A virtual image cryptosystem based upon vector quantization

We propose a new image cryptosystem to protect image data. It encrypts the original image into another virtual image. Since both original and virtual images are significant, our new cryptosystem can confuse illegal users. Besides the camouflage, this new cryptosystem has three other benefits. First,...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 7(1998), 10 vom: 30., Seite 1485-8
1. Verfasser: Chen, T S (VerfasserIn)
Weitere Verfasser: Chang, C C, Hwang, M S
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 1998
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Letter
LEADER 01000naa a22002652 4500
001 NLM177631643
003 DE-627
005 20231223150623.0
007 cr uuu---uuuuu
008 231223s1998 xx |||||o 00| ||eng c
024 7 |a 10.1109/83.718488  |2 doi 
028 5 2 |a pubmed24n0592.xml 
035 |a (DE-627)NLM177631643 
035 |a (NLM)18276214 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Chen, T S  |e verfasserin  |4 aut 
245 1 2 |a A virtual image cryptosystem based upon vector quantization 
264 1 |c 1998 
336 |a Text  |b txt  |2 rdacontent 
337 |a ƒaComputermedien  |b c  |2 rdamedia 
338 |a ƒa Online-Ressource  |b cr  |2 rdacarrier 
500 |a Date Completed 11.12.2009 
500 |a Date Revised 15.02.2008 
500 |a published: Print 
500 |a Citation Status PubMed-not-MEDLINE 
520 |a We propose a new image cryptosystem to protect image data. It encrypts the original image into another virtual image. Since both original and virtual images are significant, our new cryptosystem can confuse illegal users. Besides the camouflage, this new cryptosystem has three other benefits. First, our cryptosystem is secure even if the illegal users know that our virtual image is a camouflage. Second, this cryptosystem can compress image data. Finally, our method is more efficient than a method that encrypts the entire image directly 
650 4 |a Letter 
700 1 |a Chang, C C  |e verfasserin  |4 aut 
700 1 |a Hwang, M S  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society  |d 1992  |g 7(1998), 10 vom: 30., Seite 1485-8  |w (DE-627)NLM09821456X  |x 1941-0042  |7 nnns 
773 1 8 |g volume:7  |g year:1998  |g number:10  |g day:30  |g pages:1485-8 
856 4 0 |u http://dx.doi.org/10.1109/83.718488  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 7  |j 1998  |e 10  |b 30  |h 1485-8