Intelligent Morphing and Steganography Techniques for Multimedia Security

作者: Anant M. Bagade , Sanjay N. Talbar

DOI: 10.1007/978-3-319-44790-2_3

关键词:

摘要: Data security plays an important role in today’s digital world. There is a potential need to do the research field of image morphing and steganography for data security. The development over past years allows organization into three categories algorithms namely geometric, interpolation specialized depending upon pixel mapping procedure. It gives insight how appropriate method useful different steganographic methods categorized spatial domain, transform-based spread spectrum, statistical Internet Protocol. geometric transformation are more suitable domain steganography. This chapter includes review techniques. Hybrid approaches using have special status among systems as they combine both features overcome shortcomings individual methods.

参考文章(70)
Tom Duff, Ken Shoemake, Matrix animation and polar decomposition graphics interface. pp. 258- 264 ,(1992)
Suvojit Acharjee, Sayan Chakraborty, Sourav Samanta, Ahmad Taher Azar, Aboul Ella Hassanien, Nilanjan Dey, None, Highly Secured Multilayered Motion Vector Watermarking International Conference on Advanced Machine Learning Technologies and Applications. pp. 121- 134 ,(2014) , 10.1007/978-3-319-13461-1_13
Ali Al-Ataby, Fawzi M. Al-Naima, A Modified High Capacity Image Steganography Technique Based on Wavelet Transform The International Arab Journal of Information Technology. ,vol. 7, pp. 358- 364 ,(2010)
Sugata Sanyal, Harshavardhan Kayarkar, A Survey on Various Data Hiding Techniques and their Comparative Analysis arXiv: Cryptography and Security. ,(2012)
Nilanjan Dey, Anamitra Bardhan Roy, Achintya Das, Sheli Sinha Chaudhuri, Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology International Conference on Security in Computer Networks and Distributed Systems. pp. 347- 357 ,(2012) , 10.1007/978-3-642-34135-9_35
Phil Sallee, Model-Based Steganography international workshop on digital watermarking. pp. 154- 167 ,(2003) , 10.1007/978-3-540-24624-4_12
Marc Alexa, Differential coordinates for local mesh morphing and deformation The Visual Computer. ,vol. 19, pp. 105- 114 ,(2003) , 10.1007/S00371-002-0180-0
Anant N Bagade, SN Talbar, Image Morphing Concept for Secure Transmission of Image Data Contents over Internet Journal of Computer Science. ,vol. 6, pp. 987- 992 ,(2010) , 10.3844/JCSSP.2010.987.992
Won-Sook Lee, Nadia Magnenat Thalmann, Head Modeling from Pictures and Morphing in 3D with Image Metamorphosis Based on Triangulation Lecture Notes in Computer Science. pp. 254- 267 ,(1998) , 10.1007/3-540-49384-0_20
S.M. Bellovin, A look back at "security problems in the TCP/IP protocol suite annual computer security applications conference. pp. 229- 249 ,(2004) , 10.1109/CSAC.2004.3