Zhou et al., 2021 - Google Patents
Research on reversible ciphertext field information hiding algorithm based on data streamZhou et al., 2021
- Document ID
- 3581323924917202042
- Author
- Zhou C
- Jiang Z
- Publication year
- Publication venue
- 2021 Global Reliability and Prognostics and Health Management (PHM-Nanjing)
External Links
Snippet
At present, the reversible information hiding algorithm in ciphertext domain preprocesses the data stream according to the length of the data stream, which leads to the low information entropy of the hidden data stream. According to the length of data stream and transmission …
- 238000004422 calculation algorithm 0 title abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yu et al. | Reversible data hiding in encrypted images with secret sharing and hybrid coding | |
| Yang et al. | A visually meaningful image encryption scheme based on lossless compression SPIHT coding | |
| Mukhedkar et al. | Secure non real time image encryption algorithm development using cryptography & steganography | |
| CN102123026A (en) | Chaos and hyperchaos based two-level video streaming media encryption method | |
| Sasidharan et al. | A fast partial image encryption scheme with wavelet transform and RC4 | |
| Madhu et al. | An overview of image security techiques | |
| Islam et al. | Denoising and error correction in noisy AES-encrypted images using statistical measures | |
| Ren et al. | A visually secure image encryption scheme based on compressed sensing and Chebyshev-dynamics coupled map lattices in cloud environment | |
| CN117294799A (en) | Ciphertext domain reversible hiding method based on image secret sharing and hierarchical embedding | |
| Li et al. | Fidelity preserved data hiding in encrypted highly autocorrelated data based on homomorphism and compressive sensing | |
| Liu et al. | Image processing method based on chaotic encryption and wavelet transform for planar design | |
| CN104794673B (en) | Utilize the encrypted domain reversible digital watermarking implementation method of highest significant position | |
| Niu et al. | JPEG encryption with file size preservation | |
| Ye et al. | Research on image scrambling method based on combination of Arnold transform and exclusive-or operation | |
| Hraini et al. | Joint crypto-compression based on selective encryption for WMSNs | |
| Zhou et al. | Research on reversible ciphertext field information hiding algorithm based on data stream | |
| Ye et al. | Secure multimedia big data sharing in social networks using fingerprinting and encryption in the jpeg2000 compressed domain | |
| CN115578241A (en) | Image double-encryption method, system, computer equipment, medium and terminal | |
| CN101895539B (en) | Scrambling-based method for combining multimedia data active encryption and passive protection | |
| Deng et al. | Achieving Lightweight Privacy‐Preserving Image Sharing and Illegal Distributor Detection in Social IoT | |
| Riad et al. | A new selective image encryption approach using hybrid chaos and block cipher | |
| Talal et al. | Steganographic Data Hiding using Quantum Behaved Particle Swarm Optimization and an enhanced AES algorithm | |
| CN108205793A (en) | It is a kind of for static image based on chaotic key encryption method | |
| Francis-Christie et al. | A combination of active and passive video steganalysis to fight sensitive data exfiltration through online video | |
| Wang et al. | A chaos-based steganography algorithm for H. 264 standard video sequences |