Secure image data transmission and hiding technique: a survey
نویسندگان
چکیده
منابع مشابه
Robust and Secure Data Hiding in Image Using Biometric Technique
-Steganography method used in this paper is based on biometrics. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embe...
متن کاملTechnique for image data hiding and reconstruction without host image
A new technique for embedding image data that can be recovered in the absence of the original host image, is presented. The data to be embedded, referred to as the signature data, is inserted into the host image in the DCT domain. The signature DCT coefficients are encoded using a lattice coding scheme before embedding. Each block of host DCT coefficients is first checked for its texture conten...
متن کاملSecure and Authenticated Reversible Data Hiding in Encrypted Image
This work proposes a Secure and authenticated discrete reversible data hiding in cipher images deals with security and authentication. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data hider may compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to accommodate some additiona...
متن کاملA Secure Data Hiding System
Data hiding is the process of embedding data into a media form such as image, voice, and video. The Lest Significant Bit (LSB) is consider as the most widely used embedding technique. LSB embeds the secret message's bits into the least significant bit plane of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and att...
متن کاملDevelopment of Robust-Secure Data Hiding Technique for Color Images
The paper proposed a secure technique for color images using DCTDWT technique and AES-128 bit Key encryption algorithm for improving security of system. Host image converted to YIQ after embedding using DWT. The quality of watermark measured by metrics such as; structural similarity (SSIM) and quaternion structural similarity (QSSIM).This improves traditional methods. Experimental results prove...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACCENTS Transactions on Image Processing and Computer Vision
سال: 2016
ISSN: 2455-4707
DOI: 10.19101/tipcv.2016.22001