A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Machine learning based adaptive watermark decoding in view of anticipated attack
Pattern Recognition
An embedding technique based upon block prediction
Journal of Systems and Software
Dual watermark for image tamper detection and recovery
Pattern Recognition
DCT and PCA Based Method for Shape from Focus
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Information Sciences: an International Journal
Wavelet-based copyright-protection scheme for digital images based on local features
Information Sciences: an International Journal
Fragile watermarking using finite field trigonometrical transforms
Image Communication
Reversible watermarking algorithm using sorting and prediction
IEEE Transactions on Circuits and Systems for Video Technology
Database Relation Watermarking Resilient against Secondary Watermarking Attacks
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Technical Communication: Authentication and recovery of images using multiple watermarks
Computers and Electrical Engineering
Robust lossless image watermarking based on α-trimmed mean algorithm and support vector machine
Journal of Systems and Software
A reversible data hiding scheme using complementary embedding strategy
Information Sciences: an International Journal
Generic lossless visible watermarking: a new approach
IEEE Transactions on Image Processing
Information Sciences: an International Journal
Perceptually adaptive spread transform image watermarking scheme using Hadamard transform
Information Sciences: an International Journal
Optimal depth estimation by combining focus measures using genetic programming
Information Sciences: an International Journal
An optimal image watermarking approach based on a multi-objective genetic algorithm
Information Sciences: an International Journal
Intelligent reversible watermarking in integer wavelet domain for medical images
Journal of Systems and Software
Localization of the complex spectrum: the S transform
IEEE Transactions on Signal Processing
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform
IEEE Transactions on Information Forensics and Security - Part 1
IEEE Transactions on Multimedia
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Lossless Data Embedding Using Generalized Statistical Quantity Histogram
IEEE Transactions on Circuits and Systems for Video Technology
Improved Embedding for Prediction-Based Reversible Watermarking
IEEE Transactions on Information Forensics and Security - Part 2
Journal of Systems and Software
An efficient expanding block algorithm for image copy-move forgery detection
Information Sciences: an International Journal
Adaptive reversible watermarking with improved embedding capacity
Journal of Systems and Software
Information Sciences: an International Journal
Reversible watermarking scheme for medical image based on differential evolution
Expert Systems with Applications: An International Journal
Hi-index | 0.07 |
In this paper, we propose an application for 3D cameras by reversibly hiding the depth map in the corresponding 2D images. The proposed technique is prospective in cameras capable of capturing simultaneously the 2D image and resultant depth map of an object. 3D cameras equipped with self-embedding capability can serve two additional purposes, protection of the captured image and secure transmission of its depth map. The reversible watermarking, in addition to other features, guarantees the lossless recovery of an original image and separation of its depth map when required. For this purpose, a reversible watermarking scheme, based on genetic algorithm (GA), has been proposed which computes suitable threshold for each block of coefficients in the wavelet domain. Thus, a tradeoff is made between watermark imperceptibility and capacity using GA. The threshold map is embedded in addition to the actual payload and thus the proposed approach does not require histogram pre-processing in order to avoid overflow/underflow. The same threshold map has been used for authentication purpose by correlating it with the low-frequency coefficients of the 2D transformed image. Further to exploit the inherent redundancy in the depth map, which is the actual payload in this case, lossless compression has been employed before its embedding. Similarly, besides secret key-based permutation, a cryptographic layer is overlaid on the watermarking layer for security purposes. Experiments conducted on images and depth maps, obtained using a 3D camera and an optical microscopic system, validate the proposed concept.