
Son Thai NguyenTra Vinh University · Information Technology
Son Thai Nguyen
Doctor of Philosophy
About
57
Publications
7,208
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
872
Citations
Publications
Publications (57)
Reversible data hiding is a data-hiding technique which has the ability to recover the original version from stego-images after the secret information is extracted. In this paper, we propose a novel reversible data-hiding scheme based on an enhanced reduced difference-expansion technique. In the proposed scheme, the original image is divided into n...
In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal watermark embedding and authentication, reversibility, robustness, and others, which must be satisfied when a reversible watermark is designed for relational databases. To meet these requirements, in this paper, a lossless watermarking scheme for a categorical...
Reversible data hiding has attracted significant attention from researchers because it can extract an embedded secret message correctly and recover a cover image without distortion. In this paper, a novel, efficient reversible data hiding scheme is proposed for absolute moment block truncation code (AMBTC) compressed images. The proposed scheme is...
Many fragile watermarking schemes for image authentication have been proposed to protect the integrity of digital images. However, these schemes still yielded unsatisfactory image quality of the watermarked images and low accuracy of tamper detection. In this paper, we propose a new, fragile watermarking scheme for image authentication based on the...
The livelihoods of millions of rice farmers in Vietnam’s Mekong Delta have become increasingly vulnerable due to reduced rainfall and the resulting water stress. In this context, promoting water-saving practices, such as alternate wetting and drying technology, is vital to sustain rice production and enhance people’s resilience to climatic changes...
span>Reversible image authentication scheme is a technique that detects tampered areas in images and allows them to be reconstructed to their original version without any distortion. In this article, a new, reversible, image authentication scheme based on prediction error expansion is proposed for digital images. The proposed scheme classifies the...
Engineering graduates increasingly find that they are part of teams that draw a multi-disciplinary membership across a broad range of cultural, socioeconomic, and linguistic backgrounds. Although engineering students often have the opportunity to participate in international projects (e.g. co-operative education programs, study abroad), formal inte...
Engineering graduates increasingly find that they are part of teams that draw a multi-disciplinary membership across a broad range of cultural, socio-economic, and linguistic backgrounds. Although engineering students often have the opportunity to participate in international projects (e.g. co-operative education programs, study abroad), formal int...
Poster presented at the Canadian Engineering Educator Association Annual Conference - 2019
The paper proposes a secure and robust stereo image watermarking scheme based on chaotic logistic map encoding and frequency transformations. The chaotic logistic map encoding is employed to confuse both original stereo images and watermarked images. Since the high sensitivity to initial conditions introduced in the chaotic logistic map, a huge key...
Invertible steganography is a kind of information hiding, in which a secret message is embedded in a carrier in such a way that the human visual system is less sensitive. Moreover, the original media is completely retrieved after the secret message is extracted. This chapter proposes a novel invertible steganography scheme with high embedding capac...
Nowadays, with the rapid development of the Internet, the transmission of digital data such as images, videos and texts through the Internet becomes more convenient. Therefore, how to protect the integrity and copyright of digital data has become an urgent issue. This paper presents a watermarking method that based on Discrete Wavelet Transform (DW...
In this paper, we improved the reversible data hiding method of Qu’s et al. The original image is divided into overlapped equalsize blocks (2x2). Each of block is used to predict a pixel. Then a histogram is constructed from the different value between the original pixel and the prediction pixel. In order to increase thecapacity, the proposed metho...
First-year engineering students at Vancouver Island University (VIU) have participated in an international, for credit, field school in Tra Vinh Province, Vietnam to integrate intercultural perspectives within their engineering curriculum.
Engineering graduates will increasingly find that they are part of teams that draw a multi-disciplinary memb...
Many steganography schemes have been proposed for video sequences. However, the embedding capacity obtained by these schemes is still unsatisfactory. In this paper, a novel steganography scheme has proposed to further improve the embedding capacity while guaranteeing high visual quality of embedded video H.264/AVC sequences. In the proposed scheme,...
In this paper, we propose a novel reversible data hiding technique based on two-dimensional histogram shifting for quantized discrete cosine transformation coefficients (QDCT). In the proposed scheme, a two-dimensional histogram is constructed by QDCT coefficients blocks with the size of 8 × 8 of the left image and the right image. Once most of the...
Reversible image steganography attracts much attention of researchers since such technique has ability to reconstruct the original version of the host image losslessly after image steganography. In this paper, we propose a new reversible image steganography based on rhombus prediction and local complexity. To maintain good quality of stego images a...
Data hiding is a technique that allows secret data to be delivered securely by embedding the data into cover digital media. In this paper, we propose a new data hiding algorithm for H.264/advanced video coding (AVC) of video sequences with high embedding capacity. In the proposed scheme, to embed secret data into the quantized discrete cosine trans...
– First-year engineering students at Vancouver Island University in Canada and second-year engineering students at Tra Vinh University in Vietnam have been brought together to work on a cooperative cornerstone design project as a means to introduce intercultural competencies early in the students' academic experience. Student teams at each institut...
The least-significant-bit (LSB) technique is one of the commonly used steganographic algorithms in the spatial domain. In most existing schemes, they didn’t carefully analyze the relationship between the image content itself. Hence, the smooth areas in the cover image will inevitably be contaminated after hiding even at a low embedding rate, thereb...
Image sharing is a technique that is used to protect the security of a secret image by placing it into shadows. In this paper, we propose a new image sharing scheme based on the quadri-directional search strategy with meaningful shadows. In the proposed scheme, a modulus reference table is generated and used to share different sizes of the secret i...
In this paper, we propose an algorithm for hiding (DNA Deoxyribonucleic acid) sequence in H.264/AVC video. The DNA sequence is first encrypted by a rule before hiding, and then we embed encrypted DNA sequence into the quantized discrete cosine transform (QDCT) coefficients of the 4x4 macroblocks (MBs) of Intra-frames (I-frames). To avert the distor...
Image authentication technique protects the integrity of images. Many image authentication schemes have been proposed in recent years. However, in these schemes, the image is permanently distorted and cannot be recovered to its original version after image authentication. In this paper, we propose a new, reversible watermarking scheme for image aut...
Reversible data hiding is a technique that allows embedding additional data into encrypted images without knowing the content of the original image. The additional embedded data can be extracted exactly and the encrypted image can be reconstructed precisely to its original version. In this paper, a novel, reversible data hiding technique is propose...
This paper presents a novel, reversible, data hiding and compression scheme that hides secret data into an SMVQ-compressed image and obtains reversibility of the reconstructed SMVQ indices. The SMVQ indices are divided into index block sized , and four indices in each index-block are processed simultaneously. Fifteen types and four cases are define...
Data hiding is a technique for sending secret information under the cover of the digital media. It is usually used to protect privacy and sensitive information when such information is transmitted via a public network. To date, high capacity remains one of the most important research aspects of data hiding. In this study, a new, turtle shell-based...
Data hiding, also known as information hiding, plays an important role in information security for various purposes. Reversible data hiding is a technique that allows distortion-free recovery of both the cover image and the secret information. In this paper, we propose a new, reversible data hiding scheme that is based on the Sudoku technique and c...
Data hiding techniques, which are classified into two groups: irreversible and reversible techniques, have been gained more and more attention recently. In which, reversible data hiding (RDH) is paid more attention since it is capable to recover original host images after revealing the secret data. However, there always is tradeoff between embeddin...
Data hiding is a technique by which secret data can be delivered securely by embedding it into a cover multimedia document. In this paper, a high capacity data hiding scheme based on block classification is proposed for binary images. In the proposed scheme, the block classification process determines complex regions in the image used for embedding...
In recent years, many researchers have studied reversible watermarking techniques for relational databases. Most of the developed schemes have been based on a primary key attribute in order to determine the selected tuples and attributes to carry the watermark bits. What happens, however, when the primary key attribute does not exist for a relation...
Reversible data hiding is a method that can guarantee that the cover image can be reconstructed correctly after the secret message has been extracted. Recently, some reversible data hiding schemes have concentrated on the VQ compression domain. In this paper, we present a new reversible data hiding scheme based on VQ and SMVQ techniques to enhance...
In this paper, a robust watermarking scheme is proposed that uses the scale-invariant feature transform (SIFT) algorithm in the discrete wavelet transform (DWT) domain. First, the SIFT feature areas are extracted from the original image. Then, one level DWT is applied on the selected SIFT feature areas. The watermark is embedded by modifying the fr...
Reversible data hiding is a technique that not only protects the hidden secrets but also recovers the cover media without any distortion after the secret data have been extracted. In this paper, a new reversible data hiding technique for VQ indices which are compressed streams based on the mapping function and histogram analysis of transformed VQ i...
Distortion-free data embedding enables a cover image to be recovered from its stego-image without any distortion after the secret data have been extracted. This distortion-free property allows the appropriate recovery of highly sensitive images for which even the smallest modification of the cover images cannot be allowed. In this paper, a new dist...
Reversible data hiding is a technique for recovering original images without any distortion after secret data are extracted from the image. The technique continues to attract attention from many researchers. In this paper, we introduce a new reversible data hiding scheme based on the adjacent index differences of vector quantization (VQ) indices. T...
Lossless data hiding recovers original images precisely after secret data are extracted. Therefore, it has received considerable attention among researchers. This paper offers an adaptive lossless data hiding scheme that is based on the search-order coding (SOC) algorithm for side match vector quantization (SMVQ) compressed images. By combining SOC...
This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used...
Reversible data hiding is a technique that can restore the original cover image without any distortion after the embedded secret message is extracted. In this paper, a novel reversible data hiding method is proposed in the spatial domain. The proposed scheme is based on a local complexity function to classify a cover image block into the smooth blo...
Recently, some image compression techniques have been proposed to obtain
better compression rates and thus decrease data storage requirements and improve
communications costs. In this paper, we propose a novel lossless image compression
scheme that combines side match vector quantization (SMVQ) and the Huffman coding
algorithm to further improv...
Reversible data hiding can restore the original image from the stego image without any distortion after the embedded secret message is exactly extracted. In this paper, a novel, reversible, data hiding scheme for high quality images is proposed in spatial domain. To increase embedding capacity and enhance image quality, the proposed scheme classifi...
Reversible data hiding is a special algorithm that not only guarantees the confidential data will be extracted accurately but also allows the original cover image to be reconstructed without distortion after the confidential data are completely extracted. This paper proposes a new index compression and reversible data hiding scheme based on side-ma...
Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust water...
Data hiding is designed to solve the problem of secure information exchange through public networks such as Internet. In this paper, we present an improved reversible data hiding scheme that can recover original VQ indices after data extraction. As with Chang et al.’s scheme, our proposed scheme also depends on the locally adaptive coding scheme. H...