Securing color information of an image by concealing the color palette

This paper deals with a method to protect the color information of images by providing free access to the corresponding gray level images. Only with a secret key and the gray level images, it is then possible to view the images in color. The approach is based on a color reordering algorithm after a quantization step. Based on a layer scanning algorithm, the color reordering generates gray level images and makes it possible to embed the color palette into the gray level images using a data hiding algorithm. This work was carried out in the framework of a project aimed at providing limited access to the private digital painting database of the Louvre Museum in Paris, France.

[1]  Michael Gervautz,et al.  A simple method for color quantization: octree quantization , 1990 .

[2]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[3]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[4]  Wen-Hsiang Tsai,et al.  Adaptive data hiding in palette images by color ordering and mapping with security protection , 2004, IEEE Transactions on Communications.

[5]  Karen M. Braun,et al.  Color to gray and back: color embedding into textured gray images , 2005, IEEE Transactions on Image Processing.

[6]  Armando J. Pinho,et al.  A survey on palette reordering methods for improving the compression of color-indexed images , 2004, IEEE Transactions on Image Processing.

[7]  Andreas Uhl,et al.  Confidential storage and transmission of medical image data , 2003, Comput. Biol. Medicine.

[8]  Tu-Thach Quach,et al.  Locatability of modified pixels in steganographic images , 2012, Other Conferences.

[9]  Ricardo L. de Queiroz,et al.  Reversible color-to-gray mapping using subband domain texturization , 2010, Pattern Recognit. Lett..

[10]  Ioannis Pitas,et al.  Robust image watermarking in the spatial domain , 1998, Signal Process..

[11]  Andreas Uhl,et al.  Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .

[12]  Stefan Katzenbeisser,et al.  Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.

[13]  Andreas Uhl,et al.  Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.

[14]  Kuo-Liang Chung,et al.  Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..

[15]  Alessandro Neri,et al.  Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding , 2002, EURASIP J. Adv. Signal Process..

[16]  Andreas Thiel,et al.  A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption , 2001, Int. J. Medical Informatics.

[17]  Shiguo Lian,et al.  Commutative watermarking and encryption for media data , 2006 .

[18]  Sebastiano Battiato,et al.  Self Organizing Motor Maps for Color-Mapped Image Re-Indexing , 2007, IEEE Transactions on Image Processing.

[19]  Jessica J. Fridrich,et al.  Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.

[20]  Mei-Yi Wu,et al.  An iterative method of palette-based image steganography , 2004, Pattern Recognit. Lett..

[21]  Edward J. Delp,et al.  An overview of multimedia content protection in consumer electronics devices , 2001, Signal Process. Image Commun..

[22]  Frank Y. Shih,et al.  Combinational image watermarking in the spatial and frequency domains , 2003, Pattern Recognit..

[23]  Marc Chaumont,et al.  A reversible data hiding method for encrypted images , 2008, Electronic Imaging.

[24]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[25]  Amine Nait-Ali,et al.  Compression of Biomedical Images and Signals , 2008 .

[26]  Deepa Kundur,et al.  Dual domain watermarking for authentication and compression of cultural heritage images , 2004, IEEE Transactions on Image Processing.

[27]  Marc Chaumont,et al.  A Color Image Hidden in a Grey-Level Image , 2006, CGIV.

[28]  Wen-Hsiang Tsai,et al.  Adaptive data hiding in palette images by color ordering and mapping with security protection , 2004, IEEE Trans. Commun..

[29]  Marc Chaumont,et al.  Attack by colorization of a grey-level image hiding its color palette , 2008, 2008 IEEE International Conference on Multimedia and Expo.

[30]  Vito Cappellini,et al.  Opportunities and issues of image processing for cultural heritage applications , 2006, 2006 14th European Signal Processing Conference.

[31]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[32]  Takahiko Horiuchi,et al.  Accurate reversible color-to-gray mapping algorithm without distortion conditions , 2010, Pattern Recognit. Lett..

[33]  J. C. Dunn,et al.  A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters , 1973 .

[34]  Marc Chaumont,et al.  A fast and efficient method to protect color images , 2007, Electronic Imaging.

[35]  Nasir D. Memon,et al.  On ordering color maps for lossless predictive coding , 1996, IEEE Trans. Image Process..

[36]  Jessica J. Fridrich,et al.  Steganalysis of JPEG images using rich models , 2012, Other Conferences.

[37]  Geoffrey H. Ball,et al.  ISODATA, A NOVEL METHOD OF DATA ANALYSIS AND PATTERN CLASSIFICATION , 1965 .

[38]  Roberto Castagno,et al.  Estimation of image feature reliability for an interactive video segmentation scheme , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[39]  Chang-Hwan Son,et al.  Color Embedding and Recovery Based on Wavelet Packet Transform , 2008 .

[40]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[41]  Aloka Sinha,et al.  A technique for image encryption using digital signature , 2003 .

[42]  Xiaowei Xu,et al.  A hybrid scheme for encryption and watermarking , 2004, IS&T/SPIE Electronic Imaging.

[43]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..