To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of non-linear image approximations using highly redundant dictionaries, for security algorithms. We show that a flexible image representation based on a multidimensional and geometry-based coding scheme, has precious attributes for security information embedding. Redundant expansions provide very good approximation properties, as well as an increased resiliency to coding noise, and a simple stream structure enables easy manipulations. This paper describes simple examples of image scrambling and watermarking applications, based on a Matching Pursuit image coder. It illus...
Recently, a new image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed ...
Image scrambling is a useful approach to secure the image data by scrambling the image into an uni...
Now-a-days watermarking plays a pivotal role in most of the industries for providing security to the...
This chapter discusses the problem of coding images using very redundant libraries of waveforms, als...
New breakthroughs in image coding possibly rely in signal decomposition through non-separable basis ...
Image-scrambling schemes are designed to render the image content unintelligible. Wyner has proposed...
The classical solution to an underdetermined system of linear equations mainly has two opposite dire...
Securing the contents of visual data and multimedia requires specific design consideration for use i...
Multimedia data security has become a noticeable problem in the continuous development of multimedia...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
A digital watermark is a message robustly hidden within another digitized signal such as an image, a...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
Securing the contents of visual data and multimedia requires specific design consideration for use i...
Recently, a new image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed ...
Recently, a new image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed ...
Image scrambling is a useful approach to secure the image data by scrambling the image into an uni...
Now-a-days watermarking plays a pivotal role in most of the industries for providing security to the...
This chapter discusses the problem of coding images using very redundant libraries of waveforms, als...
New breakthroughs in image coding possibly rely in signal decomposition through non-separable basis ...
Image-scrambling schemes are designed to render the image content unintelligible. Wyner has proposed...
The classical solution to an underdetermined system of linear equations mainly has two opposite dire...
Securing the contents of visual data and multimedia requires specific design consideration for use i...
Multimedia data security has become a noticeable problem in the continuous development of multimedia...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
A digital watermark is a message robustly hidden within another digitized signal such as an image, a...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
This paper presents an authentication algorithm based on robust watermarking techniques. In particul...
Securing the contents of visual data and multimedia requires specific design consideration for use i...
Recently, a new image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed ...
Recently, a new image scrambling (i.e., encryption) scheme without bandwidth expansion was proposed ...
Image scrambling is a useful approach to secure the image data by scrambling the image into an uni...
Now-a-days watermarking plays a pivotal role in most of the industries for providing security to the...