Datta et al., 2025 - Google Patents
Dual image based secured reversible data hiding scheme exploiting huffman compression tree combining bit-reversal permutation techniqueDatta et al., 2025
- Document ID
- 8526195365625254296
- Author
- Datta K
- Jana B
- Chakraborty M
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
In the area of data hiding and information security, the greater need is to ensure high embedding capacity of the stego media without hampering the visual quality while ensuring the tightest possible security. Now, it has become one of the biggest challenge to meet all …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T9/00—Image coding, e.g. from bit-mapped to non bit-mapped
- G06T9/001—Model-based coding, e.g. wire frame
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T3/00—Geometric image transformation in the plane of the image, e.g. from bit-mapped to bit-mapped creating a different image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rakhmawati et al. | A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability | |
Gul et al. | A novel hash function based fragile watermarking method for image integrity | |
Kim et al. | Lossless data hiding for absolute moment block truncation coding using histogram modification | |
Lin et al. | A novel hybrid image authentication scheme based on absolute moment block truncation coding | |
Pal et al. | A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
Pal et al. | An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code | |
Datta et al. | Dual image based secured reversible data hiding scheme exploiting huffman compression tree combining bit-reversal permutation technique | |
Bhatnagar et al. | Secure randomized image watermarking based on singular value decomposition | |
Datta et al. | Robust data hiding scheme for highly compressed image exploiting btc with hamming code | |
Mahto et al. | Fusiw: fusion-based secure rgb image watermarking using hashing | |
Pal et al. | Robust watermarking scheme for tamper detection and authentication exploiting CA | |
Al-Otum et al. | Color image watermarking for content authentication and self-restoration applications based on a dual-domain approach | |
Hu et al. | Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification | |
Jose et al. | Comparative analysis of reversible data hiding schemes | |
Zeng et al. | Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS | |
Gao et al. | A secure lossless recovery for medical images based on image encoding and data self-embedding | |
Ragab et al. | Digital Image Steganography and Reversible Data Hiding: Algorithms, Applications and Recommendations | |
Rahman et al. | A novel and efficient digital image steganography technique using least significant bit substitution | |
Zeng et al. | Color watermarking algorithm combining the quantum discrete cosine transform with the sinusoidal–tent map | |
Chuang et al. | Joint index coding and reversible data hiding methods for color image quantization | |
Wu | Quantization-based image authentication scheme using QR error correction | |
Ling et al. | Watermarking for image authentication | |
Tchakounté et al. | An Efficient DCT-SVD Steganographic Approach Applied to JPEG Images. | |
Vinoth Kumar et al. | Encrypted separable reversible watermarking with authentication and error correction |