Zhu et al., 2019 - Google Patents
Robust steganography by modifying sign of DCT coefficientsZhu et al., 2019
View PDF- Document ID
- 9972338188774514497
- Author
- Zhu Z
- Zheng N
- Qiao T
- Xu M
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Modern adaptive image steganography with minimizing a distortion function has high performance of undetectability. However, when an image with hidden information is attacked by JPEG compression, its robustness cannot be guaranteed, that remarkably limits its …
- 230000000051 modifying 0 title description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | Robust steganography by modifying sign of DCT coefficients | |
Puteaux et al. | A recursive reversible data hiding in encrypted images method with a very high payload | |
Eggers et al. | Communications approach to image steganography | |
Ou et al. | High payload image steganography with minimum distortion based on absolute moment block truncation coding | |
Luo et al. | Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes | |
Zhang et al. | Dither modulation based adaptive steganography resisting JPEG compression and statistic detection | |
Zhang et al. | A framework of adaptive steganography resisting JPEG compression and detection | |
Liu et al. | A robust data hiding algorithm for H. 264/AVC video streams | |
Qiao et al. | Robust steganography resisting JPEG compression by improving selection of cover element | |
Lin et al. | Image authentication using distributed source coding | |
JP2004507177A (en) | How to embed a digital watermark in digital image data | |
Zhang et al. | Novel video steganography algorithm based on secret sharing and error-correcting code for H. 264/AVC | |
CN102801947A (en) | Semantic information transmission and protection method based on H264 | |
Yin et al. | Robust adaptive steganography based on dither modulation and modification with re-compression | |
Sajedi et al. | Cover selection steganography method based on similarity of image blocks | |
CN112714231A (en) | Robust steganography method based on DCT (discrete cosine transformation) symbol replacement | |
Artiles et al. | Robust image watermarking algorithm using chaotic sequences | |
Xie et al. | On-off keying modulation and tardos fingerprinting | |
Hu et al. | Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification | |
Tran et al. | Lsb data hiding in digital media: a survey | |
Liu | Self‐embedding watermarking scheme for colour images by bi‐level moment‐preserving technique | |
Lin et al. | A high-quality image authentication scheme for AMBTC-compressed images | |
Tarhouni et al. | Fake COVID-19 videos detector based on frames and audio watermarking | |
Fu et al. | Improving anticompression robustness of JPEG adaptive steganography based on robustness measurement and DCT block selection | |
Chen et al. | A GA-based nearly optimal image authentication approach |