Abstract:
In the proposed error resilient image camouflaging scheme, a secret image is camouflaged at the sender into multiple virtual JPEG-2000 images, resulting in multiple ciphe...Show MoreMetadata
Abstract:
In the proposed error resilient image camouflaging scheme, a secret image is camouflaged at the sender into multiple virtual JPEG-2000 images, resulting in multiple cipher-images. Then, instead of the secret image, only the cipher-images are transmitted to the receiver. Because both the secret and cipher-images are significant, the cipher-images do not pique the interest of illegal users who may try to get the secret image. At the receiver, if all the cipher-images are completely received, the secret image can be recovered from the cipher-images, whereas if the cipher-images are not completely received, the secret image cannot be recovered. Additionally, because the transmitted JPEG-2000 cipher-images may be corrupted by transmission errors, to enhance the degree of transmission reliability, three proposed techniques, namely, side-match vector quantization, round-robin like data embedding, and duplicate data embedding, are employed to provide error resilience for robust image transmission.
Date of Conference: 23-26 May 2005
Date Added to IEEE Xplore: 25 July 2005
Print ISBN:0-7803-8834-8