Shahreza, 2005 - Google Patents
An improved method for steganography on mobile phone.Shahreza, 2005
View PDF- Document ID
- 8867393596325879815
- Author
- Shahreza M
- Publication year
- Publication venue
- WSEAS Transactions on Systems
External Links
Snippet
In this paper I introduce an improved method for hiding data in images or steganography. This method is used for secure data transfer from a computer to mobile phones. In this method a message can hide in an image on a PC using a password. The user can …
- 239000003086 colorant 0 description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shahreza | An improved method for steganography on mobile phone. | |
Kumar et al. | A recent survey on multimedia and database watermarking | |
Dhawan et al. | Analysis of various data security techniques of steganography: A survey | |
Muhammad et al. | Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy | |
US8059815B2 (en) | Transforming data files into logical storage units for auxiliary data through reversible watermarks | |
Bandyopadhyay et al. | A novel secure image steganography method based on chaos theory in spatial domain | |
TW522722B (en) | Method of integrating a watermark into a compressed image | |
US20130236046A1 (en) | Method, system, and computer-readable medium for detecting leakage of a video | |
Joseph et al. | A study on steganographic techniques | |
Şahin et al. | Review of the Literature on the Steganography Concept | |
Kaur et al. | Encryption based LSB steganography technique for digital images and text data | |
Jain et al. | Review on digital watermarking techniques and its retrieval | |
Tsai et al. | An efficient image watermarking method based on fast discrete cosine transform algorithm | |
Hernandez et al. | A fragile watermarking scheme for image authentication in mobile devices | |
Suhail et al. | A strong algorithm for randomly hiding a secret files inside true color image using large primary secret key | |
Parthasarathy et al. | LZW Data Compression For Fsp Algorithm | |
Yeh et al. | Content-based watermarking in image authentication allowing remedying of tampered images | |
US20040034602A1 (en) | Method and apparatus for watermarking binary computer code | |
Michaylov | Exploring the use of steganography and steganalysis in forensic investigations for analysing digital evidence | |
Aboelezz | Watermarking audio files with copyrights | |
Dhanashri et al. | Mms steganography for smartphone devices | |
Badgaiyan et al. | A New Steganographic Technique: Image Hiding in Mobile Application | |
Ghani et al. | Watermarking Techniques for Mobile Application: A Review | |
Kankana et al. | A robust audio authentication scheme using (11, 7) hamming error correcting code | |
Bhattacharyya et al. | Handwritten signature authentication scheme using integrated statistical analysis of bi-color images |