[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Maganbhai et al., 2015 - Google Patents

A study and literature review on image steganography

Maganbhai et al., 2015

View PDF
Document ID
13918305156347807535
Author
Maganbhai P
Chouhan K
Publication year
Publication venue
International Journal of Computer Science and Information Technologies

External Links

Snippet

In the present age, the exploration of digital multimedia content has lead to it being utilized as a medium of safe and secure communication. The art of secret communication by a secret medium like images is known as steganography as the rival method of detecting the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation

Similar Documents

Publication Publication Date Title
Mandal Modern Steganographic technique: A survey
Mahajan et al. Adaptive steganography: a survey of recent statistical aware steganography techniques
Mstafa et al. Information hiding in images using steganography techniques
Maganbhai et al. A study and literature review on image steganography
Vasudev A review on digital image watermarking and its techniques
Goyal et al. Improved detection of 1-2-4 lsb steganography and rsa cryptography in color and grayscale images
Kukreja et al. Copyright protection scheme for color images using extended visual cryptography
Singh Survey paper on steganography
Chugh Image steganography techniques: A review article
Khan et al. High payload watermarking based on enhanced image saliency detection
Jain et al. Review on Digital Watermarking Techniques and Its Retrieval
Ling et al. Watermarking for image authentication
Surekha et al. A watermarking technique based on visual cryptography
Reza et al. An approach of digital image copyright protection by using watermarking technology
Mohammed et al. Digital image watermarking, analysis of current methods
Singh et al. A recent survey of DCT based digital image watermarking theories and techniques: a review
Yasmeen et al. An efficient image steganography approach based on QR factorization and singular value decomposition in non‐subsampled contourlet transform domain
Santhi et al. A survey on medical image protection using various steganography techniques
Bhatnagar et al. Encryption based robust watermarking in fractional wavelet domain
Kaur et al. Steganography using RSA algorithm
Manujala et al. Embedding multiple images in a single image using Bit Plane Complexity Segmentation (BPCS) steganography
Khalid et al. A Comprehensive Analysis Of Image Steganography And Its Techniques
Nachappa et al. Image Steganography Applications for Secure Communications
Agarwal et al. A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis
Jain An Extensive Survey on Image Steganography