Bibliographic Details
| Title: |
Utilization of the double random phase encoding algorithm for secure image communication. |
| Authors: |
Abd El-Hameed, Hayam A., El-Shafai, Walid, Hassan, Emad S., Khalaf, Ashraf A. M., El-Dolil, Sami A., El-Dokany, Ibrahim M., El-Khamy, Said E., Abd El-Samie, Fathi E. |
| Source: |
Multimedia Tools & Applications; Jun2024, Vol. 83 Issue 21, p60319-60342, 24p |
| Subject Terms: |
PHASE coding, DISCRETE cosine transforms, DISCRETE wavelet transforms, ALGORITHMS, DIGITAL watermarking, MULTIMEDIA communications |
| Abstract: |
With the advancements in multimedia communications, it has become apparent that there is a bad need to perform image communication with a confidence guarantee. We need to have a guarantee of image integrity at the receiver. Towards this objective, a proposed framework is presented in this paper. This framework comprises self-signature embedding in the transmitted images. The signatures are extracted from image blocks in the Discrete Cosine Transform (DCT) domain and embedded in other blocks in the same domain with a certain weight to avoid deteriorating the resulting image quality. A verification process is performed at the receiver to check whether the content has been modified or not. In addition, image watermarking is also used with DCT and Discrete Wavelet Transform (DWT) algorithms for authentication or verification. Moreover, Double Random Phase Encoding (DRPE) algorithm is used to secure the content of transmitted images. Then, to get a higher level of security for transmitted images, a hybrid technique depending on DCT-based signature embedding and the DRPE algorithm is presented. [ABSTRACT FROM AUTHOR] |
|
Copyright of Multimedia Tools & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Database: |
Complementary Index |