Yu et al., 2014 - Google Patents
A channel selection rule for YASSYu et al., 2014
- Document ID
- 7715618339020319874
- Author
- Yu L
- Zhao Y
- Ni R
- Cao G
- Publication year
- Publication venue
- Science China Information Sciences
External Links
Snippet
In this paper, a channel selection rule for YASS (Yet-Another-Secure-Steganography) is proposed. Secret message embedding imposes distortion to the cover image. The larger the distortion, the less secure the steganographic algorithm. Our channel selection rule engages …
- 230000001131 transforming 0 abstract description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang | Reversible data hiding with optimal value transfer | |
| Huang et al. | Reversible data hiding in JPEG images | |
| Yang et al. | A contrast-sensitive reversible visible image watermarking technique | |
| US7068809B2 (en) | Segmentation in digital watermarking | |
| Gul et al. | SVD-based universal spatial domain image steganalysis | |
| Fridrich | Combining low-frequency and spread-spectrum watermarking | |
| Li et al. | Steganalysis of YASS | |
| Wu et al. | A high capacity reversible data hiding scheme with edge prediction and difference expansion | |
| Song et al. | Chaotic system and QR factorization based robust digital image watermarking algorithm | |
| El-sayed et al. | Adaptive difference expansion-based reversible data hiding scheme for digital images | |
| Khan et al. | On hiding secret information in medium frequency DCT components using least significant bits steganography | |
| Yu et al. | A channel selection rule for YASS | |
| Daneshkhah et al. | A more secure steganography method in spatial domain | |
| Luo et al. | Blind image watermarking based on discrete fractional random transform and subsampling | |
| Wu et al. | A novel active image authentication scheme for block truncation coding | |
| Hu et al. | A progressive QIM to cope with SVD-based blind image watermarking in DWT domain | |
| Chen et al. | A Watermarking Technique based on the Frequency Domain. | |
| Yadav et al. | Transform domain robust image-adaptive watermarking: prevalent techniques and their evaluation | |
| CN113934985A (en) | Noise image-oriented self-adaptive high-capacity steganography method | |
| Yang | Robust Watermarking Scheme Based on Radius Weight Mean and Feature‐Embedding Technique | |
| Chang et al. | Reversible Image Hiding for High Image Quality Based on Histogram Shifting and Local Complexity. | |
| Adsumilli et al. | Error concealment in video communications by informed watermarking | |
| Amita et al. | Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique | |
| Yang et al. | A novel robust watermarking scheme based on neural network | |
| Hsieh et al. | Wavelet-based color image watermarking using adaptive entropy casting |