[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kumar et al., 2010 - Google Patents

Feature based steganalysis using wavelet decomposition and magnitude statistics

Kumar et al., 2010

View PDF
Document ID
468007120430562020
Author
Kumar G
Jithin R
Shankar D
Publication year
Publication venue
2010 International Conference on Advances in Computer Engineering

External Links

Snippet

Steganography is broadly used to embed information in high resolution images, since it can contain adequate information within the small portion of cover image. Steganalysis is the procedure of finding the occurrence of hidden message in an image. This paper compares …
Continue reading at people.cse.nitc.ac.in (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10024Color image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image

Similar Documents

Publication Publication Date Title
Su et al. Robust color image watermarking technique in the spatial domain
Rocha et al. Vision of the unseen: Current trends and challenges in digital image and video forensics
Ouyang et al. Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform
Atta et al. A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set
Singh et al. A secure and robust block based DWT-SVD image watermarking approach
Hamid et al. Characteristic region based image steganography using speeded-up robust features technique
Wandji et al. Detection of copy-move forgery in digital images based on DCT
Nilizadeh et al. Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
Sharmila et al. Efficient Adaptive Steganography for color images based on LSBMR algorithm
Hadmi et al. A robust and secure perceptual hashing system based on a quantization step analysis
Kumar et al. Feature based steganalysis using wavelet decomposition and magnitude statistics
Zhao et al. Steganalysis for palette-based images using generalized difference image and color correlogram
Elbasi Enhancing the robustness of watermarked medical images using heuristic search algorithm
Fouroozesh et al. Image steganography based on LSBMR using sobel edge detection
Ouyang et al. A semi-fragile reversible watermarking method based on qdft and tamper ranking
Laskar et al. A review on image steganalysis techniques for attacking steganography
Tyagi et al. High capacity image steganography based on pixel value differencing and pixel value sum
Zhang et al. Detection of LSB Matching Steganography using the Envelope of Histogram.
Kaur et al. Image steganography using discrete wavelet transformation and artificial bee colony optimization
Liu et al. Wavelet‐Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity
Elahian et al. Improved robust DWT-watermarking in YCbCr color space
Kaur et al. A new LSB embedding for 24-bit pixel using multi-layered bitwise XOR
Pan et al. Chi-square detection for PVD steganography
Boujemaa et al. Fragile watermarking of medical image for content authentication and security
Namratha et al. Multi image watermarking using Lagrangian support vector regression