Methods and systems for digital image security

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07965861

ABSTRACT:
Methods and systems for securing digital imagery are provided. In one respect, embedding, compression, encryption, data hiding, and other imaging processing techniques and systems may be provided for digital image security. In one non-limiting example, a method for producing a compressed and encrypted image is provided. An image may be converted into a binary bit stream, and the bit stream may be decomposed into a plurality of segments. A binary sequence based on a first key may be generated and may be used to generate a code matrix. A distance between the code matrix and the distance may be determined for each of the plurality of segments. Using a combined first and second key, a compressed and encrypted image may be obtained.

REFERENCES:
patent: 2007/0033419 (2007-02-01), Kocher et al.
Abdat and Bellanger, “Combining gray coding and JBIG for lossless image compression,”Proceedings of IEEE International Conference on Image Processing, 3:851-855, 1994.
Agaian and Cai, “New multilevel DCT, feature vectors, and universal blind steganalysis,”Security, Steganography, and Watermarking of Multimedia Contents VII, 5681:653-663, 2005.
Agaian and Cherukuri, “Secure and robust steganographic algorithm for binary images,”Proceedings of Society of Photo-optical Instrumentation Engineers, the International Society for Optical Engineering, 6235:F1-F10, 2006.
Chen et al., “A new data hiding method in binary image,”Proceedings of the IEEE Fifth International Symposium on Multimedia Software Engineering, 88-93, 2003.
Cheng et al., “Steganalysis of binary text images,”Proceedings on IEEE International Conference on Acoustics, Speech, and Signal Processing, 4:689-692, 2005.
Cohn and Lempel, “On fast m-sequence transforms,”IEEE Transactions on Information Theory, 23:135-137, 1977.
Crandall, “Some notes on steganography,” posted on http://os.inf.tu-dresden.de/˜westfeld/crandall.pdf,Steganography Mailing List, 1998.
Dumitrescu and Wu, “Steganalysis of LSB embedding in multimedia signals,”Proceedings of IEEE International Conference on Multimedia Expo, 1:581-584, 2002.
Fridrich et al., “Lossless data embedding for all image formats,”Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, 4675:572-583, 2002.
Fridrich et al., “Writing on wet paper,”IEEE Transactions on Signal Processing, 53(10):3923-3935, 2005.
Hill and Ridley, “Blind estimation of direct-sequence spread spectrum m-sequence chip codes,”IEEE on 6thInt. Symp. On Spread-Spectrum Tech.&Appli., 1:305-309, 2000.
Huffman, “A method for the construction of minimum-redundancy codes,”Proceedings of the I.R.E., 40(9):1098-1101, 1952.
Hwang and Chang, “A run-length mechanism for hiding data into binary images,”Proceedings of Pacific Rim Workshop on Digital Steganography, 71-74, 2002.
Kawaguchi and Eason, “Principle and applications of BPCS-steganography,”International Symposium on Voice, Video, and Data Communications, 1998.
Kuroki et al., “Adaptive arithmetic coding for image prediction errors,”Proceedings of the International Symposium on Circuits and Systems, 3:961-964, 2004.
Lee and Chen, “High capacity image steganographic model,”IEE Proc.—Vis. Image Signal Process., 147(3):288-294, 2000.
Lin, “‘Shift and add’ property of m-sequences and its application to channel characterisation of digital magnetic recording,”IEE Proceedings—Communications, 142(3):135-140, 1995.
Lötter and Linde, “A comparison of three families of spreading sequences for CDMA applications,”Proceedings of the 1994 IEEE South African Symposium on Communications and Signal Processing, 68-75, 1994.
Lu et al., “An objective distortion measure for binary document images based on human visual perception,”Proceedings on 16th International Conference on Pattern Recognition, 4:239-242, 2002.
Neeta and Snehal, “Implementation of LSB steganography and its evaluation for various bits,”First International Conference on Digital Information Management, 173-178, 2006.
Niimi et al., “Luminance quasi-preserving color quantization for digital steganography to palette-based images,”Proceedings of the 16th International Conference on Pattern Recognition, 1:251-254, 2002.
Provos and Honeyman, “Hide and seek: An introduction to steganography,”IEEE Security&Privacy, 1(3):32-44, 2003.
Sharp, “An implementation of key-based digital signal steganography,”Information Hiding, 2137:13-26, 2001.
Sutter, “The fast m-Transform: A fast computation of cross-correlations with binary m-Sequences,”SIAM J. Comput., 20(4):686-694, 1991.
Swanson et al., “Multimedia data-embedding and watermarking technologies,”Proceedings of the IEEE, 86(6):1064-1087, 1998.
Tirkel et al., “Image watermarking,”IEEE International Symposium on Spread Spectrum Techniques and Applications, Mainz Germany, 785-789, 1996.
Tsai et al., “Data hiding of binary images using pair-wise logical computation mechanism,”IEEE International Conference on Multimedia and Expo, 2:951-954, 2004.
Tseng and Pan, “Data hiding in 2-color images,”IEEE Transactions on Computers, 51(7):873-878, 2002.
Tseng and Pan, “Secure and invisible data hiding in 2-color images,”Proceedings of Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, 2:887-896, 2001.
Tseng et al., “A secure data hiding scheme for binary images,”IEEE Transactions on Communications, 50(8):1227-1231, 2002.
Valova and Kosugi, “Hadamard-based image decomposition and compression,”IEEE Transactions on Information Technology in Biomedicine, 4(4):306-319, 2000.
Wu and Liu, “Data hiding in binary image for authentication and annotation,”IEEE Transactions on Multimedia, 6(4):528-538, 2004.
Wu and Tsai, “Spatial-domain image hiding using image differencing,”IEE Proc. Vis. Image Signal Process., 147(1):29-37, 2000.
Wu et al., “Handling uneven embedding capacity in binary images,”Security, Steganography, and Watermarking of Multimedia Contents VII, 5681:194-205, 2005.
Yang and Kot, “Data hiding for bi-level documents using smoothing technique,”Proceedings of the 2004 International Symposium on Circuits and Systems, 5:692-695, 2004.
Zhi and Fen, “Detection of random LSB image steganography,”IEEE 60thVehicular Technology Conference, 3:2113-2117, 2004.
Zongqing and Hongbin, “A new data hiding method in binary images,”Proceedings of the First International Conference on Innovative Computing, Information and Control, 3:66-69, 2006.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for digital image security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for digital image security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for digital image security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2660974

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.