Priyanka et al., 2014 - Google Patents
A steganographic system for embedding image and encrypted textPriyanka et al., 2014
- Document ID
- 9086026692436857895
- Author
- Priyanka B
- Sathyanarayana S
- Publication year
- Publication venue
- 2014 international conference on contemporary computing and informatics (IC3I)
External Links
Snippet
Need for secured communication and reduced memory usage are the major issues in recent times. These issues have led to the development of many steganographic algorithms. This paper undertakes the study and implementation of steganographic system with prime …
- 238000000034 method 0 abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Reddy et al. | High capacity and security steganography using discrete wavelet transform | |
| Chiang et al. | Tamper detection and restoring system for medical images using wavelet-based reversible data embedding | |
| Kannammal et al. | Two level security for medical images using watermarking/encryption algorithms | |
| Abdel-Aziz et al. | Improved data hiding method for securing color images | |
| Lu et al. | Lossless information hiding in images | |
| Swetha et al. | Data hiding using video steganography-a survey | |
| Khan et al. | High payload watermarking based on enhanced image saliency detection | |
| Chen et al. | A visually secure image encryption method based on integer wavelet transform and rhombus prediction | |
| Cahya et al. | Noble method for data hiding using steganography discrete wavelet transformation and cryptography triple data encryption standard: DES | |
| Kukreja et al. | Curvelet transform based robust copyright protection scheme for color images using extended visual cryptography | |
| Fkirin et al. | Two-level security approach combining watermarking and encryption for securing critical colored images | |
| Shrestha et al. | Color image steganography technique using Daubechies discrete wavelet transform | |
| Ling et al. | Watermarking for image authentication | |
| Priyanka et al. | A steganographic system for embedding image and encrypted text | |
| Fkirin et al. | A new approach for colored watermarking image into gray scale image using wavelet fusion | |
| Bhatnagar et al. | Encryption based robust watermarking in fractional wavelet domain | |
| Al-Rawi et al. | Image authentication using stochastic diffusion | |
| Banoori et al. | An improved hybrid image steganography method using AES algorithm | |
| Singh et al. | Ensuring integrity and security of medical image transmission in IoMT using highly imperceptible and robust watermarking approach | |
| Desai et al. | A survey on intelligent security techniques for high-definition multimedia data | |
| Victoria et al. | A study on spatial domain and transform domain steganography techniques used in image hiding | |
| Ahmed et al. | Information hiding in video files using frequency domain | |
| Sarkar et al. | Intelligent multi-modal data processing | |
| Pandey et al. | Steganographic method based on interpolation and cyclic LSB substitution of digital images | |
| Patil et al. | Literature survey on dwt based image steganography |