Secure Color Imaging
نویسندگان
چکیده
In digital imaging, visual data is massively accessed, distributed, manipulated and stored using communication and multimedia technology. To prevent unauthorized access, illegal copying and distribution, modern communication and multimedia systems utilize digital rights management (DRM) solutions to ensure media integrity, secure its transmission over untrusted communication channels and protect intellectual property rights [1], [2], [3]. Two fundamental DRM frameworks, i.e. watermarking [4] and encryption [5], have been suggested for protecting and enforcing the rights associated with the use of digital content [6]. Watermarking technologies are used for tasks such as identification of the content origin, copy protection , tracing illegal copies, fingerprinting, and disabling unauthorized access to content [7]. The image watermarking process embeds data, the so-called watermark, into the host image. Basically, watermarking can be performed in the spatial or frequency domain of the host image and the visual content can be protected by embedding visible or imperceptible watermarks [1]. Examples of color watermarking solutions which operate on different principles can be found in [8], [9], [10], [11]. Essential secure characteristics can be obtained by additive, multiplicative or quantization embedding. The watermark should be robust to various attacks and attempts for its removal, damage or unauthorized detection. After the transmission of watermarked images, the watermark is extracted using the secret key or blind extraction techniques. Note that most watermarking techniques are symmetric, i.e. the embedding and detection key are identical. Encryption technologies ensure protection by scrambling the visual data into unrecognizable and meaningless variants [7], [12], [13]. In general, this transformation should be reversible in order to allow for
منابع مشابه
Spectral Estimation of Printed Colors Using a Scanner, Conventional Color Filters and applying backpropagation Neural Network
Reconstruction the spectral data of color samples using conventional color devices such as a digital camera or scanner is always of interest. Nowadays, multispectral imaging has introduced a feasible method to estimate the spectral reflectance of the images utilizing more than three-channel imaging. The goal of this study is to spectrally characterize a color scanner using a set of conventional...
متن کاملColor scene transform between images using Rosenfeld-Kak histogram matching method
In digital color imaging, it is of interest to transform the color scene of an image to the other. Some attempts have been done in this case using, for example, lαβ color space, principal component analysis and recently histogram rescaling method. In this research, a novel method is proposed based on the Resenfeld and Kak histogram matching algorithm. It is suggested that to transform the color...
متن کاملDefending Shoulder Surfing Attacks in Secure Transactions using Multi Color Technique
To improve security of the various devices, the graphical password is memorable authentication method for authorization. When a user enters a personal identification number (PIN) as a numeric password in mobile or stationary systems, the shoulder surfing attack becomes great concern. To prevent shoulder surfing attack and to establish a secure transaction between the mobile app and server by im...
متن کاملRecognition of Sequence of Print and Ink Strokes: Investigation the Effect of Handwriting Pressure, Hue of Ink, Printer and Paper Type
By introducing of digital techniques, forensic document examiners has been encouraged to work with better accuracy in non-destructive ways. The aim of this study was to present a non-destructive, accessible, economic (affordable), user friendly, portable, useful and easy technique for specifying the order of crossing lines of ink stroke and printed text. The intersections of LaserJet and In...
متن کاملComputer Algorithms for Direct Encryption and Decryption of Digital Images for Secure Communication
In this paper we design a new practical computer algorithm based on chaotic map lattices which allows direct encryption and decryption of color digital images. The basic idea is to convert, pixel by pixel, the image color to logistic chaotic maps one-way coupled by initial conditions. After small numbers of iterations and cycles, the image becomes indistinguishable due to inherent properties of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007