Molato et al., 2023 - Google Patents
A secured LSB-based image steganography using modified collatz conjectureMolato et al., 2023
- Document ID
- 1923438874032355
- Author
- Molato A
- Calanda F
- Publication year
- Publication venue
- 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)
External Links
Snippet
This research paper presents a novel approach to improving the strength of Least Significant Bit (LSB) embedding in steganography through the use of the Collatz Conjecture. LSB image steganography is commonly employed due to its simplicity of implementation. The …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rustad et al. | Inverted LSB image steganography using adaptive pattern to improve imperceptibility | |
Samiullah et al. | An image encryption scheme based on DNA computing and multiple chaotic systems | |
Yu et al. | Digital watermarking based on neural networks for color images | |
Li et al. | Reversible data hiding in encrypted images using cross division and additive homomorphism | |
Ahmad et al. | An image encryption algorithm based on new generalized fusion fractal structure | |
Wang et al. | Reversible data hiding in encrypted images with block-based adaptive MSB encoding | |
François et al. | A new image encryption scheme based on a chaotic function | |
Lee et al. | Digital image sharing by diverse image media | |
Abbood et al. | Text in Image Hiding using Developed LSB and Random Method. | |
Tiwari et al. | LSB steganography using pixel locator sequence with AES | |
Gao et al. | High-performance reversible data hiding in encrypted images with adaptive Huffman code | |
Molato et al. | Lsb-based random embedding image steganography technique using modified collatz conjecture | |
Kukreja et al. | Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors | |
Al-Hyari et al. | Generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture | |
Asok et al. | Implementation and comparison of different data hiding techniques in image steganography | |
Molato et al. | A secured LSB-based image steganography using modified collatz conjecture | |
Yaseen et al. | Image steganography based on hybrid edge detector to hide encrypted image using vernam algorithm | |
Al-Tamimi et al. | Image steganography using least significant bits (LSBs): a novel algorithm | |
Gutiérrez-Cárdenas | Secret key steganography with message obfuscation by pseudo-random number generators | |
Jung | Comparative histogram analysis of LSB-based image steganography | |
Yang et al. | Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph | |
Kumar et al. | Adaptive two-stage reversible data hiding in encrypted images using prediction error expansion | |
Alia et al. | An improved video steganography: using random key-dependent | |
Dash et al. | Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system | |
Aminuddin et al. | AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem |