Bhowal et al. - Google Patents
Secured Genetic Algorithm based image hiding technique with location number compressionBhowal et al.
View PDF- Document ID
- 5501511986053457682
- Author
- Bhowal K
- Sarkar D
- Biswas S
- Sarkar P
External Links
Snippet
Data hiding involves hiding of information in a cover media to obtain the indistinguishable media, in such a way that the cover media is supposed not to have any embedded image for its unintended recipients. Steganography and Watermarking are main parts of the fast …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dutta et al. | Data hiding in audio signal: A review | |
Nosrati et al. | Audio steganography: a survey on recent approaches | |
Ahmed et al. | A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm | |
Bhowal et al. | A GA based audio steganography with enhanced security | |
Moon et al. | Data security using data hiding | |
Singh | A comparative study of audio steganography techniques | |
Bazyar et al. | A new method to increase the capacity of audio steganography based on the LSB algorithm | |
Bhowal et al. | Audio steganography using GA | |
Goenka et al. | Overview of audio watermarking techniques | |
Huang et al. | A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme | |
Basu et al. | On embedding of text in audio a case of steganography | |
Dastoor | Comparative analysis of Steganographic algorithms intacting the information in the speech signal for enhancing the message security in next generation mobile devices | |
Bhowal et al. | Secured Genetic Algorithm based image hiding technique with location number compression | |
Bhowal et al. | Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions. | |
Yadnya et al. | Using Phase Coding Method for Audio Steganography with the Stream Cipher Encrypt Technique | |
Bhattacharyya et al. | A novel audio steganography technique by M16MA | |
Singh et al. | A survey on Steganography in Audio | |
Kurzekar et al. | A proposed method for audio steganography using digital information security | |
Bhowal et al. | An efficient steganographic approach to hide information in digital audio using modulus operation. | |
Dhavale et al. | High capacity lossless semi-fragile audio watermarking in the time domain | |
Jaafar et al. | Encrypted Text Steganography in Audio Files Using ECC, LSB and Chaotic Maps | |
Aigal et al. | Hiding Data in Wave Files | |
Anguraj et al. | A structured system of embedded based on artificial intelligence by incorporating genetic algorithm | |
Bhowal et al. | Secured image transmission with GA based Audio Steganography | |
Lin et al. | Robust audio watermarking technique based on gammatone filterbank and coded-image |