{"title":"安全应用中的冗余图像表示","authors":"P. Jost, P. Vandergheynst, P. Frossard","doi":"10.1109/ICIP.2004.1421521","DOIUrl":null,"url":null,"abstract":"To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of nonlinear image approximations using highly redundant dictionaries, for security algorithms. We show that a flexible image representation based on a multidimensional and geometry-based coding scheme, has precious attributes for security information embedding. Redundant expansions provide very good approximation properties, as well as an increased resiliency to coding noise and a simple stream structure enables easy manipulations. This paper describes simple examples of image scrambling and watermarking applications, based on a matching pursuit image coder. It illustrates the very interesting potential of redundant decompositions for data protection and security applications.","PeriodicalId":184798,"journal":{"name":"2004 International Conference on Image Processing, 2004. ICIP '04.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Redundant image representations in security applications\",\"authors\":\"P. Jost, P. Vandergheynst, P. Frossard\",\"doi\":\"10.1109/ICIP.2004.1421521\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of nonlinear image approximations using highly redundant dictionaries, for security algorithms. We show that a flexible image representation based on a multidimensional and geometry-based coding scheme, has precious attributes for security information embedding. Redundant expansions provide very good approximation properties, as well as an increased resiliency to coding noise and a simple stream structure enables easy manipulations. This paper describes simple examples of image scrambling and watermarking applications, based on a matching pursuit image coder. It illustrates the very interesting potential of redundant decompositions for data protection and security applications.\",\"PeriodicalId\":184798,\"journal\":{\"name\":\"2004 International Conference on Image Processing, 2004. ICIP '04.\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2004 International Conference on Image Processing, 2004. ICIP '04.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIP.2004.1421521\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2004 International Conference on Image Processing, 2004. ICIP '04.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIP.2004.1421521","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Redundant image representations in security applications
To be efficient, data protection algorithms should generally exploit the properties of the media information in the transform domain. In this paper, we will advocate the use of nonlinear image approximations using highly redundant dictionaries, for security algorithms. We show that a flexible image representation based on a multidimensional and geometry-based coding scheme, has precious attributes for security information embedding. Redundant expansions provide very good approximation properties, as well as an increased resiliency to coding noise and a simple stream structure enables easy manipulations. This paper describes simple examples of image scrambling and watermarking applications, based on a matching pursuit image coder. It illustrates the very interesting potential of redundant decompositions for data protection and security applications.