Panda et al., 2022 - Google Patents
IMAGE STEGANOGRAPHY APPROACH USING SPATIAL AND TRANSFORM DOMAIN TECHNIQUE.Panda et al., 2022
- Document ID
- 3511289144661724293
- Author
- Panda R
- Gupta D
- Jaiswal M
- Kasar V
- Prasanna A
- Publication year
- Publication venue
- I-Manager's Journal on Computer Science
External Links
Snippet
Cryptography is often used to keep information confidential by making it illegible. However, incomprehensible information may raise suspicions of the adversary and may lead him to sabotage this style of communication. Therefore, steganography has a place in the arena of …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00838—Preventing unauthorised reproduction
- H04N1/00856—Preventive measures
- H04N1/00864—Modifying the reproduction, e.g. outputting a modified copy of a scanned original
- H04N1/00872—Modifying the reproduction, e.g. outputting a modified copy of a scanned original by image quality reduction, e.g. distortion or blacking out
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
- G06T5/007—Dynamic range modification
- G06T5/009—Global, i.e. based on properties of the image as a whole
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yu | Attention based data hiding with generative adversarial networks | |
US6697498B2 (en) | Method and computer program product for hiding information in an indexed color image | |
Reddy et al. | High capacity and security steganography using discrete wavelet transform | |
Cheddad et al. | A secure and improved self-embedding algorithm to combat digital document forgery | |
Shejul et al. | A DWT based approach for steganography using biometrics | |
Lu et al. | Lossless information hiding in images | |
Verma et al. | Utilizing Imaging Steganographic Improvement using LSB & Image Decoder | |
Juarez-Sandoval et al. | Digital image ownership authentication via camouflaged unseen-visible watermarking | |
Alfa et al. | A comparative study of methods for hiding large size audio file in smaller image carriers | |
Lenarczyk et al. | Parallel blind digital image watermarking in spatial and frequency domains | |
Panda et al. | IMAGE STEGANOGRAPHY APPROACH USING SPATIAL AND TRANSFORM DOMAIN TECHNIQUE. | |
Hemalatha et al. | A secure image steganography technique to hide multiple secret images | |
Zagade et al. | Secret data hiding in images by using DWT Techniques | |
Abd Aziz et al. | Image steganography:: Comparative analysis of their techniques, complexity and enhancements | |
CN116777721A (en) | DCT (discrete cosine transformation) -based 'four-point method' robust hidden watermark embedding and extracting algorithm | |
Baziyad et al. | Polynomial fitting: enhancing the stego quality of DCT-based Steganography schemes | |
Cheddad et al. | A comparative analysis of steganographic tools | |
Abd et al. | Secured mechanism towards integrity of digital images using DWT, DCT, LSB and watermarking integrations | |
Watni et al. | Impact of various image formats supported by android smartphones on image steganography: a preliminary study | |
SHOWKAT et al. | Systematic review and simulative comparison of video watermarking schemes | |
Pandey et al. | Information hiding using image steganography-A survey | |
Vyas et al. | An Overview of Image Steganographic Techniques. | |
Riaz et al. | A robust multimedia authentication and restoration scheme in digital photography | |
Rashmi et al. | Robust multiple composite watermarking using LSB technique | |
Naveen et al. | Image Steganography Method for Securing Multiple Images using LSB–GA |