Embedding Authentication and DistortionConcealment in Images – A Noisy Channel Perspective
Abstract
Keywords
References
S. Khalid, Introduction to Data Compression, New York, Morgan Kaufmann Publishers, 2000
L. Hanzo, P. Cherriman, J. Streit, Wireless Video Communications: IEEE Series, NY: IEEE Press, 2001.
Y. Wang and Q. Zhu, “Error control and concealment for video communication: A Review,” Proceedings of the IEEE, Vol. 86, No. 5, pp. 974-996, May 1998.
Mairal, C. and Agueh, M. , "Scalable and robust JPEG 2000 images and video transmission system for multiple wireless receivers", 2010 IEEE Latin-American Conference on Communications (LATINCOM), ECE, LACSC, Paris, France.
Martinez-Ruiz, M., Artes-Rodriguez, A., Diaz-Rico, J.A., Fuentes, J.B., "New initiatives for imagery transmission over a tactical data link. A case study: JPEG2000 compressed images transmitted in a Link-16 network method and results", Military Communications Conference, 2010, pp. 1163-1168.
P. Schelkens, A. Skodras & T. Ebrahimi. The JPEG 2000 Suite. Wiley, Series: Wiley-IS&T Series in Imaging Science and Technology, 2009.
Sun, Q., “A Secure and Robust Digital Signature Scheme for JPEG2000 Image Authentication”, IEEE Transactions on Multimedia,, Vol.7, No.3, pp.480,494, June 2005, doi: 10.1109/TMM.2005.846776
Wen, J., Wang, J., Feng, F., Zhang, B., “A Reversible Authentication Scheme for JPEG2000 Images”, The Ninth International Conference on Electronic Measurement & Instruments, vol., no., pp.4-486,4-489, 16-19 Aug. 2009
Zahia Brahimi, Z., Bessalah, H., Tarabet, A., Kholladi, M., “A new selective encryption technique of JPEG2000 codestream for medical images transmission”, 5thInternational Multi-Conference on Systems, Signals and Devices, 2008.
Tsai, P., , Hu, Y., Yeh, H., Shih, W., “Watermarking for Multi-resolution Image Authentication”, International Journal of Security and Its Applications Vol. 6, No. 2, April, 2012.
Lim,,S., Moon, H., Chae, S.,, Yongwha Chung, Y., Pan, S., “JPEG2000 and Digital Watermarking Technique Use in Medical Image”, IEEE International Conference on Secure Software Integration and Reliability Improvement, pp. 413-416, 2009
R. Dugad, K. Ratakonda and N. Ahuja, “A New Wavelet-based Scheme for Watermarking Images”, Proceedings of IEEE International Conference on Image Processing, Chicago, IL, USA, Oct. 1998, 419-423.
Sun, Q., Zhang, Z., “A Standardized JPEG2000 Image Authentication Solution based on Digital Signature and Watermarking”, China Communications, pp. 71-80, October 2006
Sathishkumar , G., Ramachandran, S., Bagan, K., “Image Encryption Using Random Pixel Permutation by Chaotic Mapping”, IEEE Symposium on Computers and Informatics, 2012, pp. 247-251
Joshi, S., Udupi, V., Joshi, D., “A Novel Neural Network Approach for Digital Image Data Encryption/Decryption”, IEEE International Conference on Power, Signals, Controls and Computation, pp.1-4, 3-6 January, 2012
Tang, Z., and Zhang, X., “Secure Image Encryption without Size Limitation using Arnold Transform and Random Strategies”, Journal of Multimedia, Vol. 6, No. 2, April 2011, pp. 202-206
Li, S., Wang, J., Gao, X., “The Fast realization of Image Scrambling Algorithm using Multi-Dimensional Orthogonal Transform”, IEEE Congress on Image and Signal Processing, pp. 47-51, 2008
J. Canny, “A Computational Approach to Edge Detection,” IEEE Transactions on Pattern Analysis, Vol. PAMI-8, No. 6, pp. 679-698, Nov. 1986.
Musheer Ahmad, A., Haque, E., Farooq, O., “A Noise Resilient Scrambling Scheme for Noisy Transmission Channel”, International Conference on Multimedia, Signal Processing and Communication Technologies, pp. 91-94, 2011
Memon, Q., Boumatar, A., “Robust Transmission of Images Based on JPEG2000 using Edge Information”, International Journal of Internet and Distributed Systems, Vol. 3, No. 1, pp. 174-183, 2013
Memon, Q., Kasparis, T., “Block median filters”, International Symposium on OE/Aerospace Sensing and Dual Use Photonics, pp. 100-109, Orlando, 1995.