Saturwar et al., 2013 - Google Patents
Digital watermarking scheme for secret images using visual cryptographySaturwar et al., 2013
View PDF- Document ID
- 3313315471324046876
- Author
- Saturwar J
- Chaudhari D
- Publication year
- Publication venue
- Int. J. Sci. Eng. Res
External Links
Snippet
the extreme development of internet has made the transmission, distribution and access to digital media very convenient. So, media producers are more frequently dealing with illegal and unauthorized usage of their productions. Over the last two decades, digital …
- 230000000007 visual effect 0 title abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tao et al. | Robust image watermarking theories and techniques: A review | |
| Roy et al. | Chaos based edge adaptive image steganography | |
| Zhang et al. | A novel encryption frame for medical image with watermark based on hyperchaotic system | |
| Mandal | Modern Steganographic technique: A survey | |
| Bhatt et al. | Image steganography and visible watermarking using LSB extraction technique | |
| Saturwar et al. | Secure visual secret sharing scheme for color images using visual cryptography and digital watermarking | |
| Goyal et al. | Improved detection of 1-2-4 lsb steganography and rsa cryptography in color and grayscale images | |
| Mishra et al. | A survey on digital watermarking techniques | |
| CN104794673B (en) | Utilize the encrypted domain reversible digital watermarking implementation method of highest significant position | |
| Shankar et al. | Puzzle based highly secure steganography | |
| Islami et al. | Bit adjusting image steganography in blue channel using AES and secured Hash function | |
| Swain et al. | A robust image steganography technique using dynamic embedding with two least significant bits | |
| Alam et al. | Analysis of modified triple—A steganography technique using Fisher Yates algorithm | |
| Kaur et al. | Xor-edge based video steganography and testing against chi-square steganalysis | |
| Gogoi et al. | Image and Video based double watermark extraction spread spectrum watermarking in low variance region | |
| Raj et al. | A survey on reversible data hiding in encrypted image | |
| Saturwar et al. | Digital watermarking scheme for secret images using visual cryptography | |
| Yan-yan et al. | A watermarking-based visual cryptography scheme with meaningful shares | |
| Kashyap et al. | Authenticating encrypted data | |
| Mahule et al. | Analysis of image security techniques using digital image watermarking in spatial domain | |
| Nag et al. | A novel copyright protection scheme using visual cryptography | |
| Mishra et al. | A review paper on digital watermarking techniques & its applications | |
| Saturwar et al. | Performance Evaluation of watermarking Schemes to Decide Meaningful Number of Shares | |
| Asiri et al. | A Survey of Reversible Data Hiding in Encrypted Images. | |
| Zhang et al. | A novel image authentification based on semi-fragile watermarking |