One-pass lossless data hiding and compression of remote sensing data

被引:40
作者
Carpentieri, Bruno [1 ]
Castiglione, Arcangelo [1 ]
De Santis, Alfredo [1 ]
Palmieri, Francesco [1 ]
Pizzolante, Raffaele [1 ]
机构
[1] Univ Salerno, Dipartimento Informat, Via Giovanni Paolo 2,132, I-84084 Fisciano, SA, Italy
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 90卷
关键词
Reversible data hiding; Reversible invisible watermark; Hyperspectral data hiding; Hyperspectral images protection; Data integrity; Authentication; SCHEME; INTERNET; PROTECTION; SECURITY;
D O I
10.1016/j.future.2018.07.051
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The information obtained by means of spectral remote sensing (i.e., the hyperspectral images) are involved in several real-life scenarios and applications. Historical research, monitoring of environmental hazards, forensics and counter-terrorism are some examples of contexts in which the hyperspectral data play an important role. In many contexts, the hyperspectral images could also play sensitive roles (e.g., in military applications, etc.) and are generally exchanged among several entities, in order to carry out different tasks on them. Therefore, it is important to guarantee their protection. A meaningful choice is the protection through data hiding techniques. In fact, by means of reversible data hiding techniques, the imaging data become a sort of information carrier and can be used for delivering other important data that can be used, for instance, to check the integrity of the original imaging data. In this paper, we introduce a one-pass framework that is able to perform the lossless data hiding and the lossless compression of the marked stream, at the same time, by exploiting the capabilities of the predictive paradigm. Substantially, in a single pass, a marked and compressed stego image is obtained, which can be exactly restored by the receiver: by decompressing and reversibly reconstructing the original unaltered image. In addition, our framework also permits to perform only the decompression (without the extraction of the hidden information). In this manner, the resulting stego (marked) hyperspectral image, could be used for several purposes, in which it is not necessary to extract the original data and an acceptable grade of degradation is tolerated. We also implement a proof-of-concept of the proposed framework to assess the effectiveness of our contribution. Finally, we report the achieved experimental results, which outperform other similar approaches. (C) 2018 Elsevier B,V. All rights reserved.
引用
收藏
页码:222 / 239
页数:18
相关论文
共 45 条
[1]  
Albano Pietro, 2012, Multidisciplinary Research and Practice for Information Systems. International Cross-Domain Conference and Workshop on Availability, Reliability and Security (CD-ARES 2012). Proceedings, P403, DOI 10.1007/978-3-642-32498-7_30
[2]   Secure and distributed video surveillance via portable devices [J].
Albano, Pietro ;
Bruno, Andrea ;
Carpentieri, Bruno ;
Castiglione, Aniello ;
Castiglione, Arcangelo ;
Palmieri, Francesco ;
Pizzolante, Raffaele ;
Yim, Kangbin ;
You, Ilsun .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2014, 5 (02) :205-213
[3]  
[Anonymous], 2009, P 2009 IEEE AER C
[4]   On-Board Format-Independent Security of Functional Magnetic Resonance Images [J].
Castiglione, Arcangelo ;
Pizzolante, Raffaele ;
Palmieri, Francesco ;
Masucci, Barbara ;
Carpentieri, Bruno ;
de Santis, Alfredo ;
Castiglione, Aniello .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
[5]   On the Protection of fMRI Images in Multi-Domain Environments [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Pizzolante, Raffaele ;
Castiglione, Aniello ;
Loia, Vincenzo ;
Palmieri, Francesco .
2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, :476-481
[6]   An adversary model to evaluate DRM protection of video contents on iOS devices [J].
D'Orazio, Christian ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2016, 56 :94-110
[7]   Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps [J].
D'Orazio, Christian J. ;
Choo, Kim-Kwang Raymond .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 :247-261
[8]   Robust Watermarking Scheme for Multispectral Images Using Discrete Wavelet Transform and Tucker Decomposition [J].
Fang, Hai ;
Zhou, Quan ;
Li, Kaijia .
JOURNAL OF COMPUTERS, 2013, 8 (11) :2844-2850
[9]   Reversible data hiding for high quality images using modification of prediction errors [J].
Hong, Wien ;
Chen, Tung-Shou ;
Shiu, Chih-Wei .
JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (11) :1833-1842
[10]  
Hore Alain, 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P2366, DOI 10.1109/ICPR.2010.579