+

Zhou et al., 2021 - Google Patents

Research on reversible ciphertext field information hiding algorithm based on data stream

Zhou et al., 2021

Document ID
3581323924917202042
Author
Zhou C
Jiang Z
Publication year
Publication venue
2021 Global Reliability and Prognostics and Health Management (PHM-Nanjing)

External Links

Snippet

At present, the reversible information hiding algorithm in ciphertext domain preprocesses the data stream according to the length of the data stream, which leads to the low information entropy of the hidden data stream. According to the length of data stream and transmission …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems

Similar Documents

Publication Publication Date Title
Yu et al. Reversible data hiding in encrypted images with secret sharing and hybrid coding
Yang et al. A visually meaningful image encryption scheme based on lossless compression SPIHT coding
Mukhedkar et al. Secure non real time image encryption algorithm development using cryptography & steganography
CN102123026A (en) Chaos and hyperchaos based two-level video streaming media encryption method
Sasidharan et al. A fast partial image encryption scheme with wavelet transform and RC4
Madhu et al. An overview of image security techiques
Islam et al. Denoising and error correction in noisy AES-encrypted images using statistical measures
Ren et al. A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment
CN117294799A (en) Ciphertext domain reversible hiding method based on image secret sharing and hierarchical embedding
Li et al. Fidelity preserved data hiding in encrypted highly autocorrelated data based on homomorphism and compressive sensing
Liu et al. Image processing method based on chaotic encryption and wavelet transform for planar design
CN104794673B (en) Utilize the encrypted domain reversible digital watermarking implementation method of highest significant position
Niu et al. JPEG encryption with file size preservation
Ye et al. Research on image scrambling method based on combination of Arnold transform and exclusive-or operation
Hraini et al. Joint crypto-compression based on selective encryption for WMSNs
Zhou et al. Research on reversible ciphertext field information hiding algorithm based on data stream
Ye et al. Secure multimedia big data sharing in social networks using fingerprinting and encryption in the jpeg2000 compressed domain
CN115578241A (en) Image double-encryption method, system, computer equipment, medium and terminal
CN101895539B (en) Scrambling-based method for combining multimedia data active encryption and passive protection
Deng et al. Achieving Lightweight Privacy‐Preserving Image Sharing and Illegal Distributor Detection in Social IoT
Riad et al. A new selective image encryption approach using hybrid chaos and block cipher
Talal et al. Steganographic Data Hiding using Quantum Behaved Particle Swarm Optimization and an enhanced AES algorithm
CN108205793A (en) It is a kind of for static image based on chaotic key encryption method
Francis-Christie et al. A combination of active and passive video steganalysis to fight sensitive data exfiltration through online video
Wang et al. A chaos-based steganography algorithm for H. 264 standard video sequences
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载