PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
A novel watermarking scheme that is capable of hiding authorization data in a gray-level image is proposed in this letter. The proposed scheme generates a key stream to be the key to connect the authorized image and its watermark. The key stream is extra data rather than data being embedded into the authorized image. Such arrangement can guarantee the integrity of the image. To reduce the complexity in computing the key stream for the authorized gray-level image, two techniques are employed in the proposed scheme. One is the concept of rehashing, and the other is the vector quantization. The benefits of the proposal are to provide a key stream to prove the gray-level's ownership, and to keep the authorized image in its original state without any modification.
Wydawca
Rocznik
Strony
443--451
Opis fizyczny
tab., bibliogr. 10 poz.
Twórcy
autor
autor
autor
  • Department of Computer Science and Information Management, Providence University, Shalu 433, Taichung, Taiwan, R.O.C., [mhlin3,ychu]@pu.edu.tw
Bibliografia
  • [1] Augot, D.,Boucqueau, J. M., Delaigle, J. F., Fontaine, C., Goray, E.: Secure Delivery of Images over Open Networks, Proceedings of the IEEE, 87(7), July 1999, 1251-1266.
  • [2] Chang, C. C., Lin, M. H., Hu, Y. C.: A Fast and Secure Image Hiding Scheme Based on LSB Substitution, International Journal of Pattern Recognition and Artificial Intelligence, 16(4), 2002, 399-416.
  • [3] Chen, T. S., Chang, C. C., Hwang, M. S.: A Virtual Image Cryptosystem Based on Vector Quantization, IEEE Transactions on Image Processing, 7(10), 1998, 1485-1488.
  • [4] Chu,Wai C.: DCT-Based ImageWatermarking Using Subsampling, IEEE Transactions oon Multimedia, 5(1), 2003, 34-38.
  • [5] DES Encryption Standard (DES), National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, April 2003.
  • [6] Huang, H. C., Wang, F.H., Pan, J. S.: A VQ-Based Robust Multi-Watermarking Algorithm, IEICE Transactions Fundamentals, E85-A(7), 2002, 1719-1726.
  • [7] Linde, Y., Buzo, A., Gray, R. M.: An Algorithm for Vector Quantizer Design, IEEE Transactions on Communications, 28, 1980, 84-95.
  • [8] Minho, KIM, H.: A Digital Image Watermarking Scheme on Vector Quantisation, IEICE Transactions Information and Systems, E85-D(6), June 2002, 1054-1056.
  • [9] Kuribayashi, M., Tanaka, H.: A New DigitalWatermarking Scheme Applying Locally theWavelet Transform, PIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E84-A(10), Oct. 2001, 2500-2507.
  • [10] Petitcolas, F. A. P., Anderson, R. J., Kuhn, M. G.: Information Hiding - A Survey, Proceedings of the IEEE, 87(7), 1999, 1062-1078.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0010-0046
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.