Li et al., 2024 - Google Patents
Robust Image Steganography via Color ConversionLi et al., 2024
- Document ID
- 15900372544545726306
- Author
- Li Q
- Ma B
- Fu X
- Wang X
- Wang C
- Li X
- Publication year
- Publication venue
- IEEE Transactions on Circuits and Systems for Video Technology
External Links
Snippet
In this paper, we propose a robust image steganography method utilizing color conversion, leveraging decolorization and colorization models to achieve covert transmission of secret information. The motivation is to use color conversion of the stego image to conceal …
- 238000006243 chemical reaction 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yuan et al. | A blind image watermarking scheme combining spatial domain and frequency domain | |
Ou et al. | High payload image steganography with minimum distortion based on absolute moment block truncation coding | |
Chang et al. | Lossless data hiding for color images based on block truncation coding | |
Cao et al. | A secure video watermarking technique based on hyperchaotic Lorentz system | |
CN107240061A (en) | A kind of watermark insertion, extracting method and device based on Dynamic BP neural | |
Mahto et al. | Hybrid optimisation-based robust watermarking using denoising convolutional neural network | |
Wang et al. | HidingGAN: High capacity information hiding with generative adversarial network | |
CN115131188A (en) | Robust image watermarking method based on generation countermeasure network | |
Li et al. | Image steganography in color conversion | |
Xiong et al. | A black-box reversible adversarial example for authorizable recognition to shared images | |
Li et al. | Privacy protection method based on multidimensional feature fusion under 6G networks | |
Bi et al. | High‐Capacity Image Steganography Algorithm Based on Image Style Transfer | |
Duan et al. | DUIANet: A double layer U-Net image hiding method based on improved Inception module and attention mechanism | |
Li et al. | Robust Image Steganography via Color Conversion | |
Chanchal et al. | A comprehensive survey on neural network based image data hiding scheme | |
Li et al. | Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression | |
Shi et al. | A Blind Watermarking Technique for Color Image based on SVD with Circulation. | |
Thanh et al. | The novel and robust watermarking method based on q-logarithm frequency domain | |
Shen et al. | VHNet: A video hiding network with robustness to video coding | |
Tchakounté et al. | An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images. | |
Zuo et al. | Secure and robust watermarking scheme based on the hybrid optical bi-stable model in the multi-transform domain | |
Kaur et al. | Image steganography using hybrid edge detection and first component alteration technique | |
Guo et al. | AISM: an adaptable image Steganography Model with user customization | |
Hu et al. | The recovery scheme of computer-generated holography encryption–hiding images based on deep learning | |
Qin et al. | Moiré pattern generation-based image steganography |