G06T2201/0203

COLOR IMAGE AUTHENTICATION METHOD BASED ON PALETTE COMPRESSION TECHNIQUE
20190213711 · 2019-07-11 ·

An image authentication method is provided. An original image is divided into blocks. An interpolation algorithm is performed on each block so as to obtain a first image. Each pixel in the first image is mapped into an index based on a palette compression technique, so as to generate a second image. Each index is divided into multiple secret values, and a secret sharing algorithm is performed based on the secret values to obtain multiple partial shares. A transparent map is generated according to the partial shares, and a lossless image filed is generated by combining the original image with the transparent map.

Methods and systems for reversible multi-layer data hiding

Methods and systems for providing multi-layer reversible data hiding are disclosed. According to the methods and systems, multi-layer reversible data hiding process may be implemented in two stages. The first stage provides embedding of the sensitive data on a secret layer and hiding the secret layer behind single or multiple layers for secure transmission for intended recipient. Subsequently, the second stage is concerned about retrieving or extracting the hidden sensitive data through proper authentication. In the extraction process, the recipient needs to provide the right authentication code for each of embedded layer in order to reach to the secret layer. Upon unsuccessful authentication of any embedded layer, the proposed method enables an intelligent security technique termed as SMART (Suspect Malicious Activity on Rich Tract), which ensures to protect the sensitive data by suspecting the attempts of theft and intrusion.

METHODS AND SYSTEMS FOR REVERSIBLE MUTI-LAYER DATA HIDING
20170155916 · 2017-06-01 ·

Methods and systems for providing multi-layer reversible data hiding are disclosed. According to the methods and systems, multi-layer reversible data hiding process may be implemented in two stages. The first stage provides embedding of the sensitive data on a secret layer and hiding the secret layer behind single or multiple layers for secure transmission for intended recipient. Subsequently, the second stage is concerned about retrieving or extracting the hidden sensitive data through proper authentication. In the extraction process, the recipient needs to provide the right authentication code for each of embedded layer in order to reach to the secret layer. Upon unsuccessful authentication of any embedded layer, the proposed method enables an intelligent security technique termed as SMART (Suspect Malicious Activity on Rich Tract), which ensures to protect the sensitive data by suspecting the attempts of theft and intrusion.

Method for reversible image data hiding
09639912 · 2017-05-02 · ·

A method for reversible image data hiding includes steps of encrypting an original image by an encryption process to generate an encrypted image, embedding a message into the encrypted image by an embedment process to generate an embedded image, and extracting the message and the original image from the embedded image by a decryption and extraction process. The encryption process includes generating a key stream by using a secret encryption key, and generating an encrypted image by XORing the original image with the key stream. The embedment process includes generating an embedded image by embedding the message via XORing the encrypted image with a predetermined public key set.

Watermark-based image reconstruction
12249002 · 2025-03-11 · ·

A computer-implemented method that provides watermark-based image reconstruction to compensate for lossy encoding schemes. The method can generate a difference image describing the data loss associated with encoding an image using a lossy encoding scheme. The difference image can be encoded as a message and embedded in the encoded image using a watermark and later extracted from the encoded image. The difference image can be added to the encoded image to reconstruct the original image. As an example, an input image encoded using a lossy JPEG compression scheme can be embedded with the lost data and later reconstructed, using the embedded data, to a fidelity level that is identical or substantially similar to the original.