Karim et al., 2022 - Google Patents
A Binary Pattern Based Secure Data Hiding in Digital ImagesKarim et al., 2022
View PDF- Document ID
- 5868461056105791998
- Author
- Karim M
- Khan S
- Publication year
- Publication venue
- Pakistan Journal of Engineering and Technology
External Links
Snippet
Abstract Information security is one of the most challenging tasks in the recent era of advanced technologies and communication. It is important to ensure the secure exchange of confidential data. Data hiding techniques have a key role in ensuring security. The proposed …
- 238000000034 method 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Parah et al. | Information hiding in edges: A high capacity information hiding technique using hybrid edge detection | |
Pradhan et al. | Digital image steganography using LSB substitution, PVD, and EMD | |
Kumar et al. | Performance analysis of spatial domain digital watermarking techniques | |
Kim et al. | Data‐Hiding Scheme Using Multidirectional Pixel‐Value Differencing on Colour Images | |
Begum et al. | Implementation of secured and robust DFT-based image watermark through hybridization with decomposition algorithm | |
Tagesse Takore et al. | A robust and oblivious grayscale image watermarking scheme based on edge detection, SVD, and GA | |
Laskar et al. | A review on image steganalysis techniques for attacking steganography | |
Araghi | Digital image watermarking and performance analysis of histogram modification based methods | |
Kumar et al. | Developing a secure image steganographic system using TPVD adaptive LSB matching revisited algorithm for maximizing the embedding rate | |
Qian et al. | A comparative review of steganalysis techniques | |
Shashidhar et al. | Novel Approach for Steganography to Camouflage Digital Information Using Least Significant Bit | |
Karim et al. | A Binary Pattern Based Secure Data Hiding in Digital Images | |
Sharma et al. | Digital video watermarking: features, techniques, and challenges | |
Mohammed et al. | A Hybrid Watermarking Scheme Based on Arnold Cat Map Against Lossy JPEG Compression | |
Ishizuka et al. | A zero-watermarking-like steganography and potential applications | |
Subramanian et al. | A framework of secured embedding scheme using vector discrete wavelet transformation and lagrange interpolation | |
Haque | Singular value decomposition and discrete cosine transform based image watermarking | |
Obaid | Information hiding techniques for steganography and digital watermarking | |
Al-Refai et al. | Secure data hiding technique using batch video steganography | |
Shady et al. | Local features-based watermarking for image security in social media | |
Kaur et al. | An efficient adaptive data hiding scheme for image steganography | |
Desai et al. | A survey on intelligent security techniques for high-definition multimedia data | |
Rashmi et al. | Robust multiple composite watermarking using LSB technique | |
Chhajed et al. | Secure Data Hiding in Binary Images Using Run-Length Pairs | |
Wang et al. | An improved sample projection approach for image watermarking |