Progressive transmission of secured images with authentication using decompositions into monovariate functions

被引:0
|
作者
Leni, Pierre-Emmanuel [1 ]
Fougerolle, Yohan D. [2 ]
Truchetet, Frederic [2 ]
机构
[1] Univ Franche Comte, Chrono Environm Lab, CNRS, UMR 6249, F-25200 Montbeliard, France
[2] Univ Burgundy, LE2I Lab, CNRS, UMR 6306, F-71200 Le Creusot, France
关键词
Kolmogorov superposition theorem; visible watermarking; signal processing; image encryption; NUMERICAL IMPLEMENTATION; WATERMARKING; ALGORITHM; RECOVERY;
D O I
10.1117/1.JEI.23.3.033006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible watermarking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmission and support of heterogeneous display environments. The marked image can be accessed at any intermediate resolution, and a key is needed to remove the mark to fully recover the original image without loss. Moreover, the key can be different for every resolution, and the images can be globally restored in case of packet losses during the transmission. Our contributions lie in the proposition of decomposing a mark (an overlapping image) and an image into monovariate functions following the Kolmogorov superposition theorem; and in the combination of these monovariate functions to provide a removable visible "watermarking" of images with the ability to restore the original image using a key. (C) 2014 SPIE and IS&T
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Secured and progressive transmission of compressed images on the Internet:: application to telemedicine
    Babel, M
    Parrein, B
    Déforges, O
    Normand, N
    Guédon, JP
    Ronsin, J
    Internet Imaging VI, 2005, 5670 : 126 - 136
  • [2] Secured Transmission of Medical Images in Radiology Using AES Technique
    Prabhu, Pavithra
    Manjunath, K. N.
    COMPUTER AIDED INTERVENTION AND DIAGNOSTICS IN CLINICAL AND MEDICAL IMAGES, 2019, 31 : 103 - 112
  • [3] Authentication of WSN for Secured Medical Data Transmission Using Diffie Hellman Algorithm
    Prabhu A.J.
    Rajesh D.H.
    Computer Systems Science and Engineering, 2023, 45 (03): : 2363 - 2376
  • [4] Transmission of quantum-secured images
    Johnson, Steven
    Rarity, John
    Padgett, Miles
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [5] Joint source-channel coding:: Secured and progressive transmission of compressed medical images on the Internet
    Babel, Marie
    Parrein, Benoit
    Deforges, Olivier
    Normand, Nicolas
    Guedon, Jean-Pierre
    Coat, Veronique
    COMPUTERIZED MEDICAL IMAGING AND GRAPHICS, 2008, 32 (04) : 258 - 269
  • [6] Simultaneous authentication verification of multiple secured images using joint transform correlation approach
    Fatima, Areeba
    Nishchal, Naveen K.
    ELECTRO-OPTICAL AND INFRARED SYSTEMS: TECHNOLOGY AND APPLICATIONS XV, 2018, 10795
  • [7] Secured Transmission of Sensitive Images of Skin Diseases Using Steganography and Cryptography
    Hossain, Kunal
    Jana, Susovan
    Mukherjee, Saswati
    Parekh, Ranjan
    2017 IEEE CALCUTTA CONFERENCE (CALCON), 2017, : 95 - 99
  • [8] Progressive transmission of images using block wavelet transform
    Huh, Y
    Panusopone, K
    Rao, KR
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL III, 1997, : 575 - 578
  • [9] SECURE AND EFFICIENT TRANSMISSION IN WIRELESS NETWORK USING KEY AUTHENTICATION BASED SECURED MULTICASTING TECHNIQUE
    Gopalakrishnan, S.
    GaneshKumar, P.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [10] Secured network authentication using biometrics application
    Laili, MHB
    Jamaludin, MZ
    Din, NM
    Said, NHM
    2002 STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT, PROCEEDINGS: GLOBALIZING RESEARCH AND DEVELOPMENT IN ELECTRICAL AND ELECTRONICS ENGINEERING, 2002, : 368 - 370