Kumar et al., 2010 - Google Patents
Feature based steganalysis using wavelet decomposition and magnitude statisticsKumar et al., 2010
View PDF- Document ID
- 468007120430562020
- Author
- Kumar G
- Jithin R
- Shankar D
- Publication year
- Publication venue
- 2010 International Conference on Advances in Computer Engineering
External Links
Snippet
Steganography is broadly used to embed information in high resolution images, since it can contain adequate information within the small portion of cover image. Steganalysis is the procedure of finding the occurrence of hidden message in an image. This paper compares …
- 238000000354 decomposition reaction 0 title abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/10—Image acquisition modality
- G06T2207/10024—Color image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Su et al. | Robust color image watermarking technique in the spatial domain | |
Rocha et al. | Vision of the unseen: Current trends and challenges in digital image and video forensics | |
Ouyang et al. | Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform | |
Atta et al. | A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set | |
Singh et al. | A secure and robust block based DWT-SVD image watermarking approach | |
Hamid et al. | Characteristic region based image steganography using speeded-up robust features technique | |
Wandji et al. | Detection of copy-move forgery in digital images based on DCT | |
Nilizadeh et al. | Information Hiding in RGB Images Using an Improved Matrix Pattern Approach. | |
Sharmila et al. | Efficient Adaptive Steganography for color images based on LSBMR algorithm | |
Hadmi et al. | A robust and secure perceptual hashing system based on a quantization step analysis | |
Kumar et al. | Feature based steganalysis using wavelet decomposition and magnitude statistics | |
Zhao et al. | Steganalysis for palette-based images using generalized difference image and color correlogram | |
Elbasi | Enhancing the robustness of watermarked medical images using heuristic search algorithm | |
Fouroozesh et al. | Image steganography based on LSBMR using sobel edge detection | |
Ouyang et al. | A semi-fragile reversible watermarking method based on qdft and tamper ranking | |
Laskar et al. | A review on image steganalysis techniques for attacking steganography | |
Tyagi et al. | High capacity image steganography based on pixel value differencing and pixel value sum | |
Zhang et al. | Detection of LSB Matching Steganography using the Envelope of Histogram. | |
Kaur et al. | Image steganography using discrete wavelet transformation and artificial bee colony optimization | |
Liu et al. | Wavelet‐Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity | |
Elahian et al. | Improved robust DWT-watermarking in YCbCr color space | |
Kaur et al. | A new LSB embedding for 24-bit pixel using multi-layered bitwise XOR | |
Pan et al. | Chi-square detection for PVD steganography | |
Boujemaa et al. | Fragile watermarking of medical image for content authentication and security | |
Namratha et al. | Multi image watermarking using Lagrangian support vector regression |