Quality access control of compressed color images using data hiding

被引:12
作者
Phadikar, Amit [2 ]
Maity, Santi P. [1 ]
机构
[1] Bengal Engn & Sci Univ, Dept Informat Technol, Sibpur 711103, India
[2] MCKV Inst Engn, Dept Informat Technol, Liluah 711204, Howrah, India
关键词
Passive data hiding; Watermarking; Access control; Compressed domain; Spread spectrum; WATERMARKING;
D O I
10.1016/j.aeue.2009.09.004
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a scheme for quality access control of discrete cosine transform (DCT) based compressed color image(s) using data hiding. The goal of access control is achieved by transforming the original image into the luminance, chrominance-blue and chrominance-red (YCbCr) color space followed by modulating the coefficients of luminance (Y) and/or chrominance-red (C-r) channels. The amount of modulation and the information about the specific channels to be modulated are contained in a key K, which is supplied by the owner/service provider. This key and the original image are used to create a content dependent key. The content dependent key is then embedded into the chrominance-blue (C-b) component as watermark using spread spectrum modulation. This watermark information is used for demodulation that leads to the access control through the restoration of the relative quality of the images. Simulation results show that the proposed scheme provides an effective quality access control for the compressed color image without decreasing the compressibility of the standard JPEG coding scheme. The performance of the proposed method is also compared with the few other methods. (C) 2009 Elsevier GmbH. All rights reserved.
引用
收藏
页码:833 / 843
页数:11
相关论文
共 50 条
[41]   Comparison of Quantization Index Modulation and Forbidden Zone Data Hiding for Compressed Domain Video Data Hiding [J].
Esen, Ersin ;
Dogan, Zafer ;
Ates, Tugrul K. ;
Alatan, A. Aydin .
2009 IEEE 17TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, :646-649
[42]   Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram Shifting [J].
Xu, Dawen ;
Wang, Rangding .
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 :230-242
[43]   Data-Hiding for Halftone Images Using an Improved CPT scheme [J].
Phan Trung Huy ;
Nguyen Hai Thanh ;
Kim, Cheonshik ;
Yang, Ching-Nung .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (02) :405-424
[44]   An efficient reversible data hiding algorithm using two steganographic images [J].
Jafar, Iyad F. ;
Darabkh, Khalid A. ;
Al-Zubi, Raed T. ;
Saifan, Ramzi R. .
SIGNAL PROCESSING, 2016, 128 :98-109
[45]   Hiding iris data for authentication of digital images using wavelet theory [J].
Hassanien A.E. .
Pattern Recognition and Image Analysis, 2006, 16 (4) :637-643
[46]   An Improved Reversible Data Hiding in Encrypted Images Using Side Match [J].
Hong, Wien ;
Chen, Tung-Shou ;
Wu, Han-Yan .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (04) :199-202
[47]   SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES WITH HISTOGRAM PERMUTATION [J].
Fujiyoshi, Masaaki .
ELECTRONIC PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW), 2013,
[48]   Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images [J].
Ngoc-Tu Huynh ;
Bharanitharan, K. ;
Chang, Chin-Chen ;
Liu, Yanjun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :5767-5783
[49]   High Imperceptible Data Hiding Method Based on Combination Theory for AMBTC Compressed Images [J].
Anggriani, Kurnia ;
Chiou, Shu-Fen ;
Wu, Nan-, I ;
Hwang, Min-Shiang .
APPLIED SCIENCES-BASEL, 2023, 13 (12)
[50]   Data hiding in scrambled images: A new double layer security data hiding technique [J].
Parah, Shabir A. ;
Sheikh, Javaid A. ;
Hafiz, Abdul M. ;
Bhat, G. M. .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) :70-82