85 research outputs found

    An Efficient Re-Indexing Algorithm for Color-Mapped Images

    Full text link

    Tailored watermarking schemes for authentication of electronic clinical atlases

    Get PDF
    10.1109/TITB.2005.855556IEEE Transactions on Information Technology in Biomedicine94554-563ITIB

    Message Concealment Techniques using Image based Steganography

    Get PDF
    Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of compariso

    Message Concealment Techniques using Image based Steganography

    Get PDF
    Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of compariso

    Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images

    Get PDF
    Cryptography coupled with information hiding has received increased attention in recent years and has become a major research theme because of the importance of protecting encrypted information in any Electronic Data Interchange system in a way that is both discrete and covert. One of the essential limitations in any cryptography system is that the encrypted data provides an indication on its importance which arouses suspicion and makes it vulnerable to attack. Information hiding of Steganography provides a potential solution to this issue by making the data imperceptible, the security of the hidden information being a threat only if its existence is detected through Steganalysis. This paper focuses on a study methods for hiding encrypted information, specifically, methods that encrypt data before embedding in host data where the ‘data’ is in the form of a full colour digital image. Such methods provide a greater level of data security especially when the information is to be submitted over the Internet, for example, since a potential attacker needs to first detect, then extract and then decrypt the embedded data in order to recover the original information. After providing an extensive survey of the current methods available, we present a new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption. The application of this technique, which is based on a technique called ‘Stochastic Diffusion’ are wide ranging and include covert image information interchange, digital image authentication, video authentication, copyright protection and digital rights management of image data in general

    Message Concealment Techniques using Image based Steganography

    Get PDF
    Image based steganography is the most popular method for message concealment. In this paper, two techniques are proposed for enhancing the message secrecy using image based steganography. The first technique is based on the use of punctuation marks to encode a secret message before embedding it into the image file. The second technique is based on the use of modified scytale cipher to hide a secret message in an image file. Both of these techniques have been implemented and tested using the S-Tools software package. The original and stego-images both are shown for the purpose of comparison. Index Terms — Image based steganography, Message concealment, LSB insertion, Scytale ciphe

    Lossless compression of images with specific characteristics

    Get PDF
    Doutoramento em Engenharia ElectrotécnicaA compressão de certos tipos de imagens é um desafio para algumas normas de compressão de imagem. Esta tese investiga a compressão sem perdas de imagens com características especiais, em particular imagens simples, imagens de cor indexada e imagens de microarrays. Estamos interessados no desenvolvimento de métodos de compressão completos e no estudo de técnicas de pré-processamento que possam ser utilizadas em conjunto com as normas de compressão de imagem. A esparsidade do histograma, uma propriedade das imagens simples, é um dos assuntos abordados nesta tese. Desenvolvemos uma técnica de pré-processamento, denominada compactação de histogramas, que explora esta propriedade e que pode ser usada em conjunto com as normas de compressão de imagem para um melhoramento significativo da eficiência de compressão. A compactação de histogramas e os algoritmos de reordenação podem ser usados como préprocessamento para melhorar a compressão sem perdas de imagens de cor indexada. Esta tese apresenta vários algoritmos e um estudo abrangente dos métodos já existentes. Métodos específicos, como é o caso da decomposição em árvores binárias, são também estudados e propostos. O uso de microarrays em biologia encontra-se em franca expansão. Devido ao elevado volume de dados gerados por experiência, são necessárias técnicas de compressão sem perdas. Nesta tese, exploramos a utilização de normas de compressão sem perdas e apresentamos novos algoritmos para codificar eficientemente este tipo de imagens, baseados em modelos de contexto finito e codificação aritmética.The compression of some types of images is a challenge for some standard compression techniques. This thesis investigates the lossless compression of images with specific characteristics, namely simple images, color-indexed images and microarray images. We are interested in the development of complete compression methods and in the study of preprocessing algorithms that could be used together with standard compression methods. The histogram sparseness, a property of simple images, is addressed in this thesis. We developed a preprocessing technique, denoted histogram packing, that explores this property and can be used with standard compression methods for improving significantly their efficiency. Histogram packing and palette reordering algorithms can be used as a preprocessing step for improving the lossless compression of color-indexed images. This thesis presents several algorithms and a comprehensive study of the already existing methods. Specific compression methods, such as binary tree decomposition, are also addressed. The use of microarray expression data in state-of-the-art biology has been well established and due to the significant volume of data generated per experiment, efficient lossless compression methods are needed. In this thesis, we explore the use of standard image coding techniques and we present new algorithms to efficiently compress this type of images, based on finite-context modeling and arithmetic coding

    Bit inverting map method for improved steganography scheme

    Get PDF
    Achieving an efficient and accurate steganography scheme for hiding information is the foremost priority in the information and communication technology era. The developed scheme of hiding the secret message must capable of not giving any clue to the adversaries about the hidden data. In this regard, enhancing the security and capacity by maintaining the Peak Signal-to-Noise Ratio (PSNR) of the steganography scheme is the main issue to be addressed. This study proposes an improved Bit Inverting Map (BIM) method and a new scheme for embedding secret message into an image. This newly developed scheme is demonstrated to increase the security and capacity to resolve the existing problems. A binary text image is used to represent the secret message instead of normal text. Three stages implementations are used to select pixels before random embedding to select block of (64 64) pixels, followed by the Knight Tour algorithm to select sub-block of (8 8) pixels, and finally by the random pixels selection. The proposed BIM is distributed over the entire image to maintain high level of security against any kind of attack. One-bit indicator is used to decide if the secret bits are inserted directly or inversely, which enhanced the complexity of embedding process. Color and gray images from the standard dataset (USC-SIPI) including Lena, Peppers, Baboon, and Cameraman are implemented for benchmarking. Self-captured images are used to test the efficacy of the proposed BIM method. The results show good PSNR values of 72.9 and these findings verified the worthiness of the proposed BIM method. High complexities of pixels distribution and replacement of bits will ensure better security and robust imperceptibility compared to the existing scheme in the literature
    corecore