Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Data Steganography for Optical Color Image Cryptosystems
Cheng-Hung Chuang, Guo-Shiang Lin
Pages - 318 - 327 | Revised - 30-12-2009 | Published - 31-01-2010
Published in International Journal of Image Processing (IJIP)
MORE INFORMATION
KEYWORDS
Data embedding, Data hiding, Image encryption, Optical security, Double random phase
ABSTRACT
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
1 | Hussain, I., & Gondal, M. A. (2014). Stego Optical Encryption Based on Chaotic Baker’s Map Transformation. Zeitschrift für Naturforschung A, 69(5-6), 249-253. |
2 | Sharma, A., Konai, S., & Bhattacharya, U. (2014, May). New call and handoff call management scheme for reuse partitioning based cellular systems. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-7). IEEE. |
3 | Sharma, A., Konai, S., & Bhattacharya, U. (2014, May). New call and handoff call management scheme for reuse partitioning based cellular systems. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-7). IEEE. |
4 | Sharma, M., & Jain, S. (2014, May). A reduced complexity approach for image compression using 1-D & 2-D chaos functions. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-5). IEEE. |
5 | Sharma, P. (2013). Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform. arXiv preprint arXiv:1401.6087. |
6 | Sharma, P., & Kumar, D. S. (2013). A robust and efficient scheme for image encryption-decryption. |
7 | Sharma, P., Mishra, D., & Agarwal, A. (2012, October). Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. In Proceedings of the Fifth International Conference on Security of Information and Networks (pp. 153-157). ACM. |
8 | Sharma, M., & Jain, S. An efficient image compression algorithm with reduced complexity. |
C.-C. Chang, C.-Y. Lin, and Y.-Z. Wang, “New image steganographic methods using runlength approach,” Information Sciences, vol. 176, no. 22, pp. 3393-3408, 2006. | |
C.-H. Chuang and G.-S. Lin, “An optical image cryptosystem based on adaptive steganography,” Optical Engineering, vol. 47, 047002 (9 pages), April 2008. | |
Computer Vision Group (CVG), Department of Computer Science and Artificial Intelligence, University of Granada. Retrieved from http://decsai.ugr.es/cvg/, August 2008. | |
G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Optical Engineering, vol. 42, no. 8, pp. 2331-2339, 2003. | |
Kodak Lossless True Color Image Suite. Retrieved from http://r0k.us/graphics/kodak/, August 2008. | |
L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Optics Express, vol. 14, pp. 8552-8560, 2006. | |
M. Joshi, Chandrashakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Optics Communications, vol. 279, pp. 35-42, 2007. | |
M. Yang, N. Bourbakis, and Li Shujun, “Data-image-video encryption,” IEEE Potentials, vol. 23, no. 3, pp. 28-34, 2004. | |
P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, vol. 20, pp. 767-769, 1995. | |
Programming, Image Processing, and Video Codecs Resourses. Retrieved from http://www.hlevkin.com/, August 2008. | |
T.-S. Chen, C.-C. Chang, and M.-S. Hwang, “A virtual image cryptosystem based on vector quantization,” IEEE Trans. Image Processing, vol. 7, no. 10, pp. 1485-1488, 1998. | |
W.-Y. Chen, “Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation,” Applied Mathematics and Computation, vol. 185, no. 1, pp. 432-448, 2007. | |
Y. Govindarajan and S. Dakshinamurthi, “Quality - security uncompromised and plausible watermarking for patent infringement,” International Journal of Image Processing, vol. 1, no. 2, 2007. | |
Y.-C. Hu, “High-capacity image hiding scheme based on vector quantization,” Pattern Recognition, vol. 39, no. 9, pp. 1715-1724, 2006. | |
Dr. Cheng-Hung Chuang
Asia University, Designation = Taiwan - Taiwan
chchuang@asia.edu.tw
Dr. Guo-Shiang Lin
- Taiwan
|
|
|
|
View all special issues >> | |
|
|