[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nachappa et al. - Google Patents

Image Steganography Applications for Secure Communications

Nachappa et al.

View PDF
Document ID
6496141316275305543
Author
Nachappa M
RP V

External Links

Snippet

In the present age, the exploration of digital multimedia content has lead to it being utilized as a medium of safe and secure communication. The art of secret communication by a secret medium like images is known as steganography as the rival method of detecting the …
Continue reading at ijiset.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
Rinki et al. A novel matrix multiplication based LSB substitution mechanism for data security and authentication
Bhatt et al. Image steganography and visible watermarking using LSB extraction technique
Abdullah et al. Secure data transfer over internet using image steganography
Maganbhai et al. A study and literature review on image steganography
Kukreja et al. Copyright protection scheme for color images using extended visual cryptography
Şahin et al. Review of the Literature on the Steganography Concept
Ajili et al. Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image
Kukreja et al. Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography
Roy et al. Image realization steganography with LCS based mapping
Chugh Image steganography techniques: A review article
Ling et al. Watermarking for image authentication
Srikanth et al. Advanced Data Security Using Modulo Operator And LSB Method
Nachappa et al. Image Steganography Applications for Secure Communications
Agarwal et al. Selective bin model for reversible data hiding in encrypted images
Yasmeen et al. An efficient image steganography approach based on QR factorization and singular value decomposition in non‐subsampled contourlet transform domain
Sharma et al. Secure data hiding scheme using firefly algorithm with hidden compression
Yadav et al. A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model
Bhatnagar et al. Encryption based robust watermarking in fractional wavelet domain
Alarood Improve the efficiency for embedding in LSB method based digital image watermarking
Khalid et al. A Comprehensive Analysis Of Image Steganography And Its Techniques
Ediriweera et al. Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography
Maram A Framework for Encryption and Decryption Using Image Steganography
Gaur et al. A survey on image encryption and decryption using blowfish & watermarking
Patil et al. A Study of The Performance of Various Media for Information Security Via LSB Steganography Method for Text Messaging
Sarayreh Text Hiding in RGBA Images Using the Alpha Channel and the Indicator Method