Houssein et al., 2016 - Google Patents
An image steganography algorithm using haar discrete wavelet transform with advanced encryption systemHoussein et al., 2016
View PDF- Document ID
- 10141781979145459501
- Author
- Houssein E
- Ali M
- Hassanien A
- Publication year
- Publication venue
- 2016 Federated Conference on Computer Science and Information Systems (FedCSIS)
External Links
Snippet
The security of data over the internet is a crucial thing specially if this data is personal or confidential. The transmitted data can be intercepted during its journey from device to another. For that reason, we are willing to develop a simple method to secure data. Data …
- 238000000034 method 0 abstract description 34
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/169—Systems operating in the time domain of the television signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tedmori et al. | Image cryptographic algorithm based on the Haar wavelet transform | |
Zhou et al. | Image encryption using P-Fibonacci transform and decomposition | |
Houssein et al. | An image steganography algorithm using haar discrete wavelet transform with advanced encryption system | |
Khamrui et al. | A genetic algorithm based steganography using discrete cosine transformation (GASDCT) | |
Patel et al. | Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption | |
Saeed | A new technique based on chaotic steganography and encryption text in DCT domain for color image | |
Banik et al. | Secret sharing using 3 level DWT method of image steganography based on Lorenz chaotic encryption and visual cryptography | |
Tuncer et al. | Improved reference image encryption methods based on 2 k correction in the integer wavelet domain | |
Sakkara et al. | Integer wavelet based secret data hiding by selecting variable bit length | |
Nadiya et al. | Image steganography in DWT domain using double-stegging with RSA encryption | |
Kalita et al. | A comparative study of steganography algorithms of spatial and transform domain | |
Mohamed et al. | Hybrid DCT-DWT watermarking and IDEA encryption of internet contents | |
Sun et al. | A Novel Image Steganography Based on Contourlet Transform and Hill Cipher. | |
Gupta et al. | An improved image steganography technique using block division & least significant bit approach | |
Degadwala et al. | High Capacity Image Steganography Using Curvelet Transform and Bit Plane Slicing. | |
Thakur et al. | Enhance steganography techniques: A solution for image security | |
Chalam et al. | Unified Approach with Neural Network for Authentication, Security and Compression of Image: UNICAP | |
Vinod et al. | A Hybrid Algorithm for Secure Image based Encryption and Steganographic Technique in combination with DET and AES Algorithms | |
Al-Halabi | A symmetric key based steganography calculation for anchored information | |
Zou et al. | A meaningful image encryption algorithm based on prediction error and wavelet transform | |
Anoop et al. | A full image encryption scheme based on transform domains and stream ciphers | |
Debnath et al. | An Approach Towards Data Security Based on DCT and Chaotic Map | |
Sridharan | Secure authentication scheme for images using double random phase encoding and jsteg steganography | |
Negrat et al. | Variable length encoding in multiple frequency domain steganography | |
Khudhair | An Efficient Image Encryption Technique by Using Cascaded Combined Permutation |