[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Panda et al., 2022 - Google Patents

IMAGE STEGANOGRAPHY APPROACH USING SPATIAL AND TRANSFORM DOMAIN TECHNIQUE.

Panda et al., 2022

Document ID
3511289144661724293
Author
Panda R
Gupta D
Jaiswal M
Kasar V
Prasanna A
Publication year
Publication venue
I-Manager's Journal on Computer Science

External Links

Snippet

Cryptography is often used to keep information confidential by making it illegible. However, incomprehensible information may raise suspicions of the adversary and may lead him to sabotage this style of communication. Therefore, steganography has a place in the arena of …
Continue reading at search.ebscohost.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/00856Preventive measures
    • H04N1/00864Modifying the reproduction, e.g. outputting a modified copy of a scanned original
    • H04N1/00872Modifying the reproduction, e.g. outputting a modified copy of a scanned original by image quality reduction, e.g. distortion or blacking out
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
    • G06T5/007Dynamic range modification
    • G06T5/009Global, i.e. based on properties of the image as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation

Similar Documents

Publication Publication Date Title
Yu Attention based data hiding with generative adversarial networks
US6697498B2 (en) Method and computer program product for hiding information in an indexed color image
Reddy et al. High capacity and security steganography using discrete wavelet transform
Cheddad et al. A secure and improved self-embedding algorithm to combat digital document forgery
Shejul et al. A DWT based approach for steganography using biometrics
Lu et al. Lossless information hiding in images
Verma et al. Utilizing Imaging Steganographic Improvement using LSB & Image Decoder
Juarez-Sandoval et al. Digital image ownership authentication via camouflaged unseen-visible watermarking
Alfa et al. A comparative study of methods for hiding large size audio file in smaller image carriers
Lenarczyk et al. Parallel blind digital image watermarking in spatial and frequency domains
Panda et al. IMAGE STEGANOGRAPHY APPROACH USING SPATIAL AND TRANSFORM DOMAIN TECHNIQUE.
Hemalatha et al. A secure image steganography technique to hide multiple secret images
Zagade et al. Secret data hiding in images by using DWT Techniques
Abd Aziz et al. Image steganography:: Comparative analysis of their techniques, complexity and enhancements
CN116777721A (en) DCT (discrete cosine transformation) -based 'four-point method' robust hidden watermark embedding and extracting algorithm
Baziyad et al. Polynomial fitting: enhancing the stego quality of DCT-based Steganography schemes
Cheddad et al. A comparative analysis of steganographic tools
Abd et al. Secured mechanism towards integrity of digital images using DWT, DCT, LSB and watermarking integrations
Watni et al. Impact of various image formats supported by android smartphones on image steganography: a preliminary study
SHOWKAT et al. Systematic review and simulative comparison of video watermarking schemes
Pandey et al. Information hiding using image steganography-A survey
Vyas et al. An Overview of Image Steganographic Techniques.
Riaz et al. A robust multimedia authentication and restoration scheme in digital photography
Rashmi et al. Robust multiple composite watermarking using LSB technique
Naveen et al. Image Steganography Method for Securing Multiple Images using LSB–GA