AU2021107185A4 - Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning. - Google Patents
Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning. Download PDFInfo
- Publication number
- AU2021107185A4 AU2021107185A4 AU2021107185A AU2021107185A AU2021107185A4 AU 2021107185 A4 AU2021107185 A4 AU 2021107185A4 AU 2021107185 A AU2021107185 A AU 2021107185A AU 2021107185 A AU2021107185 A AU 2021107185A AU 2021107185 A4 AU2021107185 A4 AU 2021107185A4
- Authority
- AU
- Australia
- Prior art keywords
- image
- steganography
- framework
- secret
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 238000000034 method Methods 0.000 abstract description 30
- 238000004891 communication Methods 0.000 abstract description 9
- 238000000605 extraction Methods 0.000 abstract description 7
- 230000003116 impacting effect Effects 0.000 abstract description 5
- 230000006855 networking Effects 0.000 abstract description 5
- 230000008569 process Effects 0.000 abstract description 5
- 238000013135 deep learning Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 4
- 238000003058 natural language processing Methods 0.000 description 3
- 238000011160 research Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000013256 Gubra-Amylin NASH model Methods 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000005233 quantum mechanics related processes and functions Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 229920002803 thermoplastic polyurethane Polymers 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 235000021419 vinegar Nutrition 0.000 description 1
- 239000000052 vinegar Substances 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Abstract
Our invention Designing Imperceptible-High Payload Capacity Steganography Framework
in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning is
a persists a danger that intruders may get access to the sensitive information, causing it to
be shared, exposed, modified, and impacting its availability. Since fast multimedia
communication via different low-cost mediums such as smartphones and Social
Networking platforms may be readily exploited using an unsafe channel, steganography
has come to known as one of the most prominent fields of study. Steganography is a
technique of concealing a confidential small multimedia information within a much bigger
piece of multimedia information, which can be anything, be it an image, a video or a text
file. Technique of concealing one image within another image is known as Image
Steganography. The cover image in which the secret information needs to be hidden in
image steganography is altered in such a manner that the concealed information is not
evident, which makes it less dubious than cryptography. The embedding and extraction
algorithms are the two most important parts of any advanced steganographic framework.
The secret image, the secret key, and the cover image, which will be used to communicate
the message, are all inputs to the embedding method. The stego image is the result of the
embedding process. The stego image is also supplied as an input to the extraction process.
Steganalysis, on the other hand, is a technique used to identify the existence of any hidden
information in an image and to extract that information. Steganalysis aims in determining
if an image is a stego image or an original image.
TOTAL NO OF SHEET: 02 NO OF FIG: 04
101 102
Cover 00Cover
Media Media
Embeddi* StegO. Extraing
Atgerithm Oct Algerin
Secret __I104 106 Secret 107
Message Messge
103
Figure 1: Basic Steganography Framework
\200
Host Irnage CotIrr rnage
203
204 204
Secret Image ReeldImage
Encoding rarework Decoing Framework
Figure 2: A Basic Deep Steganography Framework
Plain tex (sender) Cipher text (receiver)
301 alg n publicchannel Drg ion 302
Fey
key
Quantum Que ryturn channel G r 30
Figure 3: Basic Post-Quantum Cryptography Framework
Description
TOTAL NO OF SHEET: 02 NO OF FIG: 04
101 102 Cover 00Cover Media Media
Embeddi* StegO. Extraing Atgerithm Oct Algerin Secret __I104 106 Secret 107 Message Messge 103
Figure 1: Basic Steganography Framework
\200
Host Irnage CotIrr rnage
203
204 204 Secret Image ReeldImage
Encoding rarework Decoing Framework
Figure 2: A Basic Deep Steganography Framework
Plain tex (sender) Cipher text (receiver)
301 alg n publicchannel Drg ion 302
key
Fey Quantum Que ryturn channel G r 30
Figure 3: Basic Post-Quantum Cryptography Framework
Australian Government IP Australia Innovation Patent Australia
Patent Title: Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning.
Name and address of patentees(s): Kiran Malik, Research Scholar, Department of Computer Science and Engineering, Indira Gandhi Delhi Technical University for Women Kashmere Gate, Delhi - 110006 Dr. RAVINDER.M, Assistant Professor, Computer Science & Engineering, Indira Gandhi Delhi Technical University for Women, Madrasa Road, Opposite St. James Church, Kashmere Gate, New Delhi (India) Pin: 110006. Dr. Gaurav Indra, Assistant Professor, Department of Information Technology, Indira Gandhi Delhi Technical University For Women, Kashmere Gate, New Delhi (India) Pin: 110006. Complete Specification: Australian Government.
[500] Our Invention is related to a Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning.
[502] Lately, cyber security concerns have made safeguarding the personal data over open networks a tough job. There persists a danger that intruders may get access to the sensitive information, causing it to be shared, exposed, modified, and impacting its availability. Since fast multimedia communication via different low-cost mediums such as smartphones and Social Networking platforms may be readily exploited using an unsafe channel, steganography has come to known as one of the most prominent fields of study.
[504] Steganography is a technique of concealing a confidential small multimedia information within a much bigger piece of multimedia information, which can be anything, be it an image, a video or a text file. Technique of concealing one image within another image is known as Image Steganography. The cover image in which the secret information needs to be hidden in image steganography is altered in such a manner that the concealed information is not evident, which makes it less dubious than cryptography.
[506] The embedding and extraction algorithms are the two most important parts of any advanced steganographic framework. The secret image, the secret key, and the cover image, which will be used to communicate the message, are all inputs to the embedding method. The stego image is the result of the embedding process.
[508] Steganalysis, on the other hand, is a technique used to identify the existence of any hidden information in an image and to extract that information. Steganalysis aims in determining if an image is a stego image or an original image.
[510] Thanks to the accessibility of large amounts of data. Deep Hierarchical Feature Learning is highly used for image processing and recognition, natural language processing, automatic voice recognition, among many other things.
[512] In comparison to standard steganography algorithms, the deep learning-based steganography technology can automatically hide and retrieve visual data. In the case of image steganography, no human intervention is required. By modifying parameter data, various data characteristics and the intensity of data embedding may be retrieved, considerably improving the effectiveness of image steganography.
[514] The challenge of building a more trustworthy and resilient steganographic system has become increasingly important as deep learning Steganalysis algorithms is developing rapidly.
[516] Post-quantum cryptography refers to cryptographic algorithms (usually public key algorithms) that are thought to be secure against a cryptanalytic attack by a quantum computer. As of 2021, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong quantum computer.
[518] In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers.
[520] If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere.
[522] The goal of post-quantum cryptography is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.
1. The objective of the invention is to provide a Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning is a persists a danger that intruders may get access to the sensitive information, causing it to be shared, exposed, modified, and impacting its availability. 2. The other objective of the invention is to provide a fast multimedia communication via different low-cost mediums such as smartphones and Social Networking platforms may be readily exploited using an unsafe channel, steganography has come to known as one of the most prominent fields of study. Steganography is a technique of concealing a confidential small multimedia information within a much bigger piece of multimedia information, which can be anything, be it an image, a video or a text file. 3. The other objective of the invention is to provide a Technique of concealing one image within another image is known as Image Steganography. The cover image in which the secret information needs to be hidden in image steganography is altered in such a manner that the concealed information is not evident, which makes it less dubious than cryptography. The embedding and extraction algorithms are the two most important parts of any advanced steganographic framework. 4. The other objective of the invention is to provide a secret image, the secret key, and the cover image, which will be used to communicate the message, are all inputs to the embedding method. 5. The other objective of the invention is to provide a stego image is the result of the embedding process. The stego image is also supplied as an input to the extraction process. Steganalysis, on the other hand, is a technique used to identify the existence of any hidden information in an image and to extract that information.
6. The other objective of the invention is to provide a Deep Hierarchical Feature Learning is highly used for image processing and recognition, natural language processing, automatic voice recognition, among many other things. 7. The other objective of the invention is to provide a ensure an efficient transfer of confidential information through 8. The other objective of the invention is to provide a Steganography using post quantum cryptography module and deep learning frameworks with a challenge to keep payload capacity higher without sacrificing the imperceptibility and the security.
[524] A basic block diagram of my proposed work is given in the figure 1. The proposed scheme is divided into three stages
1. Pre-processing Stage feeds the secret image to a post quantum cryptography module to obtain an encrypted image. 2. Sender's framework witnesses the embedding of the encrypted image into the host image using a hiding network to produce a container image. This hiding network will be a deep hierarchical feature learning algorithm a method of steganography. 3. Receiver's framework takes the container image and through a revealed network, which is again a deep learning algorithm, produces a revealed image. The revealed image then goes through a decryption module to give the desired secret image.
[526] Five types of available approaches for image steganography utilising a GAN architecture are; A three network based GAN model, cycle-GAN based architectures, sender receiver architecture utilising GAN, coverless model where the cover image is produced randomly rather than being supplied as input, and an Alice, Bob, and Eve based model.
Lattice-based cryptography
[528] This approach includes cryptographic systems such as learning with errors, ring learning with errors (ring-LWE), the ring learning with errors key exchange and the ring learning with errors signature, the older NTRU or GGH encryption schemes, and the newer NTRU signature and BLISS signatures.
Multivariate cryptography
[530] This includes cryptographic systems such as the Rainbow (Unbalanced Oil and Vinegar) scheme which is based on the difficulty of solving systems of multivariate equations. Various attempts to build secure multivariate equation encryption schemes have failed. However, multivariate signature schemes like Rainbow could provide the basis for a quantum secure digital signature.
Hash-based cryptography
[532] This includes cryptographic systems such as Lamppost signatures and the Merkle signature scheme and the newer XMSS and SPHINCS schemes.
Code-based cryptography
[534] This includes cryptographic systems which rely on error-correcting codes, such as the Mc-Eliece and Niederreiter encryption algorithms and the related Courtois, Finiasz and Sendrier Signature scheme.
Figure 1: Basic Steganography Framework. Figure 2: A Basic Deep Steganography Framework. Figure 3: Basic Post-Quantum Cryptography Framework. Figure 4: Proposed Framework.
Material and Methodology
[536] This section provides the set of major SCI/SCIE/Scopus indexed journals, software tools and metrics accessible in this study area:
[538] List of Major SCI/SCIE/Scopus Indexed Journals in Image Steganography is
1. IEEE Transactions on Pattern Analysis and Machine Intelligence 2. IEEE Transactions on Image Processing 3. IEEE Transactions on Visualization and Computer Graphics iv) IEEE Transactions on Information Forensics and Security v) Multimedia Tools and Applications 4. International Journal of Computer Science and Security 5. Journal of Radio Engineering 6. Journal of Visual Communication and Image Representation
[540] TensorFlow, Thea no, Keras, Caffe, Torch, Deep Learning 4j, MxNet, CNTK, Lasagne, BigDL, and other frameworks are used to construct machine learning algorithms. Libraries in practice recently that I will be using to test stego-images are scikitlearn, Tensorflow, and Keras.
Scikit-learn
[542] The Scikit-learn framework is a free Python machine learning library that includes methods for classification, regression, and clustering. Scikit-learn is a Python interface that supports supervised and unsupervised learning methods. It is based on SciPy. The library focuses on data modelling. Scikit-learn contains a number of easy-to use clustering and decomposition techniques for unsupervised learning.
Tensor Flow
[544] Tensor Flow is an open framework that allows computing to be deployed across a variety of platforms, including CPUs, GPUs, and TPUs.
[546] The runtime library is cross-platform, and the C API isolates user-level code written in several languages from the core runtime. Over 200 common operations are included in the runtime library, including mathematics, array manipulation, control flow, and state management activities.
Keras
[548] Keras is a Python-based high-level neural network library that may be used with Tensor Flow, CNTK, or Theano. The main data structure is a layer organisation model. Keras includes neural network building blocks including layers, goals, activation functions, and optimizers that make working with picture and text data a lot simpler.
[550] Different metrics are used to assess various elements of picture steganography. Peak Signal to Noise Ratio, Correlation coefficient, histogram comparison, Structured Similarity Index Measure (SSIM), and Payload Capacity are some of the common metrics that I will be considering in my study.
Payload capacity
[552] It's a measurement of how much information is hidden behind the cover image. Bits per Pixel(BPP) is a typical representation for this. It is calculated as:
BPP = Number of Embedded secret bit
[554] In a steganographic system, payload capacity is significantly more important since the communication overhead is related to the maximum payload capacity.
Peak Signal to Noise Ratio (PSNR)
[556] Changes in the Cover image pixel values will occur since the cover image is updated to include the secret information. The alterations must be studied since they have a direct impact on the output Stego-image imperceptibility. PSNR is a common and high-quality statistic for evaluating the quality of a Stego-image by comparing the mean squared error value between the Cover and the Stegoimage. PSNR (in dB) = 10 logio
(2552) MSE Where, MSE = ZCn=1(In-In')2 C
[558] When comparing the stego and cover images, MSE is the mean squared error, C is the number of cover image pixels, In is the intensity of the ith pixel in the stego-image, and I'n is the intensity of the nth pixel in the cover image.
Correlation factor
[560] We calculate correlation factor _1 (correlation coefficient) r" as: 2
r= (ZCn=1(In-ptc)2) (Z Cn=1(In' -ps))
[562] Where C is the pixel count of the cover image, In'is the stego-image pixel intensity, and In is the cover image pixel intensity. The mean pixel values of the stego-image and cover image, respectively, are ys and c.
Methodology
[564] This section enlists the step-wise methodology that I will be following:
1. Firstly, a thorough review of the literature will be conducted to determine various techniques for Image Steganography that have been employed lately and in the past, as well as the mechanisms adopted by researchers to improve the efficiency of the same. 2. Following that, a target problem will be recognised from the research gaps and the challenges faced, leading to a specific problem formulation. 3. In addition, a suitable solution for the problem statement will be suggested. 4. Following that, the proposed solution will be deployed on an appropriate software platform and then will be tested and verified. 5. Ultimately, the suggested solution will be subjected to a qualitative and quantitative assessment.
WE CLAIMS 1. Our invention Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning is a persists a danger that intruders may get access to the sensitive information, causing it to be shared, exposed, modified, and impacting its availability. Since fast multimedia communication via different low-cost mediums such as smartphones and Social Networking platforms may be readily exploited using an unsafe channel, steganography has come to known as one of the most prominent fields of study. Steganography is a technique of concealing a confidential small multimedia information within a much bigger piece of multimedia information, which can be anything, be it an image, a video or a text file. Technique of concealing one image within another image is known as Image Steganography. The cover image in which the secret information needs to be hidden in image steganography is altered in such a manner that the concealed information is not evident, which makes it less dubious than cryptography. The embedding and extraction algorithms are the two most important parts of any advanced steganographic framework. The secret image, the secret key, and the cover image, which will be used to communicate the message, are all inputs to the embedding method. The stego image is the result of the embedding process. The stego image is also supplied as an input to the extraction process. Steganalysis, on the other hand, is a technique used to identify the existence of any hidden information in an image and to extract that information. Steganalysis aims in determining if an image is a stego image or an original image. Deep learning (DL) has risen as a trend, and it is widely employed for a variety of applications, thanks to the accessibility of large amounts of data. Deep Hierarchical Feature Learning is highly used for image processing and recognition, natural language processing, automatic voice recognition, among many other things. 2. According to claims# the invention is to a Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning is a persists a danger that intruders may get access to the sensitive information, causing it to be shared, exposed, modified, and impacting its availability. 3. According to claim,2# the invention is to a fast multimedia communication via different low-cost mediums such as smartphones and Social Networking platforms may be readily exploited using an unsafe channel, steganography has come to known as one of the most prominent fields of study. 4. According to claim,2,3# the invention is to a secret image, the secret key, and the cover image, which will be used to communicate the message, are all inputs to the embedding method and also the stego image is the result of the embedding process.
TOTAL NO OF SHEET: 02 NO OF FIG: 04 Aug 2021 2021107185
Figure 1: Basic Steganography Framework
Figure 2: A Basic Deep Steganography Framework
Figure 3: Basic Post-Quantum Cryptography Framework
TOTAL NO OF SHEET: 02 NO OF FIG: 04 Aug 2021 2021107185
Figure 4: Proposed Framework
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021107185A AU2021107185A4 (en) | 2021-08-25 | 2021-08-25 | Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning. |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021107185A AU2021107185A4 (en) | 2021-08-25 | 2021-08-25 | Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning. |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021107185A4 true AU2021107185A4 (en) | 2021-12-09 |
Family
ID=78819117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021107185A Ceased AU2021107185A4 (en) | 2021-08-25 | 2021-08-25 | Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning. |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021107185A4 (en) |
-
2021
- 2021-08-25 AU AU2021107185A patent/AU2021107185A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107240061B (en) | Watermark embedding and extracting method and device based on dynamic BP neural network | |
Kang et al. | Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption | |
CN110659452B (en) | Method for hiding and orienting task execution of cyber data supported by artificial intelligence | |
Ke et al. | Steganography security: Principle and practice | |
US20210150042A1 (en) | Protecting information embedded in a machine learning model | |
Zhu et al. | Fragile neural network watermarking with trigger image set | |
Zhao et al. | DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network | |
Wen et al. | Exploring the future application of UAVs: face image privacy protection scheme based on chaos and DNA cryptography | |
Yu et al. | Reversible data hiding in encrypted images for coding channel based on adaptive steganography | |
Bachrach et al. | Image steganography and steganalysis | |
US20020041680A1 (en) | System and methods for encrypted execution of computer programs | |
Rahman et al. | A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image | |
AU2021107185A4 (en) | Designing Imperceptible-High Payload Capacity Steganography Framework in Post Quantum Encrypted Domain using Deep Advanced Hierarchical Feature Learning. | |
Srivastava et al. | Design and implementation of crypto based water marking techniques for EHR security | |
Seem et al. | Artificial neural network, convolutional neural network visualization, and image security | |
CN115470463A (en) | Copyright protection and traceability system suitable for deep neural network model | |
Jabbar et al. | Digital watermarking by utilizing the properties of self-organization map based on least significant bit and most significant bit | |
Molato et al. | Secured data hiding and sharing using improved LSB-based image steganography technique | |
Li et al. | Deepkeystego: Protecting communication by key-dependent steganography with deep networks | |
Chinniyan et al. | Image Steganography Using Deep Neural Networks. | |
Maisa'a Abid Ali et al. | Dual method cryptography image by two force secure and steganography secret message in IoT | |
Aljidi et al. | Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm | |
Kesa | Steganography a data hiding technique | |
Ghazy | Digital Rights Management of Image Content via LSB Embedding and Palindrome Sequence | |
Albishi et al. | Odd/Even Differential Image Steganography Approach |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |