Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(5.99MB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Data Steganography for Optical Color Image Cryptosystems
Cheng-Hung Chuang, Guo-Shiang Lin
Pages - 318 - 327     |    Revised - 30-12-2009     |    Published - 31-01-2010
Volume - 3   Issue - 6    |    Publication Date - January 2010  Table of Contents
MORE INFORMATION
KEYWORDS
Data embedding, Data hiding, Image encryption, Optical security, Double random phase
ABSTRACT
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
CITED BY (8)  
1 Hussain, I., & Gondal, M. A. (2014). Stego Optical Encryption Based on Chaotic Baker’s Map Transformation. Zeitschrift für Naturforschung A, 69(5-6), 249-253.
2 Sharma, A., Konai, S., & Bhattacharya, U. (2014, May). New call and handoff call management scheme for reuse partitioning based cellular systems. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-7). IEEE.
3 Sharma, A., Konai, S., & Bhattacharya, U. (2014, May). New call and handoff call management scheme for reuse partitioning based cellular systems. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-7). IEEE.
4 Sharma, M., & Jain, S. (2014, May). A reduced complexity approach for image compression using 1-D & 2-D chaos functions. In Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-5). IEEE.
5 Sharma, P. (2013). Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform. arXiv preprint arXiv:1401.6087.
6 Sharma, P., & Kumar, D. S. (2013). A robust and efficient scheme for image encryption-decryption.
7 Sharma, P., Mishra, D., & Agarwal, A. (2012, October). Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. In Proceedings of the Fifth International Conference on Security of Information and Networks (pp. 153-157). ACM.
8 Sharma, M., & Jain, S. An efficient image compression algorithm with reduced complexity.
1 Google Scholar
2 ScientificCommons
3 Academic Index
4 CiteSeerX
5 refSeek
6 iSEEK
7 Socol@r
8 ResearchGATE
9 Bielefeld Academic Search Engine (BASE)
10 OpenJ-Gate
11 Scribd
12 WorldCat
13 SlideShare
14 PDFCAST
15 PdfSR
16 Free-Books-Online
1 M. Yang, N. Bourbakis, and Li Shujun, “Data-image-video encryption,” IEEE Potentials, vol. 23, no. 3, pp. 28-34, 2004.
2 Y. Govindarajan and S. Dakshinamurthi, “Quality - security uncompromised and plausible watermarking for patent infringement,” International Journal of Image Processing, vol. 1, no. 2, 2007.
3 T.-S. Chen, C.-C. Chang, and M.-S. Hwang, “A virtual image cryptosystem based on vector quantization,” IEEE Trans. Image Processing, vol. 7, no. 10, pp. 1485-1488, 1998.
4 Y.-C. Hu, “High-capacity image hiding scheme based on vector quantization,” Pattern Recognition, vol. 39, no. 9, pp. 1715-1724, 2006.
5 C.-C. Chang, C.-Y. Lin, and Y.-Z. Wang, “New image steganographic methods using runlength approach,” Information Sciences, vol. 176, no. 22, pp. 3393-3408, 2006.
6 W.-Y. Chen, “Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation,” Applied Mathematics and Computation, vol. 185, no. 1, pp. 432-448, 2007.
7 P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Optics Letters, vol. 20, pp. 767-769, 1995.
8 G.-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, “A public-key-based optical image cryptosystem based on data embedding techniques,” Optical Engineering, vol. 42, no. 8, pp. 2331-2339, 2003.
9 C.-H. Chuang and G.-S. Lin, “An optical image cryptosystem based on adaptive steganography,” Optical Engineering, vol. 47, 047002 (9 pages), April 2008.
10 L. Chen and D. Zhao, “Optical color image encryption by wavelength multiplexing and lensless Fresnel transform holograms,” Optics Express, vol. 14, pp. 8552-8560, 2006.
11 M. Joshi, Chandrashakher, and K. Singh, “Color image encryption and decryption using fractional Fourier transform,” Optics Communications, vol. 279, pp. 35-42, 2007.
12 Computer Vision Group (CVG), Department of Computer Science and Artificial Intelligence, University of Granada. Retrieved from http://decsai.ugr.es/cvg/, August 2008.
13 Kodak Lossless True Color Image Suite. Retrieved from http://r0k.us/graphics/kodak/, August 2008.
14 Programming, Image Processing, and Video Codecs Resourses. Retrieved from http://www.hlevkin.com/, August 2008.
Dr. Cheng-Hung Chuang
Asia University, Designation = Taiwan - Taiwan
chchuang@asia.edu.tw
Dr. Guo-Shiang Lin
- Taiwan