Barani et al., 2015 - Google Patents
Image forgery detection in contourlet transform domain based on new chaotic cellular automataBarani et al., 2015
View PDF- Document ID
- 15278588896770014985
- Author
- Barani M
- Ayubi P
- Jalili F
- Valandar M
- Azariyun E
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
Image authentication includes techniques that detect unauthorized changes in digital pictures. Image authentication is generally categorized into two primary categories, active and passive methods. In this paper, a new active image authentication method is proposed …
- 238000001514 detection method 0 title abstract description 44
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamidi et al. | Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform | |
Parah et al. | Information hiding in edges: A high capacity information hiding technique using hybrid edge detection | |
Al-Dmour et al. | A steganography embedding method based on edge identification and XOR coding | |
Roy et al. | Chaos based edge adaptive image steganography | |
Cheema et al. | A novel optimized semi-blind scheme for color image watermarking | |
Malik et al. | A reversible data hiding scheme for interpolated images based on pixel intensity range | |
Muhammad et al. | Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain | |
Kumar et al. | Entropy based spatial domain image watermarking and its performance analysis | |
Lin et al. | A novel hybrid image authentication scheme based on absolute moment block truncation coding | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
Behnia et al. | Watermarking based on discrete wavelet transform and q-deformed chaotic map | |
Shi et al. | A region-adaptive semi-fragile dual watermarking scheme | |
Bhatnagar et al. | Secure randomized image watermarking based on singular value decomposition | |
Rani et al. | An image copyright protection scheme by encrypting secret data with the host image | |
Pal et al. | Robust watermarking scheme for tamper detection and authentication exploiting CA | |
Nilizadeh et al. | Information Hiding in RGB Images Using an Improved Matrix Pattern Approach. | |
Barani et al. | Image forgery detection in contourlet transform domain based on new chaotic cellular automata | |
Abdulla | Digital image steganography: challenges, investigation, and recommendation for the future direction | |
Pal et al. | An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code | |
Sharifara et al. | A novel approach to enhance robustness in digital image watermarking using multiple bit-planes of intermediate significant bits | |
Kukreja et al. | Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors | |
Gavini et al. | Lossless watermarking technique for copyright protection of high resolution images | |
Nazari et al. | A novel image steganography scheme based on morphological associative memory and permutation schema | |
Aminuddin et al. | AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem | |
Bideh et al. | Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications |