Dragoi et al., 2017 - Google Patents
Improved reversible data hiding in encrypted images based on reserving room after encryption and pixel predictionDragoi et al., 2017
View PDF- Document ID
- 12554058271628152129
- Author
- Dragoi I
- Coanda H
- Coltuc D
- Publication year
- Publication venue
- 2017 25th European Signal Processing Conference (EUSIPCO)
External Links
Snippet
This paper proposes a new vacating room after encryption reversible data hiding scheme. Both joint and separate methods are presented. The most interesting features of the proposed scheme are the two staged embedding/decoding process and the group parity …
- 230000002441 reversible 0 title abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Dragoi et al. | Improved reversible data hiding in encrypted images based on reserving room after encryption and pixel prediction | |
| Chen et al. | High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement | |
| Chang et al. | Sharing secrets in stego images with authentication | |
| US20030152225A1 (en) | Digital watermarking system using scrambling method | |
| Gayathri et al. | Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme | |
| Chang et al. | A sudoku-based secret image sharing scheme with reversibility | |
| US8144870B2 (en) | Encoding and detecting apparatus | |
| US20100226425A1 (en) | Encoding and detecting apparatus | |
| Puteaux et al. | High-capacity data hiding in encrypted images using MSB prediction | |
| CN104702814B (en) | (K, N) Image of Meaningful based on triple backups point is deposited and restoration methods | |
| Kingsley et al. | Improving Data Hiding Capacity in Code Based Steganography using Multiple Embedding. | |
| Bravo-Solorio et al. | Watermarking method with exact self-propagating restoration capabilities | |
| Yin et al. | Separable reversible data hiding in encrypted image with classification permutation | |
| Wu et al. | A new approach to the secret image sharing with steganography and authentication | |
| Kukreja et al. | A secure reversible data hiding scheme for digital images using random grid visual secret sharing | |
| Chen et al. | High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting | |
| Kumar et al. | Secured patient information transmission using reversible watermarking and DNA Encrytion for medical images | |
| Dragoi et al. | Improved pairwise embedding for high-fidelity reversible data hiding | |
| Panchikkil et al. | A Random-key Based Second-level Encryption for Reversible Data Hiding in Encrypted Images | |
| Fathimala et al. | K out of N secret sharing scheme for gray and color images | |
| Kumar et al. | Optimizing Reversible Data Hiding using Sparsity-informed Bit-plane Encryption | |
| Shukla et al. | Enhancing security & integrity of data using watermarking & digital signature | |
| Naseem et al. | Reversible and Robust Watermarking using Residue Number System and Product Codes. | |
| Liang et al. | A blind data hiding technique with error correction abilities and a high embedding payload | |
| Chen et al. | Self-recovery fragile watermarking scheme with variable watermark payload |