[go: up one dir, main page]

Nehru et al., 2012 - Google Patents

A detailed look of audio steganography techniques using LSB and genetic algorithm approach

Nehru et al., 2012

Document ID
9180905228433448977
Author
Nehru G
Dhar P
Publication year
Publication venue
International Journal of Computer Science Issues (IJCSI)

External Links

Snippet

This paper is the study of various techniques of audio steganography using different algorithmis like genetic algorithm approach and LSB approach. We have tried some approaches that helps in audio steganography. As we know it is the art and science of …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
Nehru et al. A detailed look of audio steganography techniques using LSB and genetic algorithm approach
Jayaram et al. Information hiding using audio steganography–a survey
Bandyopadhyay et al. A tutorial review on steganography
Dutta et al. Data hiding in audio signal: A review
Bhowal et al. A GA based audio steganography with enhanced security
Nosrati et al. Audio steganography: a survey on recent approaches
Steinebach et al. Watermarking-based digital audio data authentication
Meligy et al. An efficient method to audio steganography based on modification of least significant bit technique using random keys
Zamani et al. An approach to improve the robustness of substitution techniques of audio steganography
Ghoshal et al. A novel technique for image authentication in frequency domain using discrete Fourier transformation technique (IAFDDFTT)
Pawar et al. Review on steganography for hiding data
Kondo Multimedia Information Hiding Technologies and Methodologies for Controlling Data
Kekre et al. Increasing the capacity of the cover audio signal by using multiple LSBs for information hiding
Katariya Digital watermarking
Ahuja et al. A survey of digital watermarking scheme
Singh et al. A survey on Steganography in Audio
Bhowal et al. Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions.
Ur-Rehman et al. Digital watermarking for image authentication
Parab et al. Audio steganography using differential phase encoding
Khurana Watermarking and information-hiding
Shrestha et al. Audio Steganography
Bhitre et al. A review on audio and video based steganography for data hiding
Kumar et al. DWT and LSB based Audio Steganography-A Review
Shan Wavelet domain self synchronization digital audio watermarking algorithm based on channel information
Nsayif Text in Audio Steganography