Dong et al., 2015 - Google Patents
Reversible binary image watermarking method using overlapping pattern substitutionDong et al., 2015
View PDF- Document ID
- 16429857090032531158
- Author
- Dong K
- Kim H
- Choi Y
- Joo S
- Chung B
- Publication year
- Publication venue
- Etri Journal
External Links
Snippet
This paper presents an overlapping pattern substitution (PS) method. The original overlapping PS method as a reversible data hiding scheme works well with only four pattern pairs among fifteen possible such pairs. This paper generalizes the original PS method so …
- 230000002441 reversible 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shehab et al. | Secure and robust fragile watermarking scheme for medical images | |
Cao et al. | High capacity reversible data hiding in encrypted images by patch-level sparse representation | |
Satir et al. | A compression-based text steganography method | |
Al Hussien et al. | Coverless image steganography based on optical mark recognition and machine learning | |
Aziz et al. | A cycling chaos-based cryptic-free algorithm for image steganography | |
Ogiela et al. | False and multi-secret steganography in digital images | |
Hamdan et al. | AH4S: an algorithm of text in text steganography using the structure of omega network | |
Yin et al. | Improved reversible image authentication scheme | |
WO2018142216A1 (en) | Method and apparatus for generating a cover image for steganography | |
Zhang et al. | Reversible image watermarking algorithm based on quadratic difference expansion | |
Lin et al. | A new steganography method for dynamic GIF images based on palette sort | |
Yogish Naik et al. | Analysis of Reversible Data Hiding Techniques for Digital Images | |
Liu et al. | High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding | |
Alsaadi et al. | Text steganography in font color of MS excel sheet | |
Yu et al. | A Novel Three‐Layer QR Code Based on Secret Sharing Scheme and Liner Code | |
Malik et al. | A high capacity text steganography scheme based on huffman compression and color coding | |
Fei et al. | A reversible watermark scheme for 2D vector map based on reversible contrast mapping | |
Dong et al. | Reversible binary image watermarking method using overlapping pattern substitution | |
JP2023534346A (en) | Zoom Agnostic Watermark Extraction | |
Hong et al. | A recoverable AMBTC authentication scheme using similarity embedding strategy | |
Chhajed et al. | Data hiding in binary images for secret and secure communication using decision tree | |
Hong et al. | An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching | |
Köhler et al. | Protecting information with subcodstanography | |
Yin et al. | MDE‐based image steganography with large embedding capacity | |
Li et al. | High‐Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing |