Sensitive Information Protection and Recovery Using One to One Compound Mapping
(*) Corresponding author
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)
With rapid developments in software and hardware technology, nowadays documents are scanned and stored in Internet connected systems. Scanned images hold lot of confidential information. It is essential to protect sensitive information like Credit card number, Social security number, Medical reports etc. from unauthorized access. In this paper, a scheme is proposed to protect such images based on visible watermarking and encryption techniques. With this scheme, sensitive information in an image will be made unreadable with mask image using one-to-one compound mapping. The compound mappings are proved to be reversible, which allows for lossless recovery of original images from protected image. The mask image generation is discussed. This work is implemented in MATLAB
Copyright © 2013 Praise Worthy Prize - All rights reserved.
Zhang Yan, “The research of image and video encryption algorithm,” Soochow University Master's thesis, pp. 6–16, 2007.
Fangyuan Huang, “Image Scrambling Based on Arnold Transforming and Implementation,” Guizhou University (Natural Science Edition), 5th ed., Vol. 25, 2008.
Zhao Huaixun, Wang Xiaoran and Zhen MIN, “A Chaotic Image Encryption Algorithm Based On Baker Mapping,” Computer Applications and Software, 7th ed., Vol. 25, 2008.
YU Zhinghong, Wang Jingbo, Liu Zhe Zhou, Xu Li,Jiang, chun and Yu Zhezhou, “Video Encryption Method Based On Logistic and Baker Mapping,” Journal of Jilin University (Information Science Edition), 3rd ed., Vol. 26, 2008.
Zhu Zhiliang, Zhang Wei and Yu Hai, “MPEG Video encryption algorithm based on Lorenz chaotic system,” Journal of Computer Applications, 12th ed., Vol. 28, 2008.
H. Zhang and H. Tang, “A Novel image steganography algorithm against statistical analysis,” Proceedings of the IEEE, Vol. 19, no. 22, pp. 3884-3888, 2007.
Katzenbeisser, S. and Petitcolas, “Information hiding techniques for steganography and digital watermarking,” (Artech House Books), ISBN 1-58053-035-4, 1999.
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—A survey,” Proceedings of the IEEE, Vol. 87, no. 7, pp. 1062–1078, 1999.
Y. Hu, S. Kwong, and J. Huang, “An algorithm for removable visible watermarking,” IEEE Transaction on Circuits Systems, and Video Technology, Vol. 16, no.1, pp. 129–133, 2006.
Y. Hu and B. Jeon, “Reversible visible watermarking and lossless recovery of original images,” IEEE Transaction on Circuits Systems, and Video Technology, Vol. 16, no. 11, pp. 1423–1429, 2006.
B. Macq, “Lossless multiresolution transform for image authenticating watermarking,” European Signal Processing Conference, Tampere, Finland, 2000.
J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding—New paradigm in digital watermarking,” Journal of Applied Signal Processing, Vol. 2002, no. 2, pp. 185–196, 2002.
M. Awrangjeb and M. S. Kankanhalli, “Lossless watermarking considering the human visual system,” International Workshop on Digital Watermarking, Seoul, Korea, 2003.
M. Awrangjeb and M. S. Kankanhalli, “Reversible watermarking using a perceptual model,” Journal of Electronic Imaging, Vol. 14, no. 013014, 2005.
J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transaction on Circuits Systems, and Video Technology, Vol. 13, no. 8, pp. 890–896, 2003.
H. M. Tsai and L. W. Chang, “A high secure reversible visible watermarking scheme,” Proceedings of the IEEE International Conference, Multimedia and Expo, pp. 2106–2109, 2007.
S. K. Yip, O. C. Au, C. W. Ho, and H. M. Wong, “Lossless visible watermarking,” Proceedings of the IEEE International Conference, Multimedia and Expo, pp. 853–856, 2006.
T. Liu, W. Tsai, “Generic Lossless Visible Watermarking – A New Approach,” IEEE Transaction on Image Processing, Vol. 19, no. 19, pp. 1224–1235, 2010.
- There are currently no refbacks.
Please send any question about this web site to firstname.lastname@example.org
Copyright © 2005-2022 Praise Worthy Prize