[go: up one dir, main page]

Shahreza, 2005 - Google Patents

An improved method for steganography on mobile phone.

Shahreza, 2005

View PDF
Document ID
8867393596325879815
Author
Shahreza M
Publication year
Publication venue
WSEAS Transactions on Systems

External Links

Snippet

In this paper I introduce an improved method for hiding data in images or steganography. This method is used for secure data transfer from a computer to mobile phones. In this method a message can hide in an image on a PC using a password. The user can …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements

Similar Documents

Publication Publication Date Title
Shahreza An improved method for steganography on mobile phone.
Kumar et al. A recent survey on multimedia and database watermarking
Dhawan et al. Analysis of various data security techniques of steganography: A survey
Muhammad et al. Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy
US8059815B2 (en) Transforming data files into logical storage units for auxiliary data through reversible watermarks
Bandyopadhyay et al. A novel secure image steganography method based on chaos theory in spatial domain
TW522722B (en) Method of integrating a watermark into a compressed image
US20130236046A1 (en) Method, system, and computer-readable medium for detecting leakage of a video
Joseph et al. A study on steganographic techniques
Şahin et al. Review of the Literature on the Steganography Concept
Kaur et al. Encryption based LSB steganography technique for digital images and text data
Jain et al. Review on digital watermarking techniques and its retrieval
Tsai et al. An efficient image watermarking method based on fast discrete cosine transform algorithm
Hernandez et al. A fragile watermarking scheme for image authentication in mobile devices
Suhail et al. A strong algorithm for randomly hiding a secret files inside true color image using large primary secret key
Parthasarathy et al. LZW Data Compression For Fsp Algorithm
Yeh et al. Content-based watermarking in image authentication allowing remedying of tampered images
US20040034602A1 (en) Method and apparatus for watermarking binary computer code
Michaylov Exploring the use of steganography and steganalysis in forensic investigations for analysing digital evidence
Aboelezz Watermarking audio files with copyrights
Dhanashri et al. Mms steganography for smartphone devices
Badgaiyan et al. A New Steganographic Technique: Image Hiding in Mobile Application
Ghani et al. Watermarking Techniques for Mobile Application: A Review
Kankana et al. A robust audio authentication scheme using (11, 7) hamming error correcting code
Bhattacharyya et al. Handwritten signature authentication scheme using integrated statistical analysis of bi-color images