[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Hassanein, 2014 - Google Patents

Secure digital documents using Steganography and QR Code

Hassanein, 2014

View PDF
Document ID
14941661546872281726
Author
Hassanein M
Publication year

External Links

Snippet

With the increasing use of the Internet several problems have arisen regarding the processing of electronic documents. These include content filtering, content retrieval/search. Moreover, document security has taken a centre stage including copyright protection …
Continue reading at bura.brunel.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination

Similar Documents

Publication Publication Date Title
Douglas et al. An overview of steganography techniques applied to the protection of biometric data
Katzenbeisser et al. Information hiding
Abdulla Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography
Cheddad et al. Digital image steganography: Survey and analysis of current methods
US6473516B1 (en) Large capacity steganography
Han et al. Content-based image authentication: current status, issues, and challenges
Shojae Chaeikar et al. PSW statistical LSB image steganalysis
Yahya et al. Steganography techniques
Singh et al. From classical to soft computing based watermarking techniques: A comprehensive review
Deeba et al. Digital image watermarking based on ANN and least significant bit
Al-Mohammad Steganography-based secret and reliable communications: Improving steganographic capacity and imperceptibility
Abdulla Digital image steganography: challenges, investigation, and recommendation for the future direction
Hadmi et al. A robust and secure perceptual hashing system based on a quantization step analysis
Bachrach et al. Image steganography and steganalysis
Bhattacharyya et al. DCT difference modulation (DCTDM) image steganography
Hassanein Secure digital documents using Steganography and QR Code
Cheddad Steganoflage: a new image steganography algorithm
Bansal et al. Performance evaluation of steganography tools using SVM and NPR tool
Rao et al. Digital Watermarking Techniques in Curvelet and Ridgelet Domain
Khalind New methods to improve the pixel domain steganography, steganalysis, and simplify the assessment of steganalysis tools
Geetha et al. Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system
Yadav Study of Information Hiding Techniques and their Counterattacks
Bogdanova et al. Software Approaches and Methods to Ensure the Security of Interactive Systems
Al-Taie Statistical steganalysis detector model for 8-bit depth images
Lee A secret transmission method via numeric data with a blind authentication capability