[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Barani et al., 2015 - Google Patents

Image forgery detection in contourlet transform domain based on new chaotic cellular automata

Barani et al., 2015

View PDF
Document ID
15278588896770014985
Author
Barani M
Ayubi P
Jalili F
Valandar M
Azariyun E
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Image authentication includes techniques that detect unauthorized changes in digital pictures. Image authentication is generally categorized into two primary categories, active and passive methods. In this paper, a new active image authentication method is proposed …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis

Similar Documents

Publication Publication Date Title
Hamidi et al. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform
Parah et al. Information hiding in edges: A high capacity information hiding technique using hybrid edge detection
Al-Dmour et al. A steganography embedding method based on edge identification and XOR coding
Roy et al. Chaos based edge adaptive image steganography
Cheema et al. A novel optimized semi-blind scheme for color image watermarking
Malik et al. A reversible data hiding scheme for interpolated images based on pixel intensity range
Muhammad et al. Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain
Kumar et al. Entropy based spatial domain image watermarking and its performance analysis
Lin et al. A novel hybrid image authentication scheme based on absolute moment block truncation coding
Liu et al. Robust blind image watermarking based on chaotic mixtures
Behnia et al. Watermarking based on discrete wavelet transform and q-deformed chaotic map
Shi et al. A region-adaptive semi-fragile dual watermarking scheme
Bhatnagar et al. Secure randomized image watermarking based on singular value decomposition
Rani et al. An image copyright protection scheme by encrypting secret data with the host image
Pal et al. Robust watermarking scheme for tamper detection and authentication exploiting CA
Nilizadeh et al. Information Hiding in RGB Images Using an Improved Matrix Pattern Approach.
Barani et al. Image forgery detection in contourlet transform domain based on new chaotic cellular automata
Abdulla Digital image steganography: challenges, investigation, and recommendation for the future direction
Pal et al. An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code
Sharifara et al. A novel approach to enhance robustness in digital image watermarking using multiple bit-planes of intermediate significant bits
Kukreja et al. Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors
Gavini et al. Lossless watermarking technique for copyright protection of high resolution images
Nazari et al. A novel image steganography scheme based on morphological associative memory and permutation schema
Aminuddin et al. AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
Bideh et al. Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications