Progressive transmission of secured images with authentication using decompositions into monovariate functions

被引:0
|
作者
Leni, Pierre-Emmanuel [1 ]
Fougerolle, Yohan D. [2 ]
Truchetet, Frederic [2 ]
机构
[1] Univ Franche Comte, Chrono Environm Lab, CNRS, UMR 6249, F-25200 Montbeliard, France
[2] Univ Burgundy, LE2I Lab, CNRS, UMR 6306, F-71200 Le Creusot, France
关键词
Kolmogorov superposition theorem; visible watermarking; signal processing; image encryption; NUMERICAL IMPLEMENTATION; WATERMARKING; ALGORITHM; RECOVERY;
D O I
10.1117/1.JEI.23.3.033006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible watermarking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmission and support of heterogeneous display environments. The marked image can be accessed at any intermediate resolution, and a key is needed to remove the mark to fully recover the original image without loss. Moreover, the key can be different for every resolution, and the images can be globally restored in case of packet losses during the transmission. Our contributions lie in the proposition of decomposing a mark (an overlapping image) and an image into monovariate functions following the Kolmogorov superposition theorem; and in the combination of these monovariate functions to provide a removable visible "watermarking" of images with the ability to restore the original image using a key. (C) 2014 SPIE and IS&T
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A Secured Model for trusted communication in Network using ZERO INTERACTION AUTHENTICATION
    Pugazendi, R.
    Jayabalan, E.
    Duraiswamy, K.
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY, 2008, : 374 - +
  • [42] A Secured and Reliable Biometric User Authentication Using Keystroke Template Method
    Visumathi, J.
    Jayarin, P. Jesu
    JOURNAL OF APPLIED SECURITY RESEARCH, 2015, 10 (03) : 375 - 384
  • [43] Secured Finger Vein Authentication System using Contourlet Transform and SVM
    Murukesh, C.
    Nadesh, T. K.
    Thanushkodi, K.
    ADVANCEMENTS IN AUTOMATION AND CONTROL TECHNOLOGIES, 2014, 573 : 465 - +
  • [44] Secured Offline Authentication on Industrial Mobile Robots Using Biometric Data
    Haas, Sarah
    Ulz, Thomas
    Steger, Christian
    ROBOCUP 2017: ROBOT WORLD CUP XXI, 2018, 11175 : 143 - 155
  • [45] Secured Routing in VANETs Using Lightweight Authentication and Key Agreement Protocol
    Sandou, D. Kiruba
    Jothy, N.
    Jayanthi, K.
    2018 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2018,
  • [46] Decompositions of profitability change using cost functions
    Diewert, W. Erwin
    JOURNAL OF ECONOMETRICS, 2014, 183 (01) : 58 - 66
  • [47] ECG BASED AUTHENTICATION FOR E-HEALTHCARE SYSTEMS : TOWARDS A SECURED ECG FEATURES TRANSMISSION
    Zaghouani, Emna Kalai
    Benzina, Adel
    Attia, Rabah
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1777 - 1783
  • [48] Steganography using wavelet transform for secured data transmission
    Srinivasu L.N.
    Veeramani V.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) : 9509 - 9527
  • [49] Secured Data transmission using Knight and LSB Technique
    Gulappagol, Laxmi
    ShivaKumar, K. B.
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 253 - 259
  • [50] SITF: an algorithm for secured image transmission using Fractals
    Aswal, Sneh Lata
    Negi, Ashish
    Saxena, Anuj
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 529 - 535