[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Aziz et al., 2015 - Google Patents

A cycling chaos-based cryptic-free algorithm for image steganography

Aziz et al., 2015

View PDF
Document ID
9916872082300679232
Author
Aziz M
Tayarani-N M
Afsar M
Publication year
Publication venue
Nonlinear Dynamics

External Links

Snippet

In recent years, chaotic systems have surfaced to become an important field in steganographic matters. In this paper, we present a simple cryptic-free least significant bits spatial-domain-based steganographic technique that embeds information (a color or a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals

Similar Documents

Publication Publication Date Title
Aziz et al. A cycling chaos-based cryptic-free algorithm for image steganography
Denis et al. Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems
Wu et al. Image encryption using the two-dimensional logistic chaotic map
Jiang et al. LSB based quantum image steganography algorithm
Loukhaoukha et al. A secure image encryption algorithm based on Rubik′ s cube principle
Gong et al. Quantum image encryption algorithm based on quantum image XOR operations
Liu et al. Quantum image encryption using intra and inter bit permutation based on logistic map
Sharif et al. A novel method for digital image steganography based on a new three-dimensional chaotic map
Lee et al. A novel data hiding scheme based on modulus function
Parah et al. A secure and robust information hiding technique for covert communication
Rashmi et al. [Retracted] Enhanced Lorenz‐Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
Liu et al. Data hiding based on extended turtle shell matrix construction method
Shifa et al. Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering
Jaradat et al. A High‐Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization
Wang et al. A novel encryption algorithm based on DWT and multichaos mapping
Shivani Multi secret sharing with unexpanded meaningful shares
Şahin et al. A novel quantum steganography algorithm based on LSBq for multi-wavelength quantum images
Gao et al. High-performance reversible data hiding in encrypted images with adaptive Huffman code
Zhang et al. Image Encryption Scheme Based on Balanced Two‐Dimensional Cellular Automata
Kukharska et al. The steganographic approach to data protection using arnold algorithm and the pixel-value differencing method
Chen et al. Reversible data hiding based on three shadow images using rhombus magic matrix
Tong et al. Nonlinear Multi‐Image Encryption Scheme with the Reality‐Preserving Discrete Fractional Angular Transform and DNA Sequences
Koppanati et al. SMALL: secure multimedia technique using logistic and LFSR
Khan et al. A novel combination of information confidentiality and data hiding mechanism
Nazari et al. A novel image steganography scheme based on morphological associative memory and permutation schema