Image error concealment and quality access control based on data hiding and cryptography

This paper proposes a data hiding scheme that integrates the dual purpose of error concealment and quality access control of digital image(s) in a single platform. The objective is achieved through the extraction of some important information from the original image itself followed by embedding the same in the host data as watermark which in turn increases sufficient redundancy in the transmitted image. The data embedding is done by modulating integer wavelet coefficients using quantization index modulation (QIM). The watermarked integer wavelet coefficients are then encoded using convolution coding at high code rate. Before data embedding, the important information (watermark) is also encoded with convolution coding and is encrypted using chaotic logistic mapping. The necessary information in the form of the secret key (K) is further encrypted using a public key (P) cryptology for its secret transmission to the receiver. The user who has the knowledge of the secret key (K) can decrypt the hidden information for the concealment purpose, while the users having different partial knowledge of the key (K) enjoy relative qualities of the images by partial recovery of the damaged regions. The simulation results have shown the validity of the claim. The performance of the proposed scheme is also tested in Rayleigh-fading wireless channel and compared with the few other methods.

[1]  Touradj Ebrahimi,et al.  Christopoulos: Thc Jpeg2000 Still Image Coding System: an Overview the Jpeg2000 Still Image Coding System: an Overview , 2022 .

[2]  Yong Huang,et al.  Texture decomposition by harmonics extraction from higher order statistics , 2004, IEEE Trans. Image Process..

[3]  Uday B. Desai,et al.  Projection Onto Convex Sets with Watermarking for Error Concealment , 2007, PReMI.

[4]  Santi P. Maity,et al.  A High Capacity CI/MC-CDMA System for Reduction in PAPR , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.

[5]  Masaaki Fujiyoshi,et al.  Generalized hierarchical encryption of JPEG 2000 codestreams for access control , 2005, IEEE International Conference on Image Processing 2005.

[6]  Robert M. Gray,et al.  Subband-coded image reconstruction for lossy packet networks , 1997, IEEE Trans. Image Process..

[7]  Hsiang-Cheh Huang,et al.  Layered Access Control Schemes on Watermarked Scalable Media , 2007, J. VLSI Signal Process..

[8]  Zhou Wang,et al.  Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .

[9]  Ee-Chien Chang,et al.  Edge directed filter based error concealment for wavelet-based images , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[10]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[11]  M. Budagavi,et al.  Unequal error protection of MPEG-4 compressed video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[12]  Zhang Rongfu,et al.  Content-adaptive spatial error concealment for video communication , 2004 .

[13]  Fatih Alagöz,et al.  A novel error concealment method for images using watermarking in error-prone channels , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[14]  Huifang Sun,et al.  Concealment of damaged block transform coded images using projections onto convex sets , 1995, IEEE Trans. Image Process..

[15]  Ming-Chieh Chi,et al.  Recursive block-matching principle for error concealment algorithm , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[16]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[17]  Yanda Li,et al.  Error Concealment for Digital Images Using Data Hiding , 2000 .

[18]  Jiang-Lung Liu,et al.  Efficient selective encryption for JPEG 2000 images using private initial table , 2006, Pattern Recognit..

[19]  Yan Zhao,et al.  Spatial Error Concealment Using Directional Extrapolation , 2005, Digital Image Computing: Techniques and Applications (DICTA'05).

[20]  Amit Phadikar,et al.  Quality access control of compressed color images using data hiding , 2010 .

[21]  Li Chuanmu,et al.  A New Image Encryption Scheme based on Hyperchaotic Sequences , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[22]  Michael T. Orchard,et al.  Novel sequential error-concealment techniques using orientation adaptive interpolation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[23]  Aggelos K. Katsaggelos,et al.  Error resilient video coding techniques , 2000, IEEE Signal Process. Mag..

[24]  Amit Phadikar,et al.  Image Error Concealment Based On Data Hiding Using Dual-Tree Complex Wavelets , 2009, Indian International Conference on Artificial Intelligence.

[25]  Amit Phadikar,et al.  M-ary QIM Data Hiding for Error Concealment of Digital Image in JPEG Pipeline , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[26]  Mylène C. Q. Farias,et al.  Error control and concealment for video transmission using data hiding , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.

[27]  Touradj Ebrahimi,et al.  Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.

[28]  Laurence B. Milstein,et al.  Performance of successive interference cancellation in convolutionally coded multicarrier DS/CDMA systems , 2001, IEEE Trans. Commun..

[29]  P. Nasiopoulos,et al.  A Novel Blind Video Watermarking Scheme for Access Control Using Complex Wavelets , 2007, 2007 Digest of Technical Papers International Conference on Consumer Electronics.

[30]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[31]  Ranjan Bose,et al.  Information theory, coding and cryptography , 2003 .

[32]  Xuanqin Mou,et al.  Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.

[33]  Jue Wang,et al.  A region and data hiding based error concealment scheme for images , 2001, IEEE Trans. Consumer Electron..