Data Encryption Technique for Depth-map Contents Security in DWT domain

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transparent Data Encryption -- Solution for Security of Database Contents

The present study deals with Transparent Data Encryption which is a technology used to solve the problems of security of data. Transparent Data Encryption means encrypting databases on hard disk and on any backup media. Present day global business environment presents numerous security threats and compliance challenges. To protect against data thefts and frauds we require security solutions tha...

متن کامل

Biometric Steganographic Technique Using DWT and Encryption

Steganography is the art of hiding the existence of data inanother transmission medium to achieve secret communication . Steganography method used in this paper is based on biometrics, ie biometric steganography. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure ...

متن کامل

Hybrid DCT-DWT Watermarking and IDEA Encryption of Internet Contents

Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encryption techniques. In this paper, we present a hybrid image protection scheme to establish a relation between the data encryption key and the watermark. Prepositioned secret sharing allows the reconstruction of differe...

متن کامل

Multilayer Security Based Robust Watermarking Technique for Medical Images in Dwt-dct Domain

This paper provides strongly robust digital image watermarking scheme for medical images using DWT-DCT domains. Security levels are increased by using different pn sequences, threshold values, summation of pn sequences, Arnold periodicity, Arnold scrambling, DWT and DCT domains. The medical images of 512x512 size used as cover images and grey scale hospital logo of 64x64 size is used as waterma...

متن کامل

Review on 3D Chaotic Map Encryption and Data Hiding Technique

Transmission of important data like text, images, video, etc over the internet is increases now days, hence it’s necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties, such as huge data capacity and high correlation between pixels. The older encryption techniques such as AES, DES, RTS ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Korean Institute of Information and Communication Engineering

سال: 2013

ISSN: 2234-4772

DOI: 10.6109/jkiice.2013.17.5.1245