[go: up one dir, main page]

Houssein et al., 2016 - Google Patents

An image steganography algorithm using haar discrete wavelet transform with advanced encryption system

Houssein et al., 2016

View PDF
Document ID
10141781979145459501
Author
Houssein E
Ali M
Hassanien A
Publication year
Publication venue
2016 Federated Conference on Computer Science and Information Systems (FedCSIS)

External Links

Snippet

The security of data over the internet is a crucial thing specially if this data is personal or confidential. The transmitted data can be intercepted during its journey from device to another. For that reason, we are willing to develop a simple method to secure data. Data …
Continue reading at annals-csis.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/169Systems operating in the time domain of the television signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Tedmori et al. Image cryptographic algorithm based on the Haar wavelet transform
Zhou et al. Image encryption using P-Fibonacci transform and decomposition
Houssein et al. An image steganography algorithm using haar discrete wavelet transform with advanced encryption system
Khamrui et al. A genetic algorithm based steganography using discrete cosine transformation (GASDCT)
Patel et al. Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption
Saeed A new technique based on chaotic steganography and encryption text in DCT domain for color image
Banik et al. Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography
Tuncer et al. Improved reference image encryption methods based on 2 k correction in the integer wavelet domain
Sakkara et al. Integer wavelet based secret data hiding by selecting variable bit length
Nadiya et al. Image steganography in DWT domain using double-stegging with RSA encryption
Kalita et al. A comparative study of steganography algorithms of spatial and transform domain
Mohamed et al. Hybrid DCT-DWT watermarking and IDEA encryption of internet contents
Sun et al. A Novel Image Steganography Based on Contourlet Transform and Hill Cipher.
Gupta et al. An improved image steganography technique using block division & least significant bit approach
Degadwala et al. High Capacity Image Steganography Using Curvelet Transform and Bit Plane Slicing.
Thakur et al. Enhance steganography techniques: A solution for image security
Chalam et al. Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP
Vinod et al. A Hybrid Algorithm for Secure Image based Encryption and Steganographic Technique in combination with DET and AES Algorithms
Al-Halabi A symmetric key based steganography calculation for anchored information
Zou et al. A meaningful image encryption algorithm based on prediction error and wavelet transform
Anoop et al. A full image encryption scheme based on transform domains and stream ciphers
Debnath et al. An Approach Towards Data Security Based on DCT and Chaotic Map
Sridharan Secure authentication scheme for images using double random phase encoding and jsteg steganography
Negrat et al. Variable length encoding in multiple frequency domain steganography
Khudhair An Efficient Image Encryption Technique by Using Cascaded Combined Permutation