[go: up one dir, main page]

Zhang et al., 2008 - Google Patents

Analysis Based on Generalized Vector Quantization for Information Hiding

Zhang et al., 2008

Document ID
934901499450988492
Author
Zhang C
Qiu Z
Cheng L
Cheng L
Publication year
Publication venue
2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing

External Links

Snippet

This paper proposes an analysis method based on generalized vector quantization for information hiding. The analysis tries to construct a framework to model the process of information hiding and extraction by the notion of generalized vector quantization. With …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations

Similar Documents

Publication Publication Date Title
Moulin The role of information theory in watermarking and its application to image watermarking
Jo et al. A digital image watermarking scheme based on vector quantisation
Zhang et al. Efficient steganographic embedding by exploiting modification direction
US7188065B2 (en) Categorizer of content in digital signals
Pérez-González et al. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications
JP2004163855A (en) Electronic watermark embedding method, and encoder and decoder capable of utilizing such method
Tareef et al. A highly secure oblivious sparse coding-based watermarking system for ownership verification
CN111755018B (en) Audio hiding method and device based on wavelet transform and quantized embedded key
Wu et al. Robust and blind audio watermarking algorithm in dual domain for overcoming synchronization attacks
Li et al. Meaningful image encryption based on reversible data hiding in compressive sensing domain
Wu et al. Adversarial audio watermarking: Embedding watermark into deep feature
Cao et al. Separable reversible data hiding in encrypted VQ‐encoded images
Voloshynovskiy et al. Conception and limits of robust perceptual hashing: towards side information assisted hash functions
Kumar et al. Image steganography using index based chaotic mapping
Lu et al. Multipurpose image watermarking method based on mean-removed vector quantization
Ramkumar et al. Signaling methods for multimedia steganography
Le et al. High-performance RDH in encrypted images using optimal linear predictor and bit-plane compression of sub-images
Zhang et al. Analysis Based on Generalized Vector Quantization for Information Hiding
CN1694400B (en) Randomized signal transforms and their applications
Valenzise et al. Identification of sparse audio tampering using distributed source coding and compressive sensing techniques
Ramanjaneyulu et al. An oblivious and robust multiple image watermarking scheme using genetic algorithm
Wu et al. Robust and blind audio watermarking scheme based on genetic algorithm in dual transform domain
Hajduk et al. Accelerated cover selection steganography
Rahmani et al. A novel legitimacy preserving data hiding scheme based on LAS compressed code of VQ index tables
Wöhnert et al. A study on the use of perceptual hashing to detect manipulation of embedded messages in images