[go: up one dir, main page]

Pérez-González et al., 2001 - Google Patents

Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications

Pérez-González et al., 2001

View PDF
Document ID
16866809194817301743
Author
Pérez-González F
Hernández J
Balado F
Publication year
Publication venue
Signal Processing

External Links

Snippet

An overview of channel coding techniques for data hiding in still images is presented. Use of codes is helpful in reducing the bit error probability of the decoded hidden information, thus increasing the reliability of the system. First, the data hiding problem is statistically modeled …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Similar Documents

Publication Publication Date Title
Pérez-González et al. Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications
Hernández et al. Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images
US7917766B2 (en) Stegotext encoder and decoder
Hernández et al. The impact of channel coding on the performance of spatial watermarking for copyright protection
US20050165690A1 (en) Watermarking via quantization of rational statistics of regions
Avci et al. A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain
CN102509257A (en) Human visual characteristic compressive sensing-based grayscale image tampering and detection method
You et al. Two-stage watermark removal framework for spread spectrum watermarking
Mıhçak et al. Blind image watermarking via derivation and quantization of robust semi-global statistics
Liu et al. Robust and secure image watermarking algorithm resisting JPEG compression and cropping based on Reed Solomon (RS) codes
Pérez-Freire et al. Detection in quantization-based watermarking: performance and security issues
Joshi DWT-DCT based blind audio watermarking using Arnold scrambling and Cyclic codes
Wu et al. Joint watermarking and compression using scalar quantization for maximizing robustness in the presence of additive Gaussian attacks
Dutta et al. Audio encryption and decryption algorithm in image format for secured communication
Swaminathan et al. Exploring QIM-based anti-collusion fingerprinting for multimedia
Ketcham et al. Genetic algorithm audio watermarking using multiple image-based watermarks
CN108171665B (en) A Multi-version Backup and Restricted Two-Factor Authentication Master Key (t,s,k,n) Image Sharing Method
Sadasivam et al. A message-passing approach to combating desynchronization attacks
Ramanjaneyulu et al. An oblivious and robust multiple image watermarking scheme using genetic algorithm
Mostefa et al. Quantized based image watermarking in an independent domain
CN109698891B (en) Secret image sharing method based on multiphase iterative algorithm
Sharma et al. High Payload Lossless Steganography Using Image Interpolation
JP4002068B2 (en) Digital video watermarking method
Kawamura et al. Statistical mechanical evaluation of a spread-spectrum watermarking model with image restoration
Samee Robust watermarking and its applications to communication problems