[go: up one dir, main page]

Radhakrishnan et al., 2005 - Google Patents

Data Masking: A New Approach for Data Hiding?

Radhakrishnan et al., 2005

View PDF
Document ID
16785199031388034188
Author
Radhakrishnan R
Kharrazi M
Memon N
Publication year
Publication venue
Journal of VLSI Signal Processing Systems

External Links

Snippet

It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. Hence …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations

Similar Documents

Publication Publication Date Title
Radhakrishnan et al. Data masking: A new approach for steganography?
Cvejic Algorithms for audio watermarking and steganography
Renza et al. Authenticity verification of audio signals based on fragile watermarking for audio forensics
Kheddar et al. Pitch and fourier magnitude based steganography for hiding 2.4 kbps melp bitstream
Sadkhan et al. Recent audio steganography trails and its quality measures
Baziyad et al. Maximizing embedding capacity for speech steganography: a segment-growing approach
Radhakrishnan et al. Data masking: a secure-covert channel paradigm
Ramya et al. Steganography based data hiding for security applications
Baziyad et al. 64-bit quantization: Taking payload capacity of speech steganography to the limits
US7231271B2 (en) Steganographic method for covert audio communications
Rajanarayanan et al. Recent developments in signal encryption–A critical survey
Wu et al. Fragile speech watermarking for content integrity verification
Kheddar et al. Fourier magnitude-based steganography for hiding 2.4 kbpsmelp secret speech
El-Khamy et al. Robust image hiding in audio based on integer wavelet transform and Chaotic maps hopping
Khan et al. Steganography between silence intervals of audio in video content using chaotic maps
Bhattacharyya et al. Image data hiding technique using discrete Fourier transformation
Al-Ghamdi et al. Improve the security for voice cryptography in the RSA algorithm
Yuan Digital Watermarking-Based Authentication Techniques for Real-Time Multimedia Communication
Radhakrishnan et al. Data Masking: A New Approach for Data Hiding?
Shabariram et al. Secure Computation offloading in Edge-Assisted Cloud Ecosystem
Paniker Enhancing data security using text cryptography and multimedia steganography
Bhattacharyya et al. A novel audio steganography technique by M16MA
Slobodyanyuk et al. Least Significant Bit Methods for Concealing Messages in Telecommunication Systems
Su et al. Hierarchical selective encryption for G. 729 speech based on bit sensitivity
Pal et al. Designing secure and survivable stegosystems