[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Molato et al., 2023 - Google Patents

A secured LSB-based image steganography using modified collatz conjecture

Molato et al., 2023

Document ID
1923438874032355
Author
Molato A
Calanda F
Publication year
Publication venue
2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS)

External Links

Snippet

This research paper presents a novel approach to improving the strength of Least Significant Bit (LSB) embedding in steganography through the use of the Collatz Conjecture. LSB image steganography is commonly employed due to its simplicity of implementation. The …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled

Similar Documents

Publication Publication Date Title
Rustad et al. Inverted LSB image steganography using adaptive pattern to improve imperceptibility
Samiullah et al. An image encryption scheme based on DNA computing and multiple chaotic systems
Yu et al. Digital watermarking based on neural networks for color images
Li et al. Reversible data hiding in encrypted images using cross division and additive homomorphism
Ahmad et al. An image encryption algorithm based on new generalized fusion fractal structure
Wang et al. Reversible data hiding in encrypted images with block-based adaptive MSB encoding
François et al. A new image encryption scheme based on a chaotic function
Lee et al. Digital image sharing by diverse image media
Abbood et al. Text in Image Hiding using Developed LSB and Random Method.
Tiwari et al. LSB steganography using pixel locator sequence with AES
Gao et al. High-performance reversible data hiding in encrypted images with adaptive Huffman code
Molato et al. Lsb-based random embedding image steganography technique using modified collatz conjecture
Kukreja et al. Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP–SURF descriptors
Al-Hyari et al. Generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture
Asok et al. Implementation and comparison of different data hiding techniques in image steganography
Molato et al. A secured LSB-based image steganography using modified collatz conjecture
Yaseen et al. Image steganography based on hybrid edge detector to hide encrypted image using vernam algorithm
Al-Tamimi et al. Image steganography using least significant bits (LSBs): a novel algorithm
Gutiérrez-Cárdenas Secret key steganography with message obfuscation by pseudo-random number generators
Jung Comparative histogram analysis of LSB-based image steganography
Yang et al. Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph
Kumar et al. Adaptive two-stage reversible data hiding in encrypted images using prediction error expansion
Alia et al. An improved video steganography: using random key-dependent
Dash et al. Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system
Aminuddin et al. AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem