+

Saturwar et al., 2013 - Google Patents

Digital watermarking scheme for secret images using visual cryptography

Saturwar et al., 2013

View PDF
Document ID
3313315471324046876
Author
Saturwar J
Chaudhari D
Publication year
Publication venue
Int. J. Sci. Eng. Res

External Links

Snippet

the extreme development of internet has made the transmission, distribution and access to digital media very convenient. So, media producers are more frequently dealing with illegal and unauthorized usage of their productions. Over the last two decades, digital …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
Tao et al. Robust image watermarking theories and techniques: A review
Roy et al. Chaos based edge adaptive image steganography
Zhang et al. A novel encryption frame for medical image with watermark based on hyperchaotic system
Mandal Modern Steganographic technique: A survey
Bhatt et al. Image steganography and visible watermarking using LSB extraction technique
Saturwar et al. Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking
Goyal et al. Improved detection of 1-2-4 lsb steganography and rsa cryptography in color and grayscale images
Mishra et al. A survey on digital watermarking techniques
CN104794673B (en) Utilize the encrypted domain reversible digital watermarking implementation method of highest significant position
Shankar et al. Puzzle based highly secure steganography
Islami et al. Bit adjusting image steganography in blue channel using AES and secured Hash function
Swain et al. A robust image steganography technique using dynamic embedding with two least significant bits
Alam et al. Analysis of modified triple—A steganography technique using Fisher Yates algorithm
Kaur et al. Xor-edge based video steganography and testing against chi-square steganalysis
Gogoi et al. Image and Video based double watermark extraction spread spectrum watermarking in low variance region
Raj et al. A survey on reversible data hiding in encrypted image
Saturwar et al. Digital watermarking scheme for secret images using visual cryptography
Yan-yan et al. A watermarking-based visual cryptography scheme with meaningful shares
Kashyap et al. Authenticating encrypted data
Mahule et al. Analysis of image security techniques using digital image watermarking in spatial domain
Nag et al. A novel copyright protection scheme using visual cryptography
Mishra et al. A review paper on digital watermarking techniques & its applications
Saturwar et al. Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares
Asiri et al. A Survey of Reversible Data Hiding in Encrypted Images.
Zhang et al. A novel image authentification based on semi-fragile watermarking
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载