Zhang et al., 2008 - Google Patents
Analysis Based on Generalized Vector Quantization for Information HidingZhang et al., 2008
- Document ID
- 934901499450988492
- Author
- Zhang C
- Qiu Z
- Cheng L
- Cheng L
- Publication year
- Publication venue
- 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
External Links
Snippet
This paper proposes an analysis method based on generalized vector quantization for information hiding. The analysis tries to construct a framework to model the process of information hiding and extraction by the notion of generalized vector quantization. With …
- 238000004458 analytical method 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Moulin | The role of information theory in watermarking and its application to image watermarking | |
| Jo et al. | A digital image watermarking scheme based on vector quantisation | |
| Zhang et al. | Efficient steganographic embedding by exploiting modification direction | |
| US7188065B2 (en) | Categorizer of content in digital signals | |
| Pérez-González et al. | Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications | |
| JP2004163855A (en) | Electronic watermark embedding method, and encoder and decoder capable of utilizing such method | |
| Tareef et al. | A highly secure oblivious sparse coding-based watermarking system for ownership verification | |
| CN111755018B (en) | Audio hiding method and device based on wavelet transform and quantized embedded key | |
| Wu et al. | Robust and blind audio watermarking algorithm in dual domain for overcoming synchronization attacks | |
| Li et al. | Meaningful image encryption based on reversible data hiding in compressive sensing domain | |
| Wu et al. | Adversarial audio watermarking: Embedding watermark into deep feature | |
| Cao et al. | Separable reversible data hiding in encrypted VQ‐encoded images | |
| Voloshynovskiy et al. | Conception and limits of robust perceptual hashing: towards side information assisted hash functions | |
| Kumar et al. | Image steganography using index based chaotic mapping | |
| Lu et al. | Multipurpose image watermarking method based on mean-removed vector quantization | |
| Ramkumar et al. | Signaling methods for multimedia steganography | |
| Le et al. | High-performance RDH in encrypted images using optimal linear predictor and bit-plane compression of sub-images | |
| Zhang et al. | Analysis Based on Generalized Vector Quantization for Information Hiding | |
| CN1694400B (en) | Randomized signal transforms and their applications | |
| Valenzise et al. | Identification of sparse audio tampering using distributed source coding and compressive sensing techniques | |
| Ramanjaneyulu et al. | An oblivious and robust multiple image watermarking scheme using genetic algorithm | |
| Wu et al. | Robust and blind audio watermarking scheme based on genetic algorithm in dual transform domain | |
| Hajduk et al. | Accelerated cover selection steganography | |
| Rahmani et al. | A novel legitimacy preserving data hiding scheme based on LAS compressed code of VQ index tables | |
| Wöhnert et al. | A study on the use of perceptual hashing to detect manipulation of embedded messages in images |