[go: nahoru, domu]

Andrejčík et al., 2024 - Google Patents

Resistance to attack on the covering medium using various steganographic techniques

Andrejčík et al., 2024

Document ID
3496686676116725845
Author
Andrejčík S
Ovseník
Oravec J
Haluška R
Publication year
Publication venue
2024 34th International Conference Radioelektronika (RADIOELEKTRONIKA)

External Links

Snippet

The main objective of this work is to investigate steganography techniques using least significant bit. In the first part, the theory of steganography is described as well as the basic theory of LSB matching and LSB replacement methods. A description of the image from the …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
Hassaballah et al. A novel image steganography method for industrial internet of things security
Hamidi et al. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform
Ou et al. High payload image steganography with minimum distortion based on absolute moment block truncation coding
Hurrah et al. Embedding in medical images: an efficient scheme for authentication and tamper localization
Armijo-Correa et al. An improved visually meaningful encrypted image scheme
Ponuma et al. Visually meaningful image encryption using data hiding and chaotic compressive sensing
US7587063B2 (en) Asymmetric subspace watermarking
Liu et al. Robust blind image watermarking based on chaotic mixtures
Lu et al. A robust fractal color image watermarking algorithm
Ahmed et al. Hash-based authentication of digital images in noisy channels
Şahin et al. Review of the Literature on the Steganography Concept
Fkirin et al. Two-level security approach combining watermarking and encryption for securing critical colored images
Islam et al. Denoising and error correction in noisy AES-encrypted images using statistical measures
Wang et al. A blind watermarking algorithm based on specific component quantization in DHT domain
Sathananthavathi et al. Secure visual communication with advanced cryptographic and ımage processing techniques
Siddiqui et al. Chaos-based video steganography method in discrete cosine transform domain
Jain et al. Review on Digital Watermarking Techniques and Its Retrieval
Dash et al. Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system
Andrejčík et al. Resistance to attack on the covering medium using various steganographic techniques
Fadhil et al. A Proposed Text Encryption inside Video Using Harris Corner Detection and Salas20 Encryption Algorithm
Saidi et al. USAD: undetectable steganographic approach in DCT domain
Agarwal et al. Selective bin model for reversible data hiding in encrypted images
Bilal et al. Audio steganography using QR decomposition and fast Fourier transform
Zhang et al. Eliminating orthonormal constraints of SVD to guarantee full retrievability of blind watermarking
Dahmane A perceptual entanglement-based image authentication with tamper localisation