Applications of digital image processing become more widespread, especially as the transfer of images from one entity to another using the internet as the medium of transfer is increasing. Digital image transmission technology has found advanced applications in various fields where security is of paramount importance. Examples of such applications include medical databases and confidentiality of patient records, military databases and prevention of leaking of classified materials, business databases and protection of enterprise-wide records; online document storage systems, etc. Although a lot of research has been done on secure image transmission, several issues still remain unresolved, such as leakages during transmission, and the resulting loss of confidentiality. The current project presents an innovative method for secure image transmission that transforms a selected image by the secret fragment mosaic image approach, where the entire transformation process is controlled by a secret key. The secret key is used later to acquire the hidden content in a lossless manner from the proposed mosaic image. Simulation results are presented that highlight the performance of the proposed method in terms of secure transmission and lossless recovery.
|Commitee:||Ary, James, Wang, Fei|
|School:||California State University, Long Beach|
|School Location:||United States -- California|
|Source:||MAI 55/02M(E), Masters Abstracts International|
|Subjects:||Engineering, Electrical engineering|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be