Aziz et al., 2015 - Google Patents
A cycling chaos-based cryptic-free algorithm for image steganographyAziz et al., 2015
View PDF- Document ID
- 9916872082300679232
- Author
- Aziz M
- Tayarani-N M
- Afsar M
- Publication year
- Publication venue
- Nonlinear Dynamics
External Links
Snippet
In recent years, chaotic systems have surfaced to become an important field in steganographic matters. In this paper, we present a simple cryptic-free least significant bits spatial-domain-based steganographic technique that embeds information (a color or a …
- 230000001351 cycling 0 title abstract description 67
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aziz et al. | A cycling chaos-based cryptic-free algorithm for image steganography | |
Denis et al. | Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems | |
Wu et al. | Image encryption using the two-dimensional logistic chaotic map | |
Jiang et al. | LSB based quantum image steganography algorithm | |
Loukhaoukha et al. | A secure image encryption algorithm based on Rubik′ s cube principle | |
Gong et al. | Quantum image encryption algorithm based on quantum image XOR operations | |
Liu et al. | Quantum image encryption using intra and inter bit permutation based on logistic map | |
Sharif et al. | A novel method for digital image steganography based on a new three-dimensional chaotic map | |
Lee et al. | A novel data hiding scheme based on modulus function | |
Parah et al. | A secure and robust information hiding technique for covert communication | |
Rashmi et al. | [Retracted] Enhanced Lorenz‐Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare | |
Liu et al. | Data hiding based on extended turtle shell matrix construction method | |
Shifa et al. | Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering | |
Jaradat et al. | A High‐Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization | |
Wang et al. | A novel encryption algorithm based on DWT and multichaos mapping | |
Shivani | Multi secret sharing with unexpanded meaningful shares | |
Şahin et al. | A novel quantum steganography algorithm based on LSBq for multi-wavelength quantum images | |
Gao et al. | High-performance reversible data hiding in encrypted images with adaptive Huffman code | |
Zhang et al. | Image Encryption Scheme Based on Balanced Two‐Dimensional Cellular Automata | |
Kukharska et al. | The steganographic approach to data protection using arnold algorithm and the pixel-value differencing method | |
Chen et al. | Reversible data hiding based on three shadow images using rhombus magic matrix | |
Tong et al. | Nonlinear Multi‐Image Encryption Scheme with the Reality‐Preserving Discrete Fractional Angular Transform and DNA Sequences | |
Koppanati et al. | SMALL: secure multimedia technique using logistic and LFSR | |
Khan et al. | A novel combination of information confidentiality and data hiding mechanism | |
Nazari et al. | A novel image steganography scheme based on morphological associative memory and permutation schema |