Zhou et al., 2019 - Google Patents
Coverless image steganography using partial-duplicate image retrievalZhou et al., 2019
- Document ID
- 16389061657977624523
- Author
- Zhou Z
- Mu Y
- Wu Q
- Publication year
- Publication venue
- Soft Computing
External Links
Snippet
Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color …
- 230000004048 modification 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | Coverless image steganography using partial-duplicate image retrieval | |
Luo et al. | Coverless real-time image information hiding based on image block matching and dense convolutional network | |
Walia et al. | Digital image forgery detection: a systematic scrutiny | |
Zheng et al. | Coverless information hiding based on robust image hashing | |
Jia et al. | Saliency-based deep convolutional neural network for no-reference image quality assessment | |
Cao et al. | Coverless information hiding based on the generation of anime characters | |
Al-Qershi et al. | Evaluation of copy-move forgery detection: datasets and evaluation metrics | |
Nawaz et al. | Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform | |
Wang et al. | Perceptual hashing‐based image copy‐move forgery detection | |
Schaathun | Machine learning in image steganalysis | |
Siddiqi et al. | Image Splicing‐Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns | |
Zhang et al. | Image‐splicing forgery detection based on local binary patterns of DCT coefficients | |
Hosny et al. | Robust image hashing using exact Gaussian–Hermite moments | |
Kumar et al. | Near lossless image compression using parallel fractal texture identification | |
Liao et al. | Content‐adaptive steganalysis for color images | |
Ouyang et al. | A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion | |
Ahn et al. | End‐to‐end double JPEG detection with a 3D convolutional network in the DCT domain | |
Shaik et al. | A Secure and Robust Autoencoder‐Based Perceptual Image Hashing for Image Authentication | |
Jahromi et al. | Deep learning semantic image synthesis: a novel method for unlimited capacity, high noise resistance coverless video steganography | |
Darwish et al. | Improved color image watermarking using logistic maps and quaternion Legendre-Fourier moments | |
Liu | Self‐embedding watermarking scheme for colour images by bi‐level moment‐preserving technique | |
Li et al. | A novel large capacity coverless image steganography method based on hybrid framework of image generation-mapping | |
US20240184860A1 (en) | Methods and arrangements for providing impact imagery | |
Li et al. | Side channel steganalysis: when behavior is considered in steganographer detection | |
Halboos et al. | Improve steganography system using agents software based on statistical and classification technique |