Maganbhai et al., 2015 - Google Patents
A study and literature review on image steganographyMaganbhai et al., 2015
View PDF- Document ID
- 13918305156347807535
- Author
- Maganbhai P
- Chouhan K
- Publication year
- Publication venue
- International Journal of Computer Science and Information Technologies
External Links
Snippet
In the present age, the exploration of digital multimedia content has lead to it being utilized as a medium of safe and secure communication. The art of secret communication by a secret medium like images is known as steganography as the rival method of detecting the …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mandal | Modern Steganographic technique: A survey | |
Mahajan et al. | Adaptive steganography: a survey of recent statistical aware steganography techniques | |
Mstafa et al. | Information hiding in images using steganography techniques | |
Maganbhai et al. | A study and literature review on image steganography | |
Vasudev | A review on digital image watermarking and its techniques | |
Goyal et al. | Improved detection of 1-2-4 lsb steganography and rsa cryptography in color and grayscale images | |
Kukreja et al. | Copyright protection scheme for color images using extended visual cryptography | |
Singh | Survey paper on steganography | |
Chugh | Image steganography techniques: A review article | |
Khan et al. | High payload watermarking based on enhanced image saliency detection | |
Jain et al. | Review on Digital Watermarking Techniques and Its Retrieval | |
Ling et al. | Watermarking for image authentication | |
Surekha et al. | A watermarking technique based on visual cryptography | |
Reza et al. | An approach of digital image copyright protection by using watermarking technology | |
Mohammed et al. | Digital image watermarking, analysis of current methods | |
Singh et al. | A recent survey of DCT based digital image watermarking theories and techniques: a review | |
Yasmeen et al. | An efficient image steganography approach based on QR factorization and singular value decomposition in non‐subsampled contourlet transform domain | |
Santhi et al. | A survey on medical image protection using various steganography techniques | |
Bhatnagar et al. | Encryption based robust watermarking in fractional wavelet domain | |
Kaur et al. | Steganography using RSA algorithm | |
Manujala et al. | Embedding multiple images in a single image using Bit Plane Complexity Segmentation (BPCS) steganography | |
Khalid et al. | A Comprehensive Analysis Of Image Steganography And Its Techniques | |
Nachappa et al. | Image Steganography Applications for Secure Communications | |
Agarwal et al. | A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis | |
Jain | An Extensive Survey on Image Steganography |