Yi et al., 2015 - Google Patents
An improved reversible data hiding in encrypted imagesYi et al., 2015
- Document ID
- 17882169022000948975
- Author
- Yi S
- Zhou Y
- Publication year
- Publication venue
- 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)
External Links
Snippet
This paper is an improved version of Zhang's reversibility improved data hiding method in encrypted images. The original work randomly selects p%(0<; p≤ 20) pixels from an original image to obtain the estimation error for secret data embedding. In this work, we estimate half …
- 230000002441 reversible 0 title description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | High capacity reversible data hiding in encrypted image based on adaptive MSB prediction | |
Puteaux et al. | An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images | |
Zhang et al. | Reversibility improved data hiding in encrypted images | |
Wu et al. | Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification | |
Xu et al. | Separable and error-free reversible data hiding in encrypted images | |
Qin et al. | Effective reversible data hiding in encrypted image with privacy protection for image content | |
Huang et al. | High-capacity reversible data hiding in encrypted image based on specific encryption process | |
Nguyen et al. | High capacity reversible data hiding scheme for encrypted images | |
Zhang et al. | A novel encryption frame for medical image with watermark based on hyperchaotic system | |
Xu et al. | Separable reversible data hiding in encrypted images based on two‐dimensional histogram modification | |
Yi et al. | An improved reversible data hiding in encrypted images | |
Yu et al. | Separable and error-free reversible data hiding in encrypted image based on two-layer pixel errors | |
Mathew et al. | Reversible data hiding in encrypted images by active block exchange and room reservation | |
Manikandan et al. | A novel entropy-based reversible data hiding during encryption | |
Raju et al. | A review of reversible data hiding technique based on steganography | |
Song et al. | A modified reversible data hiding in encrypted image using enhanced measurement functions | |
Puteaux et al. | High-capacity reversible data hiding in encrypted images using MSB prediction | |
Yin et al. | Separable reversible data hiding in encrypted image with classification permutation | |
Lin et al. | Reversible Data Hiding in Encrypted Images Based on Bit-plane Block Embedding. | |
Venkatesh et al. | Separable reversible data hiding by vacating room after encryption using encrypted pixel difference | |
Kaur et al. | Xor-edge based video steganography and testing against chi-square steganalysis | |
Raj et al. | A survey on reversible data hiding in encrypted image | |
Deshmukh et al. | An Effective High Level Capacity Reversible Data Hiding in Encrypted Images | |
Deepthi et al. | Pre encryption data hiding techniques using reserving room approach | |
Xu et al. | Completely separable reversible data hiding in encrypted images |