Abstract: In this paper, the problem of transmitting
redundant data over an insecure, bandwidth-constrained communications channel
is discussed. A content owner encrypts the original uncompressed image using an
encryption key. Then, a data-hider may compress the least significant bits of
the encrypted image using a data-hiding key to create a sparse space to
accommodate some additional data. Using data hiding key the receiver can
extract additional data even the receiver has no information about the original
image content. Using the decryption key the receiver can extract data to obtain
an image similar to the original one, but cannot extract the additional data.
If the receiver has both the data-hiding key and the encryption key, the
receiver can extract the additional data and the original image without any
loss.
Keywords: Author Guide, Article, Camera-Ready Format, Paper Specifications, Paper Submission.