Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Redundant Image Representations in Security Applications
 
conference paper

Redundant Image Representations in Security Applications

Jost, P.  
•
Frossard, P.  
•
Vandergheynst, P.  
2004
International Conference on Image Processing

To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of non-linear image approximations using highly redundant dictionaries, for security algorithms. We show that a flexible image representation based on a multidimensional and geometry-based coding scheme, has precious attributes for security information embedding. Redundant expansions provide very good approximation properties, as well as an increased resiliency to coding noise, and a simple stream structure enables easy manipulations. This paper describes simple examples of image scrambling and watermarking applications, based on a Matching Pursuit image coder. It illustrates the very interesting potential of redundant decompositions for data protection and security applications.

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

Jost2004_761.pdf

Access type

openaccess

Size

440.58 KB

Format

Adobe PDF

Checksum (MD5)

2dbecd66a4d083f9d731cd734753bbd9

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés