[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Khalifa et al., 2019 - Google Patents

Image steganalysis in frequency domain using co-occurrence matrix and Bpnn

Khalifa et al., 2019

View PDF
Document ID
16209319505544216026
Author
Khalifa I
Zeebaree S
Ataş M
Khalifa F
Publication year
Publication venue
Science Journal of University of Zakho

External Links

Snippet

In the last two decades, steganalysis has become a fertile research area to minimize the security risks left behind by Misuse of data concealment in digital computer files. As the propagation of hidden writing increased, the need for the steganalysis emerged and grew to …
Continue reading at sjuoz.uoz.edu.krd (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • G06F17/141Discrete Fourier transforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image

Similar Documents

Publication Publication Date Title
Khalifa et al. Image steganalysis in frequency domain using co-occurrence matrix and Bpnn
Qian et al. Thinking in frequency: Face forgery detection by mining frequency-aware clues
Das et al. Shield: Fast, practical defense and vaccination for deep learning using jpeg compression
Parveen et al. Block-based copy–move image forgery detection using DCT
Wang et al. A New V‐Net Convolutional Neural Network Based on Four‐Dimensional Hyperchaotic System for Medical Image Encryption
CN100507943C (en) Statistic supervision and structure supervision based hidden messages analysis system
Jiang et al. Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial
Pan et al. A video coverless information hiding algorithm based on semantic segmentation
Alqadi et al. Proposed Implementation Method to Improve LSB Efficiency
CN104636764B (en) A kind of image latent writing analysis method and its device
Long et al. Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption
Zhang et al. A local perturbation generation method for GAN-generated face anti-forensics
Su et al. Visualized multiple image selection encryption based on log chaos system and multilayer cellular automata saliency detection
Wen et al. Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography
Wang et al. TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding
Fernandes et al. Benford's law applied to digital forensic analysis
Li et al. Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform
CN114362988B (en) Network traffic identification method and device
Chen et al. A visually secure image encryption method based on integer wavelet transform and rhombus prediction
Swaminathan et al. Security of feature extraction in image hashing
Li et al. Detection and forensics of encryption behavior of storage file and network transmission data
Sheng et al. Robust zero-watermarking algorithm for medical images based on Hadamard-DWT-DCT
Hemalatha et al. Improving image steganalyser performance through curvelet transform denoising
Singh et al. Robust watermarking algorithm based on multimodal medical image fusion
Qiu Generative Image Steganography Scheme Based on Deep Learning