[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Akhtar, 2016 - Google Patents

An LSB substitution with bit inversion steganography method

Akhtar, 2016

Document ID
9919525646352537633
Author
Akhtar N
Publication year
Publication venue
Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 1

External Links

Snippet

Several works have been proposed and implemented for image Steganography using LSB substitution. In this paper, a module based LSB substitution method is implemented, which is further improved by using a novel bit inversion technique. The substitution method hides the …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Akhtar An LSB substitution with bit inversion steganography method
Aziz et al. A cycling chaos-based cryptic-free algorithm for image steganography
Wu et al. A novel LSB data hiding scheme with the lowest distortion
Parah et al. A secure and robust information hiding technique for covert communication
Bahrami et al. Image encryption using a lightweight stream encryption algorithm
Tang et al. Error-free reversible data hiding with high capacity in encrypted image
Thanikaiselvan et al. A graph theory practice on transformed image: A random image steganography
Rani et al. Multilevel multimedia security by integrating visual cryptography and steganography techniques
Zou et al. Coverless video steganography based on inter frame combination
Rahim et al. Tiny encryption algorithm and pixel value differencing for enhancement security message
Li et al. Meaningful image encryption based on reversible data hiding in compressive sensing domain
Jung et al. Three-directional data hiding method for digital images
Singh et al. Comparative analysis for steganographic LSB variants
Banerjee et al. A secure high-capacity video steganography using bit plane slicing through (7, 4) hamming code
Krishnagopal et al. Image encryption and steganography using chaotic maps with a double key protection
Dash et al. Secured image transmission through region-based steganography using chaotic encryption
Das et al. A Comparative study of reversible video watermarking using automatic threshold adjuster and non-feedback-based DE method
Akhtar An efficient lossless modulus function based data hiding method
Roy et al. Block Steganography Based Secure Key Encryption to Improve Data Security
Gupta et al. A hybrid technique for spatial image steganography
Chaudhary A novel image encryption method based on LSB technique and AES algorithm
Kim et al. Steganography based on grayscale images using (5, 3) hamming code
Ghosh et al. Adaptive multi-bit image steganography using pixel-pair differential approach
Nikam et al. Extended Fibonacci Series for selection of carrier samples in data hiding and extraction
Joshi et al. Current Trends in Cryptography, Steganography, and Metamorphic Cryptography: A Survey