Malik et al., 2020 - Google Patents
A reversible data hiding scheme for interpolated images based on pixel intensity rangeMalik et al., 2020
- Document ID
- 5864684019878815064
- Author
- Malik A
- Sikka G
- Verma H
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
In this paper, we propose a novel interpolation and a new reversible data hiding scheme for upscaling the original image and hiding secret data into the upscaled/interpolated image. This data hiding scheme considers the characteristics of the human visual system while …
- 230000002441 reversible 0 title abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0083—Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T3/00—Geometric image transformation in the plane of the image, e.g. from bit-mapped to bit-mapped creating a different image
- G06T3/40—Scaling the whole image or part thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration, e.g. from bit-mapped to bit-mapped creating a similar image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Malik et al. | A reversible data hiding scheme for interpolated images based on pixel intensity range | |
Ahmadi et al. | An intelligent and blind dual color image watermarking for authentication and copyright protection | |
Subhedar et al. | Current status and key issues in image steganography: A survey | |
Hassan et al. | Efficient image reversible data hiding technique based on interpolation optimization | |
Kieu et al. | A steganographic scheme by fully exploiting modification directions | |
Malik et al. | Recovery based high capacity reversible data hiding scheme using even-odd embedding | |
Malik et al. | An AMBTC compression based data hiding scheme using pixel value adjusting strategy | |
Chowdhuri et al. | Hiding data in dual color images reversibly via weighted matrix | |
Rajkumar et al. | Reversible and robust image watermarking based on histogram shifting | |
Shen et al. | A novel adaptive data hiding based on improved EMD and interpolation | |
Pal et al. | A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix | |
Soualmi et al. | A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence | |
Lee et al. | Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding | |
Kiani et al. | A multi-purpose digital image watermarking using fractal block coding | |
Avci et al. | A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain | |
Pal et al. | Robust watermarking scheme for tamper detection and authentication exploiting CA | |
Meenakshi et al. | A hybrid matrix factorization technique to free the watermarking scheme from false positive and negative problems | |
Shahadi et al. | A novel robust approach for image copyright protection based on concentric rectangles | |
Panchikkil et al. | A pseudo-random pixel mapping with weighted mesh graph approach for reversible data hiding in encrypted image | |
Datta et al. | Robust data hiding scheme for highly compressed image exploiting btc with hamming code | |
Meikap et al. | Context pixel-based reversible data hiding scheme using pixel value ordering | |
Khosravi et al. | A novel joint secret image sharing and robust steganography method using wavelet | |
Ouyang et al. | A semi-fragile reversible watermarking method based on qdft and tamper ranking | |
Barani et al. | Image forgery detection in contourlet transform domain based on new chaotic cellular automata | |
Shastri et al. | Interpolation based dual image reversible data hiding using trinary encoding |