Akhtar, 2016 - Google Patents
An LSB substitution with bit inversion steganography methodAkhtar, 2016
- Document ID
- 9919525646352537633
- Author
- Akhtar N
- Publication year
- Publication venue
- Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 1
External Links
Snippet
Several works have been proposed and implemented for image Steganography using LSB substitution. In this paper, a module based LSB substitution method is implemented, which is further improved by using a novel bit inversion technique. The substitution method hides the …
- 238000006467 substitution reaction 0 title abstract description 12
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Akhtar | An LSB substitution with bit inversion steganography method | |
Aziz et al. | A cycling chaos-based cryptic-free algorithm for image steganography | |
Wu et al. | A novel LSB data hiding scheme with the lowest distortion | |
Parah et al. | A secure and robust information hiding technique for covert communication | |
Bahrami et al. | Image encryption using a lightweight stream encryption algorithm | |
Tang et al. | Error-free reversible data hiding with high capacity in encrypted image | |
Thanikaiselvan et al. | A graph theory practice on transformed image: A random image steganography | |
Rani et al. | Multilevel multimedia security by integrating visual cryptography and steganography techniques | |
Zou et al. | Coverless video steganography based on inter frame combination | |
Rahim et al. | Tiny encryption algorithm and pixel value differencing for enhancement security message | |
Li et al. | Meaningful image encryption based on reversible data hiding in compressive sensing domain | |
Jung et al. | Three-directional data hiding method for digital images | |
Singh et al. | Comparative analysis for steganographic LSB variants | |
Banerjee et al. | A secure high-capacity video steganography using bit plane slicing through (7, 4) hamming code | |
Krishnagopal et al. | Image encryption and steganography using chaotic maps with a double key protection | |
Dash et al. | Secured image transmission through region-based steganography using chaotic encryption | |
Das et al. | A Comparative study of reversible video watermarking using automatic threshold adjuster and non-feedback-based DE method | |
Akhtar | An efficient lossless modulus function based data hiding method | |
Roy et al. | Block Steganography Based Secure Key Encryption to Improve Data Security | |
Gupta et al. | A hybrid technique for spatial image steganography | |
Chaudhary | A novel image encryption method based on LSB technique and AES algorithm | |
Kim et al. | Steganography based on grayscale images using (5, 3) hamming code | |
Ghosh et al. | Adaptive multi-bit image steganography using pixel-pair differential approach | |
Nikam et al. | Extended Fibonacci Series for selection of carrier samples in data hiding and extraction | |
Joshi et al. | Current Trends in Cryptography, Steganography, and Metamorphic Cryptography: A Survey |