Nachappa et al. - Google Patents
Image Steganography Applications for Secure CommunicationsNachappa et al.
View PDF- Document ID
- 6496141316275305543
- Author
- Nachappa M
- RP V
External Links
Snippet
In the present age, the exploration of digital multimedia content has lead to it being utilized as a medium of safe and secure communication. The art of secret communication by a secret medium like images is known as steganography as the rival method of detecting the …
- 238000004891 communication 0 abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rinki et al. | A novel matrix multiplication based LSB substitution mechanism for data security and authentication | |
Bhatt et al. | Image steganography and visible watermarking using LSB extraction technique | |
Abdullah et al. | Secure data transfer over internet using image steganography | |
Maganbhai et al. | A study and literature review on image steganography | |
Kukreja et al. | Copyright protection scheme for color images using extended visual cryptography | |
Şahin et al. | Review of the Literature on the Steganography Concept | |
Ajili et al. | Crypto‐Watermarking Algorithm Using Weber’s Law and AES: A View to Transfer Safe Medical Image | |
Kukreja et al. | Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography | |
Roy et al. | Image realization steganography with LCS based mapping | |
Chugh | Image steganography techniques: A review article | |
Ling et al. | Watermarking for image authentication | |
Srikanth et al. | Advanced Data Security Using Modulo Operator And LSB Method | |
Nachappa et al. | Image Steganography Applications for Secure Communications | |
Agarwal et al. | Selective bin model for reversible data hiding in encrypted images | |
Yasmeen et al. | An efficient image steganography approach based on QR factorization and singular value decomposition in non‐subsampled contourlet transform domain | |
Sharma et al. | Secure data hiding scheme using firefly algorithm with hidden compression | |
Yadav et al. | A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model | |
Bhatnagar et al. | Encryption based robust watermarking in fractional wavelet domain | |
Alarood | Improve the efficiency for embedding in LSB method based digital image watermarking | |
Khalid et al. | A Comprehensive Analysis Of Image Steganography And Its Techniques | |
Ediriweera et al. | Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography | |
Maram | A Framework for Encryption and Decryption Using Image Steganography | |
Gaur et al. | A survey on image encryption and decryption using blowfish & watermarking | |
Patil et al. | A Study of The Performance of Various Media for Information Security Via LSB Steganography Method for Text Messaging | |
Sarayreh | Text Hiding in RGBA Images Using the Alpha Channel and the Indicator Method |