Khalifa et al., 2019 - Google Patents
Image steganalysis in frequency domain using co-occurrence matrix and BpnnKhalifa et al., 2019
View PDF- Document ID
- 16209319505544216026
- Author
- Khalifa I
- Zeebaree S
- Ataş M
- Khalifa F
- Publication year
- Publication venue
- Science Journal of University of Zakho
External Links
Snippet
In the last two decades, steganalysis has become a fertile research area to minimize the security risks left behind by Misuse of data concealment in digital computer files. As the propagation of hidden writing increased, the need for the steganalysis emerged and grew to …
- 239000011159 matrix material 0 title abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
- G06F17/141—Discrete Fourier transforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khalifa et al. | Image steganalysis in frequency domain using co-occurrence matrix and Bpnn | |
Qian et al. | Thinking in frequency: Face forgery detection by mining frequency-aware clues | |
Das et al. | Shield: Fast, practical defense and vaccination for deep learning using jpeg compression | |
Parveen et al. | Block-based copy–move image forgery detection using DCT | |
Wang et al. | A New V‐Net Convolutional Neural Network Based on Four‐Dimensional Hyperchaotic System for Medical Image Encryption | |
CN100507943C (en) | Statistic supervision and structure supervision based hidden messages analysis system | |
Jiang et al. | Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial | |
Pan et al. | A video coverless information hiding algorithm based on semantic segmentation | |
Alqadi et al. | Proposed Implementation Method to Improve LSB Efficiency | |
CN104636764B (en) | A kind of image latent writing analysis method and its device | |
Long et al. | Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption | |
Zhang et al. | A local perturbation generation method for GAN-generated face anti-forensics | |
Su et al. | Visualized multiple image selection encryption based on log chaos system and multilayer cellular automata saliency detection | |
Wen et al. | Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography | |
Wang et al. | TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding | |
Fernandes et al. | Benford's law applied to digital forensic analysis | |
Li et al. | Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform | |
CN114362988B (en) | Network traffic identification method and device | |
Chen et al. | A visually secure image encryption method based on integer wavelet transform and rhombus prediction | |
Swaminathan et al. | Security of feature extraction in image hashing | |
Li et al. | Detection and forensics of encryption behavior of storage file and network transmission data | |
Sheng et al. | Robust zero-watermarking algorithm for medical images based on Hadamard-DWT-DCT | |
Hemalatha et al. | Improving image steganalyser performance through curvelet transform denoising | |
Singh et al. | Robust watermarking algorithm based on multimodal medical image fusion | |
Qiu | Generative Image Steganography Scheme Based on Deep Learning |