Radhakrishnan et al., 2005 - Google Patents
Data Masking: A New Approach for Data Hiding?Radhakrishnan et al., 2005
View PDF- Document ID
- 16785199031388034188
- Author
- Radhakrishnan R
- Kharrazi M
- Memon N
- Publication year
- Publication venue
- Journal of VLSI Signal Processing Systems
External Links
Snippet
It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence …
- 230000000873 masking 0 title abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Radhakrishnan et al. | Data masking: A new approach for steganography? | |
| Cvejic | Algorithms for audio watermarking and steganography | |
| Renza et al. | Authenticity verification of audio signals based on fragile watermarking for audio forensics | |
| Kheddar et al. | Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream | |
| Sadkhan et al. | Recent audio steganography trails and its quality measures | |
| Baziyad et al. | Maximizing embedding capacity for speech steganography: a segment-growing approach | |
| Radhakrishnan et al. | Data masking: a secure-covert channel paradigm | |
| Ramya et al. | Steganography based data hiding for security applications | |
| Baziyad et al. | 64-bit quantization: Taking payload capacity of speech steganography to the limits | |
| US7231271B2 (en) | Steganographic method for covert audio communications | |
| Rajanarayanan et al. | Recent developments in signal encryption–A critical survey | |
| Wu et al. | Fragile speech watermarking for content integrity verification | |
| Kheddar et al. | Fourier magnitude-based steganography for hiding 2.4 kbpsmelp secret speech | |
| El-Khamy et al. | Robust image hiding in audio based on integer wavelet transform and Chaotic maps hopping | |
| Khan et al. | Steganography between silence intervals of audio in video content using chaotic maps | |
| Bhattacharyya et al. | Image data hiding technique using discrete Fourier transformation | |
| Al-Ghamdi et al. | Improve the security for voice cryptography in the RSA algorithm | |
| Yuan | Digital Watermarking-Based Authentication Techniques for Real-Time Multimedia Communication | |
| Radhakrishnan et al. | Data Masking: A New Approach for Data Hiding? | |
| Shabariram et al. | Secure Computation offloading in Edge-Assisted Cloud Ecosystem | |
| Paniker | Enhancing data security using text cryptography and multimedia steganography | |
| Bhattacharyya et al. | A novel audio steganography technique by M16MA | |
| Slobodyanyuk et al. | Least Significant Bit Methods for Concealing Messages in Telecommunication Systems | |
| Su et al. | Hierarchical selective encryption for G. 729 speech based on bit sensitivity | |
| Pal et al. | Designing secure and survivable stegosystems |