Adaptive Data Hiding Techniques for Secure Communication of Images 


Vol. 29,  No. 5, pp. 664-672, May  2004


PDF
  Abstract

Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices.
In this paper, we propose a selective partial image encryption scheme for image data hiding, which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices.
Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5dB to 7.5dB. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

Y. Seo, S. Kim, D. Kim, "Adaptive Data Hiding Techniques for Secure Communication of Images," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 5, pp. 664-672, 2004. DOI: .

[ACM Style]

Young-Ho Seo, Su-Min Kim, and Dong-Wook Kim. 2004. Adaptive Data Hiding Techniques for Secure Communication of Images. The Journal of Korean Institute of Communications and Information Sciences, 29, 5, (2004), 664-672. DOI: .

[KICS Style]

Young-Ho Seo, Su-Min Kim, Dong-Wook Kim, "Adaptive Data Hiding Techniques for Secure Communication of Images," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 5, pp. 664-672, 5. 2004.