Image error concealment and quality access control based on data hiding and cryptography

被引:0
|
作者
Amit Phadikar
Santi P. Maity
Claude Delpha
机构
[1] MCKV Institute of Engineering,Department of Information Technology
[2] Bengal Engineering and Science University,Department of Information Technology
[3] Université Paris-Sud XI (UPS),Laboratiore des Signaux et Systèmes (L2S), CNRS
[4] SUPELEC,undefined
来源
Telecommunication Systems | 2012年 / 49卷
关键词
Error concealment; Access control; Data hiding; QIM; Cryptography; Convolution coding; Viterbi decoding; Lifting;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a data hiding scheme that integrates the dual purpose of error concealment and quality access control of digital image(s) in a single platform. The objective is achieved through the extraction of some important information from the original image itself followed by embedding the same in the host data as watermark which in turn increases sufficient redundancy in the transmitted image. The data embedding is done by modulating integer wavelet coefficients using quantization index modulation (QIM). The watermarked integer wavelet coefficients are then encoded using convolution coding at high code rate. Before data embedding, the important information (watermark) is also encoded with convolution coding and is encrypted using chaotic logistic mapping. The necessary information in the form of the secret key (K) is further encrypted using a public key (P) cryptology for its secret transmission to the receiver. The user who has the knowledge of the secret key (K) can decrypt the hidden information for the concealment purpose, while the users having different partial knowledge of the key (K) enjoy relative qualities of the images by partial recovery of the damaged regions. The simulation results have shown the validity of the claim. The performance of the proposed scheme is also tested in Rayleigh-fading wireless channel and compared with the few other methods.
引用
收藏
页码:239 / 254
页数:15
相关论文
共 50 条
  • [1] Image error concealment and quality access control based on data hiding and cryptography
    Phadikar, Amit
    Maity, Santi P.
    Delpha, Claude
    TELECOMMUNICATION SYSTEMS, 2012, 49 (02) : 239 - 254
  • [2] Image Error Concealment and Quality Access Control Based on Data Hiding and Cryptography
    Phadikar, Amit
    Maity, Santi P.
    Delpha, Claude
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 583 - +
  • [3] DATA HIDING FOR QUALITY ACCESS CONTROL AND ERROR CONCEALMENT IN DIGITAL IMAGES
    Phadikar, Amit
    Maity, Santi P.
    Delpha, Claude
    2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [4] Error concealment using data hiding
    Yin, P
    Liu, B
    Yu, HH
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING, 2001, : 1453 - 1456
  • [5] Error control and concealment for video transmission using data hiding
    Carli, M
    Bailey, D
    Farias, M
    Mitra, SK
    5TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 812 - 815
  • [6] IMAGE ERROR CONCEALMENT BASED ON QIM DATA HIDING IN DUAL-TREE COMPLEX WAVELETS
    Maity, Santi P.
    Phadikar, Amit
    Kundu, Malay K.
    INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2012, 10 (02)
  • [7] A region and data hiding based error concealment scheme for images
    Wang, J
    Ji, L
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2001, 47 (02) : 257 - 262
  • [8] Error concealment of video sequences by data hiding
    Yilmaz, A
    Alatan, AA
    2003 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL 2, PROCEEDINGS, 2003, : 679 - 682
  • [9] Digital Image Security Based on Data Hiding and Cryptography
    Al-Haj, Ali
    Abdel-Nabi, Hiba
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 437 - 440
  • [10] Hybrid Error Concealment in Image Communication Using Data Hiding and Spatial Redundancy
    Anhari, Alireza Kenarsari
    Sodagari, Shabnam
    Avanaki, Alireza Nasiri
    2008 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, VOLS 1 AND 2, 2008, : 37 - 41