[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Karim et al., 2022 - Google Patents

A Binary Pattern Based Secure Data Hiding in Digital Images

Karim et al., 2022

View PDF
Document ID
5868461056105791998
Author
Karim M
Khan S
Publication year
Publication venue
Pakistan Journal of Engineering and Technology

External Links

Snippet

Abstract Information security is one of the most challenging tasks in the recent era of advanced technologies and communication. It is important to ensure the secure exchange of confidential data. Data hiding techniques have a key role in ensuring security. The proposed …
Continue reading at journals.uol.edu.pk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Similar Documents

Publication Publication Date Title
Parah et al. Information hiding in edges: A high capacity information hiding technique using hybrid edge detection
Pradhan et al. Digital image steganography using LSB substitution, PVD, and EMD
Kumar et al. Performance analysis of spatial domain digital watermarking techniques
Kim et al. Data‐Hiding Scheme Using Multidirectional Pixel‐Value Differencing on Colour Images
Begum et al. Implementation of secured and robust DFT-based image watermark through hybridization with decomposition algorithm
Tagesse Takore et al. A robust and oblivious grayscale image watermarking scheme based on edge detection, SVD, and GA
Laskar et al. A review on image steganalysis techniques for attacking steganography
Araghi Digital image watermarking and performance analysis of histogram modification based methods
Kumar et al. Developing a secure image steganographic system using TPVD adaptive LSB matching revisited algorithm for maximizing the embedding rate
Qian et al. A comparative review of steganalysis techniques
Shashidhar et al. Novel Approach for Steganography to Camouflage Digital Information Using Least Significant Bit
Karim et al. A Binary Pattern Based Secure Data Hiding in Digital Images
Sharma et al. Digital video watermarking: features, techniques, and challenges
Mohammed et al. A Hybrid Watermarking Scheme Based on Arnold Cat Map Against Lossy JPEG Compression
Ishizuka et al. A zero-watermarking-like steganography and potential applications
Subramanian et al. A framework of secured embedding scheme using vector discrete wavelet transformation and lagrange interpolation
Haque Singular value decomposition and discrete cosine transform based image watermarking
Obaid Information hiding techniques for steganography and digital watermarking
Al-Refai et al. Secure data hiding technique using batch video steganography
Shady et al. Local features-based watermarking for image security in social media
Kaur et al. An efficient adaptive data hiding scheme for image steganography
Desai et al. A survey on intelligent security techniques for high-definition multimedia data
Rashmi et al. Robust multiple composite watermarking using LSB technique
Chhajed et al. Secure Data Hiding in Binary Images Using Run-Length Pairs
Wang et al. An improved sample projection approach for image watermarking