流加密和小波压缩图像的可逆数据隐藏技术

S. Rosaline, C. Rengarajaswamy
{"title":"流加密和小波压缩图像的可逆数据隐藏技术","authors":"S. Rosaline, C. Rengarajaswamy","doi":"10.1109/ICPRIME.2013.6496504","DOIUrl":null,"url":null,"abstract":"Reversible Data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a vital role in such situations. Securing the multimedia content can be achieved by performing encryption. Transmission time is further decreased by compressing such encrypted images. The process of compression reduces the amount of data required for representing the image. The content owner thus encrypts the original image using Stream Cipher process. The encrypted image is then used as the media for hiding secret image. The embedded image can then be compressed using wavelet compression. The receiver does all the three processes in reverse for getting back the original image and the secret image. Thus the compressed image is first decompressed. Second, the data hiding key is employed to extract the secret message. Third, the encryption key is employed to decrypt and get back the original content. Thus this paper focuses on achieving better security and improved transmission rate.","PeriodicalId":123210,"journal":{"name":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Reversible data hiding technique for stream ciphered and wavelet compressed image\",\"authors\":\"S. Rosaline, C. Rengarajaswamy\",\"doi\":\"10.1109/ICPRIME.2013.6496504\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Reversible Data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a vital role in such situations. Securing the multimedia content can be achieved by performing encryption. Transmission time is further decreased by compressing such encrypted images. The process of compression reduces the amount of data required for representing the image. The content owner thus encrypts the original image using Stream Cipher process. The encrypted image is then used as the media for hiding secret image. The embedded image can then be compressed using wavelet compression. The receiver does all the three processes in reverse for getting back the original image and the secret image. Thus the compressed image is first decompressed. Second, the data hiding key is employed to extract the secret message. Third, the encryption key is employed to decrypt and get back the original content. Thus this paper focuses on achieving better security and improved transmission rate.\",\"PeriodicalId\":123210,\"journal\":{\"name\":\"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPRIME.2013.6496504\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPRIME.2013.6496504","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

可逆数据隐藏(RDH)技术的目的是从已标记的介质中恢复原始内容。在某些应用中,原始图像是理想的。因此,RDH在这种情况下起着至关重要的作用。保护多媒体内容可以通过执行加密来实现。通过压缩这样的加密图像,传输时间进一步减少。压缩过程减少了表示图像所需的数据量。因此,内容所有者使用流加密过程对原始图像进行加密。然后将加密后的图像用作隐藏秘密图像的介质。然后可以使用小波压缩对嵌入的图像进行压缩。接收方反过来执行这三个过程以获得原始图像和秘密图像。因此,首先对压缩图像进行解压缩。其次,使用数据隐藏密钥提取秘密消息。第三,使用加密密钥解密并获取原始内容。因此,本文的重点是如何实现更好的安全性和更高的传输速率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Reversible data hiding technique for stream ciphered and wavelet compressed image
Reversible Data Hiding (RDH) Technique aims in recovering back the original content from the marked media. The original image is desirable in some applications. Thus, RDH plays a vital role in such situations. Securing the multimedia content can be achieved by performing encryption. Transmission time is further decreased by compressing such encrypted images. The process of compression reduces the amount of data required for representing the image. The content owner thus encrypts the original image using Stream Cipher process. The encrypted image is then used as the media for hiding secret image. The embedded image can then be compressed using wavelet compression. The receiver does all the three processes in reverse for getting back the original image and the secret image. Thus the compressed image is first decompressed. Second, the data hiding key is employed to extract the secret message. Third, the encryption key is employed to decrypt and get back the original content. Thus this paper focuses on achieving better security and improved transmission rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Separable reversible data hiding using Rc4 algorithm Personal approach for mobile search: A review Bijective soft set based classification of medical data Deployment and power assignment problem in Wireless Sensor Networks for intruder detection application using MEA Protein sequence motif patterns using adaptive Fuzzy C-Means granular computing model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1