Al Hussien et al., 2021 - Google Patents
Coverless image steganography based on optical mark recognition and machine learningAl Hussien et al., 2021
View PDF- Document ID
- 14143252975535073264
- Author
- Al Hussien S
- Mohamed M
- Hafez E
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
The most significant factor to consider during private information transmission through the internet (ie, insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used. Steganography is the scheme of securing …
- 238000010801 machine learning 0 title abstract description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3281—Encryption; Ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
- H04N2201/327—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Al Hussien et al. | Coverless image steganography based on optical mark recognition and machine learning | |
| Zhou et al. | Coverless image steganography using partial-duplicate image retrieval | |
| Qin et al. | Coverless image steganography: a survey | |
| Cao et al. | Coverless information hiding based on the molecular structure images of material. | |
| Cao et al. | High capacity reversible data hiding in encrypted images by patch-level sparse representation | |
| Zhang et al. | Reference sharing mechanism for watermark self-embedding | |
| Ahmad et al. | Data hiding based on improved exploiting modification direction method and Huffman coding | |
| Tkachenko et al. | Two-level QR code for private message sharing and document authentication | |
| Hakak et al. | Preserving content integrity of digital holy Quran: Survey and open challenges | |
| US6775394B2 (en) | Digital watermarking of binary document using halftoning | |
| Chatterjee et al. | LSB based steganography with OCR: an intelligent amalgamation | |
| Yang et al. | Provably secure generative steganography based on autoregressive model | |
| Saad et al. | Coverless Image Steganography Based on Jigsaw Puzzle Image Generation. | |
| Mukherjee et al. | An image steganography technique based on fake DNA sequence construction | |
| Iftikhar et al. | A survey on reversible watermarking techniques for relational databases | |
| Jahromi et al. | Deep learning semantic image synthesis: a novel method for unlimited capacity, high noise resistance coverless video steganography | |
| Chinniyan et al. | Image Steganography Using Deep Neural Networks. | |
| Hong et al. | An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching | |
| Yazdani et al. | A new method to persian text watermarking using curvaceous letters | |
| Rashid et al. | Topological data analysis as image steganalysis technique | |
| Taj et al. | Reversible watermarking method with low distortion for the secure transmission of medical images | |
| Chhajed et al. | Data hiding in binary images for secret and secure communication using decision tree | |
| Dong et al. | Reversible binary image watermarking method using overlapping pattern substitution | |
| Maltare et al. | A high-capacity Coverless Image Steganography Based on OMR and Mapping Rules | |
| Artiemjew et al. | Using r-indiscernibility relations to hide the presence of information for the least significant bit steganography technique |