[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yang et al., 2019 - Google Patents

Locating Steganalysis of LSB Matching Based on Spatial and Wavelet Filter Fusion.

Yang et al., 2019

Document ID
6889695372154981636
Author
Yang C
Wang J
Lin C
Chen H
Wang W
Publication year
Publication venue
Computers, Materials & Continua

External Links

Snippet

For the case of that only a single stego image of LSB (Least Significant Bit) matching steganography is available, the existing steganalysis algorithms cannot effectively locate the modified pixels. Therefore, an algorithm is proposed to locate the modified pixels of LSB …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis

Similar Documents

Publication Publication Date Title
Mahmood et al. A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform
Chanu et al. Image steganography and steganalysis: A survey
Tsai et al. DCT and DWT-based image watermarking by using subsampling
Andriotis et al. JPEG steganography detection with Benford's Law
Zong et al. Blind image steganalysis based on wavelet coefficient correlation
Jain et al. A reliable SVD based watermarking schem
Lu et al. Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
CN110211020B (en) Image watermark embedding and extraction method based on SWT-DFT
Radharani et al. Multiple watermarking scheme for image authentication and copyright protection using wavelet based texture properties and visual cryptography
Shen et al. A robust associative watermarking technique based on vector quantization
CN102930498B (en) A kind of digital watermark embedding based on Lifting Wavelet and extracting method
Yang et al. Locating Steganalysis of LSB Matching Based on Spatial and Wavelet Filter Fusion.
Hazim et al. A Novel Method of Invisible Video Watermarking Based on Index Mapping and Hybrid DWT-DCT.
Thanki et al. Sparse watermarking technique for improving security of biometric system
Cao et al. A zero-watermarking algorithm based on DWT and chaotic modulation
Surekha et al. A semi-blind image watermarking based on discrete wavelet transform and secret sharing
Lakshmi A novel steganalytic algorithm based on III level DWT with energy as feature
Jiang et al. Watermarking relational databases for ownership protection based on DWT
Li et al. A novel fingerprinting algorithm with blind detection in DCT domain for images
Li et al. An intelligent watermark detection decoder based on independent component analysis
Shukla et al. Video watermarking using dyadic filter and discrete wavelet transform
Tianchi et al. A multiple audio watermarking algorithm based on shear resisting DWT and LSB
Singh et al. Design and Analysis of BFO-PBFO based Optimized Watermarking Algorithm for Medical Images
Wang et al. Detection of shifted double JPEG compression by an adaptive DCT coefficient model
Xiao et al. Perceptual digital watermark of images using ridgelet transform