Image error concealment and quality access control based on data hiding and cryptography

被引:0
作者
Amit Phadikar
Santi P. Maity
Claude Delpha
机构
[1] MCKV Institute of Engineering,Department of Information Technology
[2] Bengal Engineering and Science University,Department of Information Technology
[3] Université Paris-Sud XI (UPS),Laboratiore des Signaux et Systèmes (L2S), CNRS
[4] SUPELEC,undefined
来源
Telecommunication Systems | 2012年 / 49卷
关键词
Error concealment; Access control; Data hiding; QIM; Cryptography; Convolution coding; Viterbi decoding; Lifting;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a data hiding scheme that integrates the dual purpose of error concealment and quality access control of digital image(s) in a single platform. The objective is achieved through the extraction of some important information from the original image itself followed by embedding the same in the host data as watermark which in turn increases sufficient redundancy in the transmitted image. The data embedding is done by modulating integer wavelet coefficients using quantization index modulation (QIM). The watermarked integer wavelet coefficients are then encoded using convolution coding at high code rate. Before data embedding, the important information (watermark) is also encoded with convolution coding and is encrypted using chaotic logistic mapping. The necessary information in the form of the secret key (K) is further encrypted using a public key (P) cryptology for its secret transmission to the receiver. The user who has the knowledge of the secret key (K) can decrypt the hidden information for the concealment purpose, while the users having different partial knowledge of the key (K) enjoy relative qualities of the images by partial recovery of the damaged regions. The simulation results have shown the validity of the claim. The performance of the proposed scheme is also tested in Rayleigh-fading wireless channel and compared with the few other methods.
引用
收藏
页码:239 / 254
页数:15
相关论文
共 33 条
[1]  
Wang Y.(2000)Error resilient video coding technique IEEE Signal Processing Magazine 17 61-82
[2]  
Wenger S.(2002)Novel sequential error-concealment techniques using orientation adaptive interpolation IEEE Transaction on Circuits System and Video Technology 12 857-864
[3]  
Wen J.(1995)Concealment of damaged block transform coded images using projection onto convex sets IEEE Transaction on Image Processing 4 470-477
[4]  
Katsaggelos A. K.(2007)Layered access control schemes on watermarked scalable media Journal of VLSI Signal Processing 49 443-455
[5]  
Li X.(2006)Efficient selective encryption for JPEG 2000 images using private initial table Pattern Recognition 39 509-517
[6]  
Orchard M. T.(1998)Wavelet transforms that map integers to integers Applied and Computational Harmonic Analysis 5 332-369
[7]  
Sun H.(1997)Subband-coded image reconstruction for lossy packet networks IEEE Transactions on Image Processing 6 522-539
[8]  
Kwok W.(2001)Improved wavelet-based watermarking through pixel-wise masking IEEE Transactions on Image Processing 10 783-791
[9]  
Chang F. C.(2000)The JPEG 2000 still image coding system: an overview IEEE Transactions on Consumer Electronics 46 1103-1127
[10]  
Huang H. C.(2004)Image quality assessment: from error measurement to structural similarity IEEE Transactions on Image Processing 13 1-14