Andrejčík et al., 2024 - Google Patents
Resistance to attack on the covering medium using various steganographic techniquesAndrejčík et al., 2024
- Document ID
- 3496686676116725845
- Author
- Andrejčík S
- Ovseník
- Oravec J
- Haluška R
- Publication year
- Publication venue
- 2024 34th International Conference Radioelektronika (RADIOELEKTRONIKA)
External Links
Snippet
The main objective of this work is to investigate steganography techniques using least significant bit. In the first part, the theory of steganography is described as well as the basic theory of LSB matching and LSB replacement methods. A description of the image from the …
- 238000000034 method 0 title abstract description 42
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hassaballah et al. | A novel image steganography method for industrial internet of things security | |
Hamidi et al. | Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform | |
Ou et al. | High payload image steganography with minimum distortion based on absolute moment block truncation coding | |
Hurrah et al. | Embedding in medical images: an efficient scheme for authentication and tamper localization | |
Armijo-Correa et al. | An improved visually meaningful encrypted image scheme | |
Ponuma et al. | Visually meaningful image encryption using data hiding and chaotic compressive sensing | |
US7587063B2 (en) | Asymmetric subspace watermarking | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
Lu et al. | A robust fractal color image watermarking algorithm | |
Ahmed et al. | Hash-based authentication of digital images in noisy channels | |
Şahin et al. | Review of the Literature on the Steganography Concept | |
Fkirin et al. | Two-level security approach combining watermarking and encryption for securing critical colored images | |
Islam et al. | Denoising and error correction in noisy AES-encrypted images using statistical measures | |
Wang et al. | A blind watermarking algorithm based on specific component quantization in DHT domain | |
Sathananthavathi et al. | Secure visual communication with advanced cryptographic and ımage processing techniques | |
Siddiqui et al. | Chaos-based video steganography method in discrete cosine transform domain | |
Jain et al. | Review on Digital Watermarking Techniques and Its Retrieval | |
Dash et al. | Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system | |
Andrejčík et al. | Resistance to attack on the covering medium using various steganographic techniques | |
Fadhil et al. | A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm | |
Saidi et al. | USAD: undetectable steganographic approach in DCT domain | |
Agarwal et al. | Selective bin model for reversible data hiding in encrypted images | |
Bilal et al. | Audio steganography using QR decomposition and fast Fourier transform | |
Zhang et al. | Eliminating orthonormal constraints of SVD to guarantee full retrievability of blind watermarking | |
Dahmane | A perceptual entanglement-based image authentication with tamper localisation |