An example of constructing triangle areas using landmark set.

An example of constructing triangle areas using landmark set.

Source publication
Preprint
Full-text available
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed face recognition is proposed. In our proposed data hiding approach, a group of morphed face images...

Context in source publication

Context 1
... on the determined landmarks (e.g., Cw, Cs, Ct), some triangle areas are constructed without overlapping. An example of constructing triangle areas is given in Figure 5. As we can see, each triangle area includes three pairs of coordinates of the landmarks. ...

Similar publications

Article
Full-text available
Information security provides a process of hiding secret information to protect the sensitive data from attackers. To achieve secure data transmission, data hiding and steganographic techniques are being developed. Image steganography is commonly employed in several areas such as telecommunication, mobile computing, online voting system, image retr...