54
Views
1
CrossRef citations to date
0
Altmetric
Original Article

A secure image delivery scheme with regional protection capability using image inpainting and editing

, , &
Pages 509-517 | Accepted 15 Apr 2012, Published online: 18 Nov 2013

REFERENCES

  • Cox IJ, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process., 1997, 6, 1673–1687.
  • Chang FC, Huang HC, Hang HM. Layered access control schemes on watermarked scalable media. J. VLSI Signal Process. Syst. Signal Image Video Technol., 2007, 49, 443–455.
  • Zhang XP, Wang SZ. Fragile watermarking with error-free restoration capability. IEEE Trans. Multimed., 2008, 10, 1490–1499.
  • Koval A, Shih FY, Verkhovsky BS. A pseudo-random pixel rearrangement algorithm based on Gaussian integers for image watermarking. J. Inf. Hid. Multimed. Signal Process., 2011, 2, 60–70.
  • Chang CC, Chen YH, Kieu TD. A watermarking technique using synonym substitution for integrity protection of XML documents. ICIC Express Lett., 2010, 4, 89–94.
  • Lian SG, Wang ZQ. Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Trans. Circuits Syst. Video Technol., 2008, 18, 1462–1467.
  • Lian SG. Quasi-commutative watermarking and encryption for secure media content distribution. Multimed. Tools Appl., 2009, 43, 91–107.
  • Kundur D, Karthik K. Video fingerprinting and encryption principles for digital rights management. Proc. IEEE, 2004, 92, 918–932.
  • Chan YK, Pai PY, Chen RC, Chang CC. A VQ compression method based on the variations of the image block groups. Int. J. Innov. Comput. Inf. Control, 2010, 6, 4527–4538.
  • Lee CF, Chang CC, Pai PY, Huang WH. An effective demosaicing algorithm for CFA image. Int. J. Innov. Comput. Inf. Control, 2010, 6, 5485–5500.
  • Huang CB, Lai ZH, Wan MH, Jin Z. Incremental semi-supervised label propagation in image retrieval. ICIC Express Lett., 2010, 4, 263–268.
  • Wang ZH, Chang CC, Tu HN, Li MC. Sharing a secret image in binary images with verification. J. Inf. Hid. Multimed. Signal Process., 2011, 2, 78–90.
  • Qin C, Cao F, Zhang XP. Efficient image inpainting using adaptive edge-preserving propagation. Imag. Sci. J., 2011, 59, 211–218.
  • Qin C, Wang SZ, Zhang XP. Simultaneous inpainting for image structure and texture using anisotropic heat transfer model. Multimed. Tools Appl., 2012, 56, 469–483.
  • Bertalmio M, Sapiro G, Caselles V, Ballester C. Image inpainting, Proc. ACM SIGGRAPH Conf. on Computer graphics, New Orleans, LA, USA, July 2000, ACM SIGGRAPH, pp. 417–424.
  • Bertalmio M, Bertozzi AL, Sapiro G. Navier-Stokes, fluid dynamics, and image and video inpainting, Proc. IEEE Int. Conf. on Computer vision and pattern recognition: CVPR ’01, Kauai, HI, USA, December 2001, IEEE Computer Society, pp. 355–362.
  • Shih TK. Adaptive digital image inpainting, Proc. 18th Int. Conf. on Advanced information networking and applications: AINA ’04, Fukuoka, Japan, March 2004, IEEE Computer Society, Vol. 1, pp. 71–76.
  • Criminisi A, Perez P, Toyama K. Region filling and object removal by exemplar-based image inpainting. IEEE Trans. Image Process., 2004, 13, 1200–1212.
  • Perez P, Gangnet M, Blake A. Poisson image editing. ACM Trans. Graph., 2003, 22, 313–318.
  • Sun J, Jia JY, Tang CK, Shum HY. Poisson matting. ACM Trans. Graph., 2004, 23, 315–321.
  • Liu T, Sun J, Zheng NN, Tang XO, Shum HY. Learning to detect a salient object. Proc. IEEE Conf. on Computer vision and pattern recognition: CVPR ’07, Minneapolis, MN, USA, June 2007, IEEE Computer Society, pp. 1–8.
  • Han J, Ngan KN, Li MJ, Zhang HJ. Unsupervised extraction of visual attention objects in color images. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 141–145.
  • Ni ZC, Shi YQ, Ansari N, Su W. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 2006, 16, 354–362.
  • Wang CC, Hwang YT, Chang CC, Jan JK. Hiding information in binary images with complete reversibility and high embedding capacity. Int. J. Innov. Comput. Inf. Control, 2010, 6, 5143–5162.
  • Chang CC, Chen KN, Wang ZH. Hiding secret information in modified locally adaptive data compression code. ICIC Express Lett., 2010, 4, 1887–1892.
  • Huang HC, Fang WC. Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors, 2011, 11, 9717–9731.
  • Lin CC, Tai WL, Chang CC. Multilevel reversible data hiding based on histogram modification of difference images. Patt. Recog., 2008, 41, 3582–3591.
  • Dybala B, Jennings B, Letscher D. Detecting filtered cloning in digital images. Proc. ACM Workshop on Multimedia & security: MM&SEC ’07, Dallas, TX, USA, December 2007, ACM, pp. 43–50.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.