[go: up one dir, main page]

Molaei et al., 2017 - Google Patents

Steganography scheme based on Reed-Muller Code with improving payload and ability to Retrieval of Destroyed data for digital images

Molaei et al., 2017

View PDF
Document ID
2936881888889347320
Author
Molaei A
Sedaaghi M
Ebrahimnezhad H
Publication year
Publication venue
AUT Journal of Electrical Engineering

External Links

Snippet

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low …
Continue reading at eej.aut.ac.ir (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H03BASIC ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M7/00Conversion of a code where information is represented by a given sequence or number of digits to a code where the same information or similar information or a subset of information is represented by a different sequence or number of digits
    • H03M7/30Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding, e.g. from bit-mapped to non bit-mapped
    • G06T9/005Statistical coding, e.g. Huffman, run length coding

Similar Documents

Publication Publication Date Title
Lu et al. Multipurpose image watermarking algorithm based on multistage vector quantization
Chang et al. A lossless data embedding technique by joint neighboring coding
Kim et al. Separable reversible data hiding in encrypted halftone image
Chan et al. A HDWT-based reversible data hiding method
Chang et al. A reversible compression code hiding using SOC and SMVQ indices
Kumar et al. An optimal high capacity reversible data hiding scheme using move to front coding for LZW codes
Huang et al. Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction.
Sanjalawe et al. A deep learning-driven multi-layered steganographic approach for enhanced data security
Kim et al. Data hiding based on overlapped pixels using hamming code
Chang et al. Reversible index-domain information hiding scheme based on side-match vector quantization
Ranjani Data hiding using pseudo magic squares for embedding high payload in digital images
Molaei et al. Steganography scheme based on Reed-Muller Code with improving payload and ability to Retrieval of Destroyed data for digital images
Hajizadeh et al. A new high capacity and EMD-based image steganography scheme in spatial domain
Kingsley et al. Improving Data Hiding Capacity in Code Based Steganography using Multiple Embedding.
Chang et al. Reversible steganography for BTC-compressed images
Makarov et al. Comparative analysis of halftoning algorithms for digital watermarking
Ritchey et al. A Context Sensitive Tiling System for Information Hiding.
Nayak et al. A threshold-LSB based information hiding scheme using digital images
Beroual et al. A review of steganographic methods and techniques
Thahab A secure image steganography based on burrows wheeler transform and dynamic bit embedding
Kanzariya et al. Security of digital images using steganography techniques based on LSB, DCT and Huffman encoding
Chang et al. Reversible data hiding scheme for VQ indices based on absolute difference trees
Mandal et al. Variant of LSB steganography algorithm for hiding information in RGB images
Jiang et al. A self-contained steganography combining LSB substitution with MSB matching
Naseem et al. Reversible and Robust Watermarking using Residue Number System and Product Codes.