Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography

被引:0
|
作者
Sahu, Satya Prakash [1 ]
Verma, Satya [2 ]
机构
[1] NIT Raipur, Deptt IT, Raipur, CG, India
[2] NIT Raipur, Dept Elect Engn, Raipur, CG, India
关键词
Information Hiding; Payload; Opacity; Watermarked-steganographic Image;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid evolution of the Internet makes the transmission of digital multimedia content such as text, audio, images, and video easier. Digital media can be accessed or distributed through the network. As the communication over internet is easier and convenient, the security is the main concern. And one of the issues is authenticity of contents. There are two different approaches to achieve security and authenticity. One of the approaches for secured transmission is steganography in which secrete message is hidden behind the image. For authenticity, digital watermarking is a technique which embeds a digital signature or digital watermark that asserts the ownership or intellectual property rights of the media creator or owner, in the digital media such as text, audio, image, and video. In this paper a hybrid approach is being proposed, in which watermarking and steganography techniques have been combined, which exploits the advantages of both techniques resulting more robustness against different types of attacks.
引用
收藏
页码:595 / +
页数:2
相关论文
共 50 条
  • [41] Novel approach in watermarking of digital image
    Wah, CC
    [J]. SOFT COMPUTING IN INDUSTRIAL APPLICATIONS, 2000, : 541 - 550
  • [42] NOVEL DIGITAL AUDIO WATERMARKING APPROACH
    Duymaz, Erol
    Akan, Aydin
    [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2012, 12 (02): : 1517 - 1522
  • [43] Psychovisual approach to digital picture watermarking
    Delaigle, JF
    De Vleeschouwer, C
    Macq, B
    [J]. JOURNAL OF ELECTRONIC IMAGING, 1998, 7 (03) : 628 - 640
  • [44] Image bit depth plane digital watermarking for secured classified image data transmission
    Khandare, Shrinivas
    Shrawankar, Urmila
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 698 - 705
  • [45] Secured Digital Image Watermarking with Discrete Cosine Transform and Discrete Wavelet Transform method
    Sheth, Ravi K.
    Nath, V. V.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND AUTOMATION (ICACCA 2016), 2016, : 59 - 63
  • [46] Service Oriented Steganography A novel approach towards autonomic secured distributed heterogeneous environments
    Lalbakhsh, Pooia
    Ravanbakhsh, Sepideh
    Fesharaki, Mehdi N.
    Sohrabi, Nasrin
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 418 - +
  • [47] A privacy protection scheme for green communication combining digital steganography
    Zhao, Pengbiao
    Wang, Bintao
    Qin, Zhen
    Ding, Yi
    Choo, Kim-Kwang Raymond
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (04) : 2507 - 2522
  • [48] A Secured and Robust Medical Image Watermarking Approach for Protecting Integrity of Medical Images
    Khare, Priyank
    Srivastava, Vinay Kumar
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (02):
  • [49] Steganography using stochastic diffusion for the covert communication of digital images
    Blackledge, Jonathan M.
    Al-Rawi, AbdulRahman I.
    [J]. IAENG International Journal of Applied Mathematics, 2011, 41 (04) : 270 - 298
  • [50] Algorithm of Digital Image Watermarking Technique Combined with HVS
    Zhao, Haiyan
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 774 - 777