Peal[2] shows that a sufficient and necessary condition on the existence of theMoore-Penrose inverse over any fields.Zhuang [3] generalize the result to any divisionrings.In this section we give another sufficient and...Peal[2] shows that a sufficient and necessary condition on the existence of theMoore-Penrose inverse over any fields.Zhuang [3] generalize the result to any divisionrings.In this section we give another sufficient and necessary condition on the existence ofthe Moore-Penrose inverse over any division rings.Our result can be regarded as an im-provement of Theorem lin[1].As a medium result,we also show a characterization ofthe{1,2}-inverse.展开更多
Division arithmetic and generalized exploiting modification direction (DA-GEMD) method has perfect efficiency in data-hiding. However, there exist some weaknesses in DA-GEMD. Because the benchmarks are their median ...Division arithmetic and generalized exploiting modification direction (DA-GEMD) method has perfect efficiency in data-hiding. However, there exist some weaknesses in DA-GEMD. Because the benchmarks are their median of nine pixels in each block of cover-image, it will give a hint for the attacker to hack the stego-image. In the paper, we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image. It will mix up the pixels in each image block and prevent the secret information from being extracted. The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding.展开更多
基金This work is Supported by NSF of Heilongjiang Province
文摘Peal[2] shows that a sufficient and necessary condition on the existence of theMoore-Penrose inverse over any fields.Zhuang [3] generalize the result to any divisionrings.In this section we give another sufficient and necessary condition on the existence ofthe Moore-Penrose inverse over any division rings.Our result can be regarded as an im-provement of Theorem lin[1].As a medium result,we also show a characterization ofthe{1,2}-inverse.
文摘Division arithmetic and generalized exploiting modification direction (DA-GEMD) method has perfect efficiency in data-hiding. However, there exist some weaknesses in DA-GEMD. Because the benchmarks are their median of nine pixels in each block of cover-image, it will give a hint for the attacker to hack the stego-image. In the paper, we utilize the Sudoku table to randomize the benchmark for each 3×3 block of cover-image. It will mix up the pixels in each image block and prevent the secret information from being extracted. The proposed method still keeps the original efficiency as DA-GEMD while promoting the security for data-hiding.