Reversible image visual transformation for privacy and content protection View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2020-10-14

AUTHORS

Hao-Tian Wu, Ruoyan Jia, Jean-Luc Dugelay, Junhui He

ABSTRACT

In this paper, a novel image transformation scheme is proposed to protect the visual information. By mimicking an arbitrarily chosen reference image, a secret image is visually changed and can be exactly recovered from the transformed image when needed. Unlike the block-wise visual encryption methods, the proposed transformation scheme modifies the secret image by bit plane replacement and reordering so that no block effect is introduced. In particular, one or more bit planes are hidden into the other bit planes so that the most significant one(s) can be vacated. Besides replacing the vacated bit plane(s) and reordering the others according to the reference image, histogram modification may be performed to conceal the secret content if needed. To exactly recover the secret image, the required information is recorded and reversibly hidden into the transformed image by adopting a reversible data hiding algorithm. The experimental results on three image sets show that their content can be semantically changed to prevent leakage of visual information. Moreover, the applicability and efficiency of the proposed scheme have been validated by comparing the existing visual encryption schemes. More... »

PAGES

30863-30877

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s11042-020-09985-1

DOI

http://dx.doi.org/10.1007/s11042-020-09985-1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1131765281


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China", 
          "id": "http://www.grid.ac/institutes/grid.79703.3a", 
          "name": [
            "School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wu", 
        "givenName": "Hao-Tian", 
        "id": "sg:person.011314467455.63", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011314467455.63"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China", 
          "id": "http://www.grid.ac/institutes/grid.79703.3a", 
          "name": [
            "School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jia", 
        "givenName": "Ruoyan", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Digital Security Department, EURECOM, F-06410, Biot, France", 
          "id": "http://www.grid.ac/institutes/grid.28848.3e", 
          "name": [
            "Digital Security Department, EURECOM, F-06410, Biot, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dugelay", 
        "givenName": "Jean-Luc", 
        "id": "sg:person.015053427343.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China", 
          "id": "http://www.grid.ac/institutes/grid.79703.3a", 
          "name": [
            "School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "He", 
        "givenName": "Junhui", 
        "id": "sg:person.015650356304.80", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015650356304.80"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/s11042-018-6410-x", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1106158689", 
          "https://doi.org/10.1007/s11042-018-6410-x"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11042-014-1894-5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041988438", 
          "https://doi.org/10.1007/s11042-014-1894-5"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-88961-8_17", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028861381", 
          "https://doi.org/10.1007/978-3-540-88961-8_17"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11042-017-4622-0", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085129366", 
          "https://doi.org/10.1007/s11042-017-4622-0"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2020-10-14", 
    "datePublishedReg": "2020-10-14", 
    "description": "In this paper, a novel image transformation scheme is proposed to protect the visual information. By mimicking an arbitrarily chosen reference image, a secret image is visually changed and can be exactly recovered from the transformed image when needed. Unlike the block-wise visual encryption methods, the proposed transformation scheme modifies the secret image by bit plane replacement and reordering so that no block effect is introduced. In particular, one or more bit planes are hidden into the other bit planes so that the most significant one(s) can be vacated. Besides replacing the vacated bit plane(s) and reordering the others according to the reference image, histogram modification may be performed to conceal the secret content if needed. To exactly recover the secret image, the required information is recorded and reversibly hidden into the transformed image by adopting a reversible data hiding algorithm. The experimental results on three image sets show that their content can be semantically changed to prevent leakage of visual information. Moreover, the applicability and efficiency of the proposed scheme have been validated by comparing the existing visual encryption schemes.", 
    "genre": "article", 
    "id": "sg:pub.10.1007/s11042-020-09985-1", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isFundedItemOf": [
      {
        "id": "sg:grant.8310902", 
        "type": "MonetaryGrant"
      }
    ], 
    "isPartOf": [
      {
        "id": "sg:journal.1044869", 
        "issn": [
          "1380-7501", 
          "1573-7721"
        ], 
        "name": "Multimedia Tools and Applications", 
        "publisher": "Springer Nature", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "20", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "80"
      }
    ], 
    "keywords": [
      "secret image", 
      "bit planes", 
      "reference image", 
      "reversible data hiding algorithm", 
      "data hiding algorithm", 
      "visual information", 
      "transformation scheme", 
      "content protection", 
      "encryption method", 
      "encryption scheme", 
      "secret content", 
      "hiding algorithm", 
      "image sets", 
      "histogram modification", 
      "visual transformation", 
      "images", 
      "experimental results", 
      "scheme", 
      "information", 
      "privacy", 
      "algorithm", 
      "block effect", 
      "bits", 
      "set", 
      "applicability", 
      "efficiency", 
      "method", 
      "content", 
      "transformation", 
      "results", 
      "protection", 
      "plane", 
      "leakage", 
      "modification", 
      "replacement", 
      "effect", 
      "paper", 
      "novel image transformation scheme", 
      "image transformation scheme", 
      "block-wise visual encryption methods", 
      "visual encryption methods", 
      "bit plane replacement", 
      "plane replacement", 
      "more bit planes", 
      "visual encryption schemes", 
      "Reversible image visual transformation", 
      "image visual transformation"
    ], 
    "name": "Reversible image visual transformation for privacy and content protection", 
    "pagination": "30863-30877", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1131765281"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s11042-020-09985-1"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s11042-020-09985-1", 
      "https://app.dimensions.ai/details/publication/pub.1131765281"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2022-01-01T18:56", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_851.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://doi.org/10.1007/s11042-020-09985-1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09985-1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09985-1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09985-1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11042-020-09985-1'


 

This table displays all metadata directly associated to this object as RDF triples.

146 TRIPLES      22 PREDICATES      76 URIs      64 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s11042-020-09985-1 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author Nfdae0e07ff3b4ed089f67135d3f58b73
4 schema:citation sg:pub.10.1007/978-3-540-88961-8_17
5 sg:pub.10.1007/s11042-014-1894-5
6 sg:pub.10.1007/s11042-017-4622-0
7 sg:pub.10.1007/s11042-018-6410-x
8 schema:datePublished 2020-10-14
9 schema:datePublishedReg 2020-10-14
10 schema:description In this paper, a novel image transformation scheme is proposed to protect the visual information. By mimicking an arbitrarily chosen reference image, a secret image is visually changed and can be exactly recovered from the transformed image when needed. Unlike the block-wise visual encryption methods, the proposed transformation scheme modifies the secret image by bit plane replacement and reordering so that no block effect is introduced. In particular, one or more bit planes are hidden into the other bit planes so that the most significant one(s) can be vacated. Besides replacing the vacated bit plane(s) and reordering the others according to the reference image, histogram modification may be performed to conceal the secret content if needed. To exactly recover the secret image, the required information is recorded and reversibly hidden into the transformed image by adopting a reversible data hiding algorithm. The experimental results on three image sets show that their content can be semantically changed to prevent leakage of visual information. Moreover, the applicability and efficiency of the proposed scheme have been validated by comparing the existing visual encryption schemes.
11 schema:genre article
12 schema:inLanguage en
13 schema:isAccessibleForFree false
14 schema:isPartOf N035e0b5c4edd455589f07d90fb7ab753
15 Nf793fb2b962b419fb900b484900aec5f
16 sg:journal.1044869
17 schema:keywords Reversible image visual transformation
18 algorithm
19 applicability
20 bit plane replacement
21 bit planes
22 bits
23 block effect
24 block-wise visual encryption methods
25 content
26 content protection
27 data hiding algorithm
28 effect
29 efficiency
30 encryption method
31 encryption scheme
32 experimental results
33 hiding algorithm
34 histogram modification
35 image sets
36 image transformation scheme
37 image visual transformation
38 images
39 information
40 leakage
41 method
42 modification
43 more bit planes
44 novel image transformation scheme
45 paper
46 plane
47 plane replacement
48 privacy
49 protection
50 reference image
51 replacement
52 results
53 reversible data hiding algorithm
54 scheme
55 secret content
56 secret image
57 set
58 transformation
59 transformation scheme
60 visual encryption methods
61 visual encryption schemes
62 visual information
63 visual transformation
64 schema:name Reversible image visual transformation for privacy and content protection
65 schema:pagination 30863-30877
66 schema:productId N4f96cda1b9994fa59b7f534e182a3519
67 Nea4a202cc93e470ebccbf428de455623
68 schema:sameAs https://app.dimensions.ai/details/publication/pub.1131765281
69 https://doi.org/10.1007/s11042-020-09985-1
70 schema:sdDatePublished 2022-01-01T18:56
71 schema:sdLicense https://scigraph.springernature.com/explorer/license/
72 schema:sdPublisher Ne9103ee5819b41e5a1aa4fa45e4eb232
73 schema:url https://doi.org/10.1007/s11042-020-09985-1
74 sgo:license sg:explorer/license/
75 sgo:sdDataset articles
76 rdf:type schema:ScholarlyArticle
77 N035e0b5c4edd455589f07d90fb7ab753 schema:issueNumber 20
78 rdf:type schema:PublicationIssue
79 N29426bb272ec4e27b53786569e7e0481 rdf:first sg:person.015053427343.37
80 rdf:rest N2ea7503778b140969124d8d51b065fe2
81 N2ea7503778b140969124d8d51b065fe2 rdf:first sg:person.015650356304.80
82 rdf:rest rdf:nil
83 N4f96cda1b9994fa59b7f534e182a3519 schema:name dimensions_id
84 schema:value pub.1131765281
85 rdf:type schema:PropertyValue
86 N7fb717028eb64901a9b478dea9769b45 rdf:first Na8a3f0f5773340cb97ce296725c070a1
87 rdf:rest N29426bb272ec4e27b53786569e7e0481
88 Na8a3f0f5773340cb97ce296725c070a1 schema:affiliation grid-institutes:grid.79703.3a
89 schema:familyName Jia
90 schema:givenName Ruoyan
91 rdf:type schema:Person
92 Ne9103ee5819b41e5a1aa4fa45e4eb232 schema:name Springer Nature - SN SciGraph project
93 rdf:type schema:Organization
94 Nea4a202cc93e470ebccbf428de455623 schema:name doi
95 schema:value 10.1007/s11042-020-09985-1
96 rdf:type schema:PropertyValue
97 Nf793fb2b962b419fb900b484900aec5f schema:volumeNumber 80
98 rdf:type schema:PublicationVolume
99 Nfdae0e07ff3b4ed089f67135d3f58b73 rdf:first sg:person.011314467455.63
100 rdf:rest N7fb717028eb64901a9b478dea9769b45
101 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
102 schema:name Information and Computing Sciences
103 rdf:type schema:DefinedTerm
104 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
105 schema:name Artificial Intelligence and Image Processing
106 rdf:type schema:DefinedTerm
107 sg:grant.8310902 http://pending.schema.org/fundedItem sg:pub.10.1007/s11042-020-09985-1
108 rdf:type schema:MonetaryGrant
109 sg:journal.1044869 schema:issn 1380-7501
110 1573-7721
111 schema:name Multimedia Tools and Applications
112 schema:publisher Springer Nature
113 rdf:type schema:Periodical
114 sg:person.011314467455.63 schema:affiliation grid-institutes:grid.79703.3a
115 schema:familyName Wu
116 schema:givenName Hao-Tian
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011314467455.63
118 rdf:type schema:Person
119 sg:person.015053427343.37 schema:affiliation grid-institutes:grid.28848.3e
120 schema:familyName Dugelay
121 schema:givenName Jean-Luc
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37
123 rdf:type schema:Person
124 sg:person.015650356304.80 schema:affiliation grid-institutes:grid.79703.3a
125 schema:familyName He
126 schema:givenName Junhui
127 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015650356304.80
128 rdf:type schema:Person
129 sg:pub.10.1007/978-3-540-88961-8_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028861381
130 https://doi.org/10.1007/978-3-540-88961-8_17
131 rdf:type schema:CreativeWork
132 sg:pub.10.1007/s11042-014-1894-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041988438
133 https://doi.org/10.1007/s11042-014-1894-5
134 rdf:type schema:CreativeWork
135 sg:pub.10.1007/s11042-017-4622-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085129366
136 https://doi.org/10.1007/s11042-017-4622-0
137 rdf:type schema:CreativeWork
138 sg:pub.10.1007/s11042-018-6410-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1106158689
139 https://doi.org/10.1007/s11042-018-6410-x
140 rdf:type schema:CreativeWork
141 grid-institutes:grid.28848.3e schema:alternateName Digital Security Department, EURECOM, F-06410, Biot, France
142 schema:name Digital Security Department, EURECOM, F-06410, Biot, France
143 rdf:type schema:Organization
144 grid-institutes:grid.79703.3a schema:alternateName School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China
145 schema:name School of Computer Science and Engineering, South China University of Technology, 510006, Guangzhou, GD, China
146 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...