Sulema, 2016 - Google Patents
Image protection method based on binary operationsSulema, 2016
View PDF- Document ID
- 1670935982212231791
- Author
- Sulema Y
- Publication year
- Publication venue
- 2016 International Conference on Systems, Signals and Image Processing (IWSSIP)
External Links
Snippet
This paper presents the method of graphical data steganographic protection based on binary operations applied to both secret data bits and the most significant bits of a cover image in order to define values of the least significant bits to be embedded into the cover …
- 238000000034 method 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zheng et al. | Coverless information hiding based on robust image hashing | |
Joshi et al. | A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the gray scale image | |
Abikoye Oluwakemi et al. | Efficient data hiding system using cryptography and steganography | |
Abdulzahra et al. | Combining cryptography and steganography for data hiding in images | |
Yahya et al. | Introduction to steganography | |
Aqeel et al. | A survey on digital image steganography approaches | |
Nezami et al. | An efficient and secure technique for image steganography using a hash function | |
Thangavel et al. | SMCSRC—Secure multimedia content storage and retrieval in cloud | |
Naji et al. | Automatic region selection method to enhance image-based steganography | |
Gabriel et al. | A two-layer image-steganography system for covert communication over enterprise network | |
Sulema | Image protection method based on binary operations | |
AlKhafaji et al. | Improved technique for hiding data in a colored and a monochrome image | |
Tanya Bindu et al. | A survey on various crypto-steganography techniques for real-time images | |
Sun et al. | High‐Capacity Data Hiding Method Based on Two Subgroup Pixels‐Value Adjustment Using Encoding Function | |
Wang et al. | A novel (n, n) secret image sharing scheme based on Sudoku | |
Raj et al. | A survey on reversible data hiding in encrypted image | |
Long et al. | A formula adaptive pixel pair matching steganography algorithm | |
Kumar et al. | A Secure Image Watermarking Scheme Based on DWT, SVD and Arnold Transform | |
Tyagi et al. | Multilevel steganography for data protection | |
Jansi et al. | Steganographic approach to enhance secure data communication using nonograms | |
Aqeel et al. | Digital image steganography by using a hash based LSB (3-2-3) technique | |
Nalavade et al. | Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach | |
Rao et al. | A novel information security scheme using cryptic steganography | |
Saini | Comparative study of current image steganography techniques | |
Kuo et al. | A Progressive Secret Image Sharing Scheme Based on GEMD Data Hiding |