Study on Information Hiding Technology Based on Digital Image
نویسندگان
چکیده
منابع مشابه
study of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Digital Image Data Hiding Using Side Information
Robustness is a key issue for many prospective applications of data hiding technologies. The proposal to take into account side information at the encoder has meant a noteworthy advance in the quest for better data hiding methods. Still, the true impact of the advantages theoretically derived from this groundbreaking idea has not been sufficiently founded in practice. Departing from this situat...
متن کاملHiding Text Information in a Digital Image Based on Entropy Function
The paper is concerned with hiding information into a digital image, specifically, an English text is used to be hidden into a digital grey-scale image. The purpose of this research is to embed a maximum text data size into the most suitable image selected among several images based on the binary entropy function measurements of both the text and image. The embedding process is constrained by m...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملA Robust Digital Image Watermarking Scheme Based on DWT
In this paper a wavelet-based logo watermarking scheme is presented. The logo watermark is embedded into all sub-blocks of the LLn sub-band of the transformed host image, using quantization technique. Extracted logos from all sub-blocks are merged to make the extracted watermark from distorted watermarked image. Knowing the quantization step-size, dimensions of logo and the level of wavelet tra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2018
ISSN: 1757-899X
DOI: 10.1088/1757-899x/394/3/032140