Al-Rawi et al., 2013 - Google Patents
Image authentication using stochastic diffusionAl-Rawi et al., 2013
View PDF- Document ID
- 7466594729848948282
- Author
- Al-Rawi A
- Blackledge J
- Publication year
- Publication venue
- 2013 UKSim 15th International Conference on Computer Modelling and Simulation
External Links
Snippet
This paper considers an approach to encrypted information hiding based on Stochastic Diffusion for encrypting digital images coupled with the application of a Least Significant Bit (LSB) method for information embedding. After providing a brief summary of various …
- 238000009792 diffusion process 0 title abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2351288A2 (en) | An encryption method | |
| Lin et al. | Public-key-based optical image cryptosystem based on data embedding techniques | |
| Patel et al. | Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption | |
| Dharmika et al. | Privacy preservation of medical health records using symmetric block cipher and frequency domain watermarking techniques | |
| Fkirin et al. | Two-level security approach combining watermarking and encryption for securing critical colored images | |
| Al-Bahadili | A secure block permutation image steganography algorithm | |
| Ganavi et al. | Two-layer security of images using elliptic curve cryptography with discrete wavelet transform | |
| Ahmed et al. | A perceptually scalable and jpeg compression tolerant image encryption scheme | |
| Shankar et al. | Puzzle based highly secure steganography | |
| Al-Rawi et al. | Image authentication using stochastic diffusion | |
| De et al. | A new robust and fragile scheme based on chaotic maps and dwt for medical image security | |
| Alfadhli et al. | Enhancing standard encryption algorithms using multilayers encryption technique | |
| Das et al. | Secure Digital Image Watermarking Technique Based on ResNet-50 Architecture. | |
| Sabharwal et al. | Association schemes in encrypting two dimensional data | |
| Mohamed et al. | Hybrid DCT-DWT watermarking and IDEA encryption of internet contents | |
| Deepthi et al. | Pre encryption data hiding techniques using reserving room approach | |
| Thepade et al. | Appraise of multifarious image steganography techniques | |
| Bhatnagar et al. | Encryption based robust watermarking in fractional wavelet domain | |
| Alwan et al. | A survey on combined various data hiding techniques | |
| Hue et al. | Data Hiding in Bit-plane Medical Image Using Chaos-based Steganography | |
| Kundur et al. | A stenographic framework for dual authentication and compression of high resolution imagery | |
| Battisti et al. | Watermarking and encryption of color images in the Fibonacci domain | |
| Saber et al. | Utilizing variable hiding centers and dynamic block sizes to improve image steganography | |
| Rengarajan | DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM. | |
| Priyanka et al. | A steganographic system for embedding image and encrypted text |