Pérez-González et al., 2001 - Google Patents
Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applicationsPérez-González et al., 2001
View PDF- Document ID
- 16866809194817301743
- Author
- Pérez-González F
- Hernández J
- Balado F
- Publication year
- Publication venue
- Signal Processing
External Links
Snippet
An overview of channel coding techniques for data hiding in still images is presented. Use of codes is helpful in reducing the bit error probability of the decoded hidden information, thus increasing the reliability of the system. First, the data hiding problem is statistically modeled …
- 238000000034 method 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Pérez-González et al. | Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications | |
| Hernández et al. | Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images | |
| US7917766B2 (en) | Stegotext encoder and decoder | |
| Hernández et al. | The impact of channel coding on the performance of spatial watermarking for copyright protection | |
| US20050165690A1 (en) | Watermarking via quantization of rational statistics of regions | |
| Avci et al. | A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain | |
| CN102509257A (en) | Human visual characteristic compressive sensing-based grayscale image tampering and detection method | |
| You et al. | Two-stage watermark removal framework for spread spectrum watermarking | |
| Mıhçak et al. | Blind image watermarking via derivation and quantization of robust semi-global statistics | |
| Liu et al. | Robust and secure image watermarking algorithm resisting JPEG compression and cropping based on Reed Solomon (RS) codes | |
| Pérez-Freire et al. | Detection in quantization-based watermarking: performance and security issues | |
| Joshi | DWT-DCT based blind audio watermarking using Arnold scrambling and Cyclic codes | |
| Wu et al. | Joint watermarking and compression using scalar quantization for maximizing robustness in the presence of additive Gaussian attacks | |
| Dutta et al. | Audio encryption and decryption algorithm in image format for secured communication | |
| Swaminathan et al. | Exploring QIM-based anti-collusion fingerprinting for multimedia | |
| Ketcham et al. | Genetic algorithm audio watermarking using multiple image-based watermarks | |
| CN108171665B (en) | A Multi-version Backup and Restricted Two-Factor Authentication Master Key (t,s,k,n) Image Sharing Method | |
| Sadasivam et al. | A message-passing approach to combating desynchronization attacks | |
| Ramanjaneyulu et al. | An oblivious and robust multiple image watermarking scheme using genetic algorithm | |
| Mostefa et al. | Quantized based image watermarking in an independent domain | |
| CN109698891B (en) | Secret image sharing method based on multiphase iterative algorithm | |
| Sharma et al. | High Payload Lossless Steganography Using Image Interpolation | |
| JP4002068B2 (en) | Digital video watermarking method | |
| Kawamura et al. | Statistical mechanical evaluation of a spread-spectrum watermarking model with image restoration | |
| Samee | Robust watermarking and its applications to communication problems |