Image encryption and data hiding: Duality and code designs

被引:2
|
作者
Yang, Yang [1 ]
Stankovit, Vladimir [2 ]
Xiong, Zixiang [1 ]
机构
[1] Texas A&M Univ, Dept Elect & Comp Engn, College Stn, TX 77843 USA
[2] Univ Lancaster, Dept Commun Syst, Lancaster LA1 4W, England
关键词
D O I
10.1109/ITW.2007.4313090
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze duality in code design between encryption and data hiding problems. First we point out dual operations of the encoder/decoder pairs of the two problems, and then, we apply the developed duality principle to practical image communication. Using the same image DCT coefficients as side information for both problems, practical code designs based on trellis quantization and LDPC codes are then provided. Under the same simulation condition, the performance of the two practical designs show consistency with each other, hence validating the coding duality between the two problems.
引用
收藏
页码:295 / +
页数:2
相关论文
共 50 条
  • [31] A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling
    Murthy, Kandala Sree Rama
    Manikandan, V. M.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2022, 13 (05) : 433 - 440
  • [32] Image Data Encryption and Hiding Based on Wavelet Packet Transform and Bit Planes decomposition
    Zheng Wei
    Cheng Zhi-gang
    Cui Yue-li
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3210 - 3213
  • [33] Data Hiding in a Halftone Image Using Hamming Code (15,11)
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2011, PT II, 2011, 6592 : 372 - 381
  • [34] Data Hiding in a Halftone Image Using Hamming Code (15,11)
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Phan Trung Huy
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3699 - 3706
  • [35] Data hiding in encryption-compression domain
    Singh, O. P.
    Singh, A. K.
    COMPLEX & INTELLIGENT SYSTEMS, 2023, 9 (03) : 2759 - 2772
  • [36] A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology
    Jian Li
    Zelin Zhang
    Shengyu Li
    Ryan Benton
    Yulong Huang
    Mohan Vamsi Kasukurthi
    Dongqi Li
    Jingwei Lin
    Glen M. Borchert
    Shaobo Tan
    Gang Li
    Bin Ma
    Meihong Yang
    Jingshan Huang
    BMC Medical Informatics and Decision Making, 20
  • [37] A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology
    Li, Jian
    Zhang, Zelin
    Li, Shengyu
    Benton, Ryan
    Huang, Yulong
    Kasukurthi, Mohan Vamsi
    Li, Dongqi
    Lin, Jingwei
    Borchert, Glen M.
    Tan, Shaobo
    Li, Gang
    Ma, Bin
    Yang, Meihong
    Huang, Jingshan
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2020, 20 (Suppl 14)
  • [38] Data Hiding Using Code Obfuscation
    Rajba, Pawel
    Mazurczyk, Wojciech
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [39] Image information hiding encryption using chaotic sequence
    Liu, Zhen
    Xi, Lifeng
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT II, PROCEEDINGS, 2007, 4693 : 202 - 208
  • [40] An image encryption algorithm based on dual dna sequences for image hiding
    Zhou, Shihua
    Zhang, Qiang
    Wei, Xiaopeng
    ICIC Express Letters, 2010, 4 (04): : 1393 - 1398