Skip to main content
Log in

A new fast reversible method for image safe transfer

  • Original Research Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

In this paper a novel reversible method for fast and safe image transfer is proposed. The method combines compression, data hiding and partial encryption of images in a single processing step. The proposed approach can embed data into the image according to the message size and partially encrypt the image and the message without changing the original image content. Moreover, during the same process the image is lossless compressed. Nevertheless, the compression rate depends on the upper bound of message size to embed in the image. The main idea is to decompose the original image into two sub-images and to apply various processes to each sub-image in order to gain space and increase the amount of embedded data. The two sub-images are then scrambled and partially encrypted. The most significant characteristic of the proposed method is the utilization of a single procedure to simultaneously perform the compression, the reversible data hiding and the partial encryption rather than using three separate procedures. Our approach reduces then the computational effort and the required computation time. This method is specially suited for medical images where one can associate the patient diagnostic to the concerned medical image for safe transfer purpose.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Notes

  1. Such as shift-bit-left, shift-bit-right, AND, OR and XOR.

  2. We have used a 1.5 GHz Intel Pentium PC.

References

  1. AES.: Announcing the advanced encryption standard. Federal Information Processing Standards Publication (2001)

  2. Charilaos, C., Athanassios, S., Touradj, E.: The JPEG2000 still image coding system an overview. IEEE Trans. Consum. Electron. 46(4), 1103–1127 (2000)

    Article  Google Scholar 

  3. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, New York (2002)

    MATH  Google Scholar 

  4. Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of advanced concepts for intelligent vision systems (ACIVS) 2002, Ghent, Belgium, pp. 90–97, Sept. 2002

  5. Fridrich, J.: Applications of data hiding in digital images. In: ISPACS’98 Conference (1998)

  6. Fridrich, J., Goljan, M., Chen, Q., Pathak, V.: Lossless data embedding with file size preservation. In: Proceedings EI SPIE San Jose, CA, Jan 2004

  7. Fridrich, J., Goljan, M., Du, R.: Lossless data embedding new paradigm in digital watermarking. EURASIP J. Appl. Signal Process. 2002, 185–196 (2002)

    Article  MATH  Google Scholar 

  8. Gonzalez, R.C., Woods R.E.: Digital Image Processing, 2nd edn. Pearson Education (2002), Elsevier, Amsterdam (2002)

  9. Honsinger, C.W., Jones, P.W., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data. US Pat. 6,278,791 (2001)

  10. Liu, X., Eskicioglu, A.: Selective encryption of multimedia content in distribution networks: challenges and new directions. In: IASTED Communications, Internet & Information Technology (CIIT), USA, November (2003)

  11. Maniccam, S.S., Bourbakis, N.G.: Lossless image compression and encryption using SCAN. Pattern Recogn. 34, 1229–1245 (2001)

    Article  MATH  Google Scholar 

  12. Maniccam, S.S., Bourbakis, N.G.: Lossless compression and information hiding in images. Pattern Recogn. 37, 475–486 (2004)

    Article  MATH  Google Scholar 

  13. Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuit. Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  14. Norcen, R., Podesser, M., Pommer, A., Schmidt, H.P., Uhl, A.: Confidential storage and transmission of medical image data. Comput. Biol. Med. 33, 277–292 (2003)

    Article  Google Scholar 

  15. Schneier, B.: Applied Cryptography. Wiley, New-York (1995)

    Google Scholar 

  16. Stinson, D.R.: Cryptography: Theory and Practice (Discrete Mathematics and Its Applications). Chapman & Hall/CRC Press, New York (2005)

    Google Scholar 

  17. Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Heidelberg (2005)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. Puech.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Puech, W., Rodrigues, J.M. & Develay-Morice, J.E. A new fast reversible method for image safe transfer. J Real-Time Image Proc 2, 55–65 (2007). https://doi.org/10.1007/s11554-007-0045-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-007-0045-x

Keywords

Navigation