[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Aziz et al., 2015 - Google Patents

A cycling chaos-based cryptic-free algorithm for image steganography

Aziz et al., 2015

View PDF
Document ID
9916872082300679232
Author
Aziz M
Tayarani-N M
Afsar M
Publication year
Publication venue
Nonlinear Dynamics

External Links

Snippet

In recent years, chaotic systems have surfaced to become an important field in steganographic matters. In this paper, we present a simple cryptic-free least significant bits spatial-domain-based steganographic technique that embeds information (a color or a …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals

Similar Documents

Publication Publication Date Title
Aziz et al. A cycling chaos-based cryptic-free algorithm for image steganography
Denis et al. Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems
Chai et al. Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud
Jiang et al. LSB based quantum image steganography algorithm
Wu et al. Image encryption using the two-dimensional logistic chaotic map
Loukhaoukha et al. A secure image encryption algorithm based on Rubik′ s cube principle
Liu et al. Quantum image encryption using intra and inter bit permutation based on logistic map
Yang et al. Novel image encryption/decryption based on quantum Fourier transform and double phase encoding
Swain High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis
Sharif et al. A novel method for digital image steganography based on a new three-dimensional chaotic map
Lee et al. A novel data hiding scheme based on modulus function
Liu et al. Data hiding based on extended turtle shell matrix construction method
Rashmi et al. [Retracted] Enhanced Lorenz‐Chaotic Encryption Method for Partial Medical Image Encryption and Data Hiding in Big Data Healthcare
Jaradat et al. A High‐Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization
Wang et al. A novel encryption algorithm based on DWT and multichaos mapping
Shivani Multi secret sharing with unexpanded meaningful shares
Shivani et al. VPVC: verifiable progressive visual cryptography
Şahin et al. A novel quantum steganography algorithm based on LSBq for multi-wavelength quantum images
Akhtar An LSB substitution with bit inversion steganography method
Blesswin et al. RETRACTED ARTICLE: Enhanced semantic visual secret sharing scheme for the secure image communication
Liang et al. Color image encryption combining a reality-preserving fractional DCT with chaotic mapping in HSI space
Zhang et al. Image Encryption Scheme Based on Balanced Two‐Dimensional Cellular Automata
Kukharska et al. The steganographic approach to data protection using arnold algorithm and the pixel-value differencing method
Li et al. Retracing extended sudoku matrix for high-capacity image steganography
Tong et al. Nonlinear Multi‐Image Encryption Scheme with the Reality‐Preserving Discrete Fractional Angular Transform and DNA Sequences