stego image alone. In this paper, we first show that the morphing technology can be used as an information hiding technique, and then describe the features of the proposed technique as compared with the conventional techniques for information hiding. Finally, an application is introduced. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
morphing / information hiding / steganography / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 105, no. 610, IE2005-279, pp. 145-150, Feb. 2006. |
Paper # |
IE2005-279 |
Date of Issue |
2006-02-13 (ITS, IE) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
ITS IE ITE-ME ITE-AIT ITE-HI |
Conference Date |
2006-02-20 - 2006-02-21 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Hokkaido Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
Image Processing for ITS, etc. |
Paper Information |
Registration To |
IE |
Conference Code |
2006-02-ITS-IE-ITE-ME-ITE-CG-ITE-HI |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Information Hiding Technique Based on Morphing Technology |
Sub Title (in English) |
|
Keyword(1) |
morphing |
Keyword(2) |
information hiding |
Keyword(3) |
steganography |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Satoshi Kondo |
1st Author's Affiliation |
Aizu University (Aizu Univ.) |
2nd Author's Name |
Qiangfu Zhao |
2nd Author's Affiliation |
Aizu University (Aizu Univ.) |
3rd Author's Name |
Hideyuki Takagi |
3rd Author's Affiliation |
Kyushu University (Kyushu Univ.) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2006-02-20 16:05:00 |
Presentation Time |
25 minutes |
Registration for |
IE |
Paper # |
ITS2005-72, IE2005-279 |
Volume (vol) |
vol.105 |
Number (no) |
no.608(ITS), no.610(IE) |
Page |
pp.145-150 |
#Pages |
6 |
Date of Issue |
2006-02-13 (ITS, IE) |
|