Standard

Linear hash functions as a means of distortion-rate optimization in data embedding. / Ryabko, Boris; Fionov, Andrey.

IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, 2019. стр. 235-238 (IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security).

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийстатья в сборнике материалов конференциинаучнаяРецензирование

Harvard

Ryabko, B & Fionov, A 2019, Linear hash functions as a means of distortion-rate optimization in data embedding. в IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Association for Computing Machinery, Inc, стр. 235-238, 7th ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2019, Paris, Франция, 03.07.2019. https://doi.org/10.1145/3335203.3335740

APA

Ryabko, B., & Fionov, A. (2019). Linear hash functions as a means of distortion-rate optimization in data embedding. в IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (стр. 235-238). (IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security). Association for Computing Machinery, Inc. https://doi.org/10.1145/3335203.3335740

Vancouver

Ryabko B, Fionov A. Linear hash functions as a means of distortion-rate optimization in data embedding. в IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc. 2019. стр. 235-238. (IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security). doi: 10.1145/3335203.3335740

Author

Ryabko, Boris ; Fionov, Andrey. / Linear hash functions as a means of distortion-rate optimization in data embedding. IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, 2019. стр. 235-238 (IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security).

BibTeX

@inproceedings{e81c0308b9f542b5a280caa3ed294079,
title = "Linear hash functions as a means of distortion-rate optimization in data embedding",
abstract = "Embedding hidden data is usually performed by introducing some distortions (errors) in cover objects. If the distortions exceed a certain bound, steganalysis can detect the presence of hidden data. So the problem is to embed as much data as possible and not exceed a permissible distortion level to ensure indetectability. We describe a general class of stegosystems that solves the problem by employing linear hash functions. The suggested stegosystems allow to transmit hidden information of the amount asymptotically close to the maximum possible under the given distortion.",
keywords = "Data embedding, Data hiding, Embedding rate, Linear hash function, data hiding, linear hash function, data embedding, MODEL, embedding rate",
author = "Boris Ryabko and Andrey Fionov",
year = "2019",
month = jul,
day = "2",
doi = "10.1145/3335203.3335740",
language = "English",
series = "IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security",
publisher = "Association for Computing Machinery, Inc",
pages = "235--238",
booktitle = "IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security",
note = "7th ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2019 ; Conference date: 03-07-2019 Through 05-07-2019",

}

RIS

TY - GEN

T1 - Linear hash functions as a means of distortion-rate optimization in data embedding

AU - Ryabko, Boris

AU - Fionov, Andrey

PY - 2019/7/2

Y1 - 2019/7/2

N2 - Embedding hidden data is usually performed by introducing some distortions (errors) in cover objects. If the distortions exceed a certain bound, steganalysis can detect the presence of hidden data. So the problem is to embed as much data as possible and not exceed a permissible distortion level to ensure indetectability. We describe a general class of stegosystems that solves the problem by employing linear hash functions. The suggested stegosystems allow to transmit hidden information of the amount asymptotically close to the maximum possible under the given distortion.

AB - Embedding hidden data is usually performed by introducing some distortions (errors) in cover objects. If the distortions exceed a certain bound, steganalysis can detect the presence of hidden data. So the problem is to embed as much data as possible and not exceed a permissible distortion level to ensure indetectability. We describe a general class of stegosystems that solves the problem by employing linear hash functions. The suggested stegosystems allow to transmit hidden information of the amount asymptotically close to the maximum possible under the given distortion.

KW - Data embedding

KW - Data hiding

KW - Embedding rate

KW - Linear hash function

KW - data hiding

KW - linear hash function

KW - data embedding

KW - MODEL

KW - embedding rate

UR - http://www.scopus.com/inward/record.url?scp=85069951867&partnerID=8YFLogxK

U2 - 10.1145/3335203.3335740

DO - 10.1145/3335203.3335740

M3 - Conference contribution

AN - SCOPUS:85069951867

T3 - IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security

SP - 235

EP - 238

BT - IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security

PB - Association for Computing Machinery, Inc

T2 - 7th ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2019

Y2 - 3 July 2019 through 5 July 2019

ER -

ID: 25330904