Hassanein, 2014 - Google Patents
Secure digital documents using Steganography and QR CodeHassanein, 2014
View PDF- Document ID
- 14941661546872281726
- Author
- Hassanein M
- Publication year
External Links
Snippet
With the increasing use of the Internet several problems have arisen regarding the processing of electronic documents. These include content filtering, content retrieval/search. Moreover, document security has taken a centre stage including copyright protection …
- 238000000034 method 0 abstract description 191
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Douglas et al. | An overview of steganography techniques applied to the protection of biometric data | |
Katzenbeisser et al. | Information hiding | |
Abdulla | Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography | |
Cheddad et al. | Digital image steganography: Survey and analysis of current methods | |
US6473516B1 (en) | Large capacity steganography | |
Han et al. | Content-based image authentication: current status, issues, and challenges | |
Shojae Chaeikar et al. | PSW statistical LSB image steganalysis | |
Yahya et al. | Steganography techniques | |
Singh et al. | From classical to soft computing based watermarking techniques: A comprehensive review | |
Deeba et al. | Digital image watermarking based on ANN and least significant bit | |
Al-Mohammad | Steganography-based secret and reliable communications: Improving steganographic capacity and imperceptibility | |
Abdulla | Digital image steganography: challenges, investigation, and recommendation for the future direction | |
Hadmi et al. | A robust and secure perceptual hashing system based on a quantization step analysis | |
Bachrach et al. | Image steganography and steganalysis | |
Bhattacharyya et al. | DCT difference modulation (DCTDM) image steganography | |
Hassanein | Secure digital documents using Steganography and QR Code | |
Cheddad | Steganoflage: a new image steganography algorithm | |
Bansal et al. | Performance evaluation of steganography tools using SVM and NPR tool | |
Rao et al. | Digital Watermarking Techniques in Curvelet and Ridgelet Domain | |
Khalind | New methods to improve the pixel domain steganography, steganalysis, and simplify the assessment of steganalysis tools | |
Geetha et al. | Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system | |
Yadav | Study of Information Hiding Techniques and their Counterattacks | |
Bogdanova et al. | Software Approaches and Methods to Ensure the Security of Interactive Systems | |
Al-Taie | Statistical steganalysis detector model for 8-bit depth images | |
Lee | A secret transmission method via numeric data with a blind authentication capability |