SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P)
www.ijiris.com
_______________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-15, IJIRIS- All Rights Reserved Page -1
Quality Measurements of Lossy Image Steganography
Based on H-AMBTC Technique Using Hadamard
Transform Domain
YAHYA E. A. AL-SALHIa
, SONGFENG LU *b
a. Research Scholar, School of computer science, Huazhong University of science and technology
Wuhan 430074,PR china
b. associate professor,School of computer science, Huazhong University of science and technology
Wuhan 430074,PR china
Abstract— Steganography is a type of image information concealing technique which hides a secret message in a
different media such as image, video and audio etc, called cover file. The main idea of steganography is to provide
security to private or public data. In this paper we combined among Hadamard transformation and Absolute Moment
Block Truncation Coding to make a new concept called (H-AMBTC), this concept used for compressing the cover file
and conceal the secret data into the cover file. The H-AMBTC compression is not only image compression, but it is
more than the AMBTC technique as only half of the number of pixels in the binary converted image are transmitted.
In this paper, the comparison process of the H-AMBTC technique is done for 2x2, 4x4, 8x8 and 16x16 block sizes. H-
AMBTC is a lossy technique as the cover image and the secret image can be recovered completely.
Keywords— H-AMBTC, AMBTC, PSNR, Hadamard transform, Image information concealing, Steganography.
I. INTRODUCTION
Steganography is an old science, but its applications in the information concealing are new. However, steganography
is referred to as a process to conceal secret data of different media (message, image, information, etc.) into another digital
media (text, image, audio or video streams), called cover files, steganography can solve the problem of perception of the
secret message. The media that conceals the data is called “cover’’ or “host’’ media. Computer based steganography is
usually based on randomness. There are many occurrences of randomness in computer based information.
Steganography data can be hidden into this random information. The merits of a steganography method are judged on
whether the addition of the steganography data changes the randomness. Image steganography as an individual
concept has already been discussed. [1] But a few researchers’ works on the images steganography combine with
compression tools. In our work, we discuss how to combine the AMBTC technique and Hadamard transform to give a
good technique called (H-AMBTC), and combined this work with the image steganography, in this case the image
compressed steganography will be high powerful. AMBTC has the same general characteristics as BTC which includes
low storage requirements and an extremely simple coding and decoding technique. The main idea of AMBTC is to
preserve higher mean and lower mean of each small rectangular block of pixels spatially and non-overlapping
divided from the original image. Thus it is necessary to increase the number of quantization levels to improve the image
quality. The rest of this paper is organized as following: Sec.2 deals with the Preliminaries which are discussed the
AMBTC, Hadamard transformation, compression procedures and image quality measurements. Sec.3, gives the details
about the proposed scheme called an H-AMBTC and its algorithms respectively. In Sec.4, the performing and the results
are analysed. Finally, Sec.5, gives the concluding remarks.
II. PRELIMINARIES
A. AMBTC
Block Truncation Coding (BTC) technique is also called a moment preserving quantize. The AMBTC is
improved by BTC to be more powerful in image compression to give a good results when the image compressed. The
concept of (AMBTC) was introduced by Lema and Mitchell in 1984 [2,6]. The consideration of AMBTC is to maintain
the mean and the first absolute moment of image blocks. [4]. in the original form of AMBTC, the image will be
segmented into uniform or non-uniform blocks to be controlled. Image compression using AMBTC have very good
measurement such as PSNR, MSE and BPP [1,8]. It has more advantages of preserving single pixel and edges having
low computational complexity. Other options of the moments result either in lossy MSE or lossy computational
complexity. In AMBTC algorithm, similar to BTC, there are four separate steps while coding a single block of size
n x n. They are quad tree segmentation, bit plane omission, bit plane coding using 32 visual patterns and
interpolative bit plane coding. In this paper, we compress the image using H-AMBTC; the combination of these two
techniques it gives a powerful compressed image.
B. HADAMARD TRANSFORMATION
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P)
www.ijiris.com
_______________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-15, IJIRIS- All Rights Reserved Page -2
A Hadamard matrix H of order n is an n × n matrix of 1s and -1s in which HH´= nIn. (In is the n × n identify matrix.)
[2,3]. Equivalently, a Hadamard matrix is an n × n matrix of 1s and -1s in which any two distinct rows agree in exactly
n/2 positions (and thus disagree in exactly n/2 positions.). With this definition, the entries of the matrix don’t need to be
1s and -1s. They could be chosen from {red, green} or {0, 1} [3]. A Hadamard matrix can exist only if n is 1, 2, or a
multiple of 4. It has been conjectured that Hadamard matrices exist for any n that is a multiple of 4. This is probably true
but has not been proven [2]. (It has been verified at least through n= 664.). We will be interested primarily in the case
where n is a power of 2, in which case Hadamard matrices are known to exist
C. COMPRESSION PROCEDURE
The image is divided into different blocks dependent on the Hadamard matrices such as 2x2, 4x4, 8x8 and 16x16 pixels.
For each block, the Mean and Standard Deviation are calculated, these values change from block to block. These two
values define what values the reconstructed or new block will have, in other words the blocks of the BTC compressed
image will have the same mean and standard deviation of the original image blocks algorithm [5,7].
= 	∑ 	 (1)
= ∑ ( ̅ −	 )2 (2)
Where xi represents the ith pixel value of the image block and n is the total number of pixels in the block. The two
values and are termed as quantizers of BTC. A two level quantization on the block is where we gain the
compression, it is performed as follows:
Y (i, j) = 1, x (i, j)> = 0, x (i, j) < x (3)
Where x (i, j) are pixel elements of the original block and y (i, j) are elements of the compressed block. In other words it
can be explained as: If a pixel value is greater than the mean it is assigned the value "1", otherwise "0". Values equal to
the mean can have either a "1" or a "0" depending on the preference of the person implementing the algorithm. By this
process each block is reduced to a bit plane. The bit plane along with F and c forms the compressed data. For example a
block of 4 x 4 pixels will give a 32 bit compressed data, amounting to 2 BPP. This 16 bit block is stored or transmitted
along with the values of Mean and Standard Deviation. Reconstruction at the decoding side is made with two values "H"
and "L", which preserve the mean and the standard deviation. For example when we want to represent the 4x4 image
blocks we have to applying the following equation:
= 	∑ (4)
The same procedures for representation another image blocks (2x2, 8x8 and 16x16).
D. IMAGE QUALITY MEASUREMENTS
There are several kinds of parametric measure to measure the quality of an image which plays an important role in
various image-processing applications. The parametric measures of image quality are broadly classified into two classes -
one is subjective measure and the other is objective measure. In this paper we concentrate in objective measures [1,3]
such as Peak Signal to Noise Ratio (PSNR), Weighted Peak Signal to Noise Ratio (WPSNR), Bit Rate (BR), Bit Peer
Pixel (BPP) and Structural SIMilarity (SSIM) index. When an image compression algorithm has been implemented and
designed to a system, it is important to be able to calculate its performance and this evaluation process should be done in
such a manner that various kinds of compression techniques can compare their above mentioned measures [4]. In our
proposed scheme, we makes only PSNR to measuring the image quality because the PSNR give an accurate values for
the extracted data.
III. PROPOSED SCHEME
In this section, a lossy steganography for the H-AMBTC images compressing is produced and the performances
of various block sizes are compared. For convenience, we define the notations used in this paper first. The original cover
image is denoted as H and is a grayscale image. The H-AMBTC compressed code for H is represented by E, and the
reconstructed AMBTC compressed image is denoted by R. Embedding is done by modifying E, and the result is an H-
AMBTC compressed host-code E’. The receiver then uses the reconstruction procedure to obtain the H-AMBTC-
compressed stego-image R’.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P)
www.ijiris.com
_______________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-15, IJIRIS- All Rights Reserved Page -3
The following steps exploring our proposed algorithm as:
1. H-AMBTC ENCODING ALGORITHM
Step1: perform the image divide into blocks according to Hadamard matrix.
Step2: Calculate the mean, lower and upper mean.
Step3: If the bit value is less than mean value, it is replaced by zero otherwise it is replaced by one.
Step4: The Conceal bit is obtained by XOR operation of the secret message and key.
Step5: If the concealing bit is zero, the trio generated consists of lower mean, upper mean and the sequence of bits of the
image block.
Step6: If the concealing bit is one, the trio generated consists of upper mean, lower mean and the not operation of the
sequence of bits of the image block.
2. H-AMBTC DECODING ALGORITHM
Step1: In the trio is obtained if the first element of the trio is less than the second element, then the concealing bit is zero.
Else the embedded bit is one.
Step2: If the concealing bit is zero, the sequence of bits of the image block remains same.
Step3: If the concealing bit is one, NOT operation is performed on the sequence of bits of the image block.
Step4: If the binary image consists of one, it is replaced by upper mean else it is replaced by lower mean obtained from
the trio.
Now we apply the H-AMBTC with the differences Hadamard as below. But before this, we first give a basic idea about
the Hadamard with H1, H2, H3 and H4 as:
H1 = [1], H2 =
1 1
1 0
, H3 =
1 1 1 1
1 0 1 0
1 1 0 0
1 0 0 1
, H4 =
⎣
⎢
⎢
⎢
⎢
⎢
⎢
⎡
1
1
1
1 1 1 1 1 1 1
0 1 0 1 0 1 0
1 0 0 1 1 0 0
1
1
1
1
1
0 0 1 1 0 0 1
1 1 1 0 0 0 0
0
1
0
1
0
0
0
0
1
0
0
0
1
0
1
0
1
1
1
1
0⎦
⎥
⎥
⎥
⎥
⎥
⎥
⎤
Definition1: In the Hadamard we have two matrices H= [1] and H´ = [0], where H is a matrix and H´ is the H invers.
Now we convert the Hadamard matrices with the AMBTC technique to gate on the H-AMBTC for the color image.
According to the H and H´, the summation of each blocks given in the following equations:
H = ∑ (5)
H´ = ∑ , where H´ is a invers of H (6)
To represent the H-AMBTC with the new form for all Hadamard image blocks of the color image are given in the
following form:
H = [block], H´ = (7)
The following hadamard matrixes shows the general forms for the H-AMBTC for H2 , H3, and H4 blocks will be:
H2 = , H3 = and
H4 =
⎣
⎢
⎢
⎢
⎢
⎢
⎢
⎡
⎦
⎥
⎥
⎥
⎥
⎥
⎥
⎤
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P)
www.ijiris.com
_______________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-15, IJIRIS- All Rights Reserved Page -4
To calculate the PSNR vales for the H-AMBTC, we must first calculates MSE, it is shown in the following:
= 	∑ (	 − ) (8)
And the new PSNR values are calculated using the following format:
= 25.log 25	 [ ∕ 255 ] (9)
IV. PERFORMANCE AND RESULTS
We have selected different blocks size for bit plane omission technique at three different levels of quad tree
segmentation for the block size of 16 x 16. As we use a different image blocks size such as 2x2, 4 x 4 and 8x8. We have
selected three values. We have applied different combination of threshold values on standard images of size 512 x 512.
The PSNR values for the cover image and the reconstructed image is calculated and tabulated for different block sizes.
A. Image compression in H-AMBTC B.Image stego of A image.
Fig.1: The H-AMBTC method for the stego-image.
TABLE1: COMPARISON OF PSNR OF 2X2, 4X4, 8X8 AND 16X16 BLOCK SIZES FOR TREE AND CAT IMAGE.
images 2x2 Blocks 4x4 Blocks 8x8 Blocks 16x16 Blocks
PSNR PSNR PSNR PSNR
Tree 34.4877 32.0407 31.0162 24.3087
Cat 42.7776 33.8655 32.975 25.1356
This is the first time to combine between AMBTC and Hadamard transformation to give a good quality of image
compression to be concealed. From the table.1, the PSNR values are measured to the difference blocks. The PSNR
values give a good measurement for the stego-image, because the cover file has been compressed. The best PSNR value
is given from 16x16 blocks for Tree and Cat images file. According to Fig.1 first, we has been compressed the cover
image file. Secondly, we concealed the the secret image file in the cove image file which is compressed. The
experimental our proposed scheme done by MatLab2011a edition.
V. CONCLUSIONS
In this paper, the H-AMBTC algorithm has been presented for the lossy data concealing technique that conceal the secret
data in an interpolative AMBTC technique. Even though the AMBTC technique uses compression technique, the
compression ratio is further increased using the H-AMBTC technique. This technique is lossy as the secret data can be
completely recovered without any loss. The data extraction procedure is simple and the computational cost is less for the
proposed method.
ACKNOWLEDGMENT
The authors gratefully acknowledge the support from the National Natural Science Foundation of China under (Grant No.
61173050).
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P)
www.ijiris.com
_______________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-15, IJIRIS- All Rights Reserved Page -5
REFERENCES
[1]. Kartik Sau, Ratan Kumar Basak, Amitabha Chanda, Image Compression based on Block Truncation Coding using
Clifford Algebra , ELSEVIER, P r o c e d i a T e c h n o l o g y 1 0 ( 2 0 1 3 ) 6 9 9 – 7 0 6.
[2]. M.PRAMEELAMMA, V.SRIDHAR, G. NAGENDRA, V.VARAPRASAD ,P.ANIL KUMAR, AMBTC-
Compressed Images for Lossless Steganography, International Journal of Advanced Research in Computer Science
and Electronics Engineering Volume 1, Issue 6, August 2012.
[3]. Kai-Kuang Ma, Member, IEEE, and Sarah A. Rajala, Senior Member, IEEE, New Properties of AMBTC, IEEE
SIGNAL PROCESSING LETTERS, VOL. 2, NO. 2. FEBRUARY 1995.
[4]. Chia-Chen Lin*, Yuehong Huang, Wei-Liang Tai, Novel Image Authentication Scheme for AMBTC-compressed
Images, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[5]. Y.-C. Hu, B.-H. Su and P. Y. Tsai, Colour image coding scheme using absolute moment block truncation coding
and block prediction technique, The Imaging Science Journal Vol 56-2008.
[6]. Juana Martínez Laguna, Raúl Cardona Meraz, Remote Sensing Image Compression Using Adaptive Interpolative
Absolute Moment Block Truncation Coding, Juana Martinez Laguna Retrieved on: 04 August 2015.
[7]. D.Harihara Santosh, U.V.S. Sitarama Varma, K.S.K Chaitanya Varma, Meena Jami, V.V.N.S Dileep, Absolute
Moment Block Truncation Coding For Color Image Compression, International Journal of Innovative Technology
and Exploring Engineering, Volume-2, Issue-6, May 2013.
[8]. Gudapati Sri Kali, Hema Chowdary, A Comparison of Lossless Steganography Using I-AMBTC
[9]. Technique for Various Block Sizes, IOSR Journal of Electronics and Communication Engineering, Volume 9, Issue
4, Ver. I (Jul - Aug. 2014), PP 60-65.
[10]. YAHYA E. A. AL-SALHI, SONGFENG LU, Achieving High Throughput of Steganography &
[11]. Steganalysis for Concealing images Information Using Buffers Concept, International Journal Data & Network
Security, Vol 4, No 2-2015.
AUTHORS BIOGRAPHY
YAHYA E. A. ALSALHI is a Ph.D student in school of computer science, Huazhong University of
Science & Technology, Wuhan, Hubei, P.R. china. He has completed M.Sc from the Department of
Computer Science in B.A.M.U university, Aurangabad, Maharashtra, India in 2012. His research area of
interest includes data and information security, digital image processing and algorithm designing. You
may contact him at yahya_alsalhi@yahoo.com
Songfeng Lu is working as an associate professor in School of Computer Science and Technology,
Huazhong University of Science and Technology, China. He received Phd in Computer Science from
Huazhong University of Science and Technology in 2001. His research areas include quantum
computing, information security and data mining. You may contact him at lusongfeng@hust.edu.cn.

More Related Content

What's hot

Non-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-FrameNon-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-FrameIDES Editor
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMijcsit
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imageseSAT Journals
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpegeSAT Publishing House
 
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GPPerformance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GPIOSR Journals
 
Block Classification Scheme of Compound Images: A Hybrid Extension
Block Classification Scheme of Compound Images: A Hybrid ExtensionBlock Classification Scheme of Compound Images: A Hybrid Extension
Block Classification Scheme of Compound Images: A Hybrid ExtensionDR.P.S.JAGADEESH KUMAR
 
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...IOSR Journals
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemiaemedu
 
Template Matching - Pattern Recognition
Template Matching - Pattern RecognitionTemplate Matching - Pattern Recognition
Template Matching - Pattern RecognitionMustafa Salam
 
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...CSCJournals
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compressionAlexander Decker
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...Alexander Decker
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 

What's hot (16)

Non-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-FrameNon-Causal Video Encoding Method of P-Frame
Non-Causal Video Encoding Method of P-Frame
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpeg
 
Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...Medial axis transformation based skeletonzation of image patterns using image...
Medial axis transformation based skeletonzation of image patterns using image...
 
I07015261
I07015261I07015261
I07015261
 
Fc4301935938
Fc4301935938Fc4301935938
Fc4301935938
 
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GPPerformance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
Performance Analysis of Compression Techniques Using SVD, BTC, DCT and GP
 
Block Classification Scheme of Compound Images: A Hybrid Extension
Block Classification Scheme of Compound Images: A Hybrid ExtensionBlock Classification Scheme of Compound Images: A Hybrid Extension
Block Classification Scheme of Compound Images: A Hybrid Extension
 
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
Automatic Determination Number of Cluster for NMKFC-Means Algorithms on Image...
 
Tracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance systemTracking and counting human in visual surveillance system
Tracking and counting human in visual surveillance system
 
Template Matching - Pattern Recognition
Template Matching - Pattern RecognitionTemplate Matching - Pattern Recognition
Template Matching - Pattern Recognition
 
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 

Similar to Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression techniqueTELKOMNIKA JOURNAL
 
00463517b1e90c1e63000000
00463517b1e90c1e6300000000463517b1e90c1e63000000
00463517b1e90c1e63000000Ivonne Liu
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...eSAT Journals
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGESijitcs
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPcsijjournal
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPcsijjournal
 
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMSCOMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMScsijjournal
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 

Similar to Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain (20)

AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
mini prjt
mini prjtmini prjt
mini prjt
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 
An efficient color image compression technique
An efficient color image compression techniqueAn efficient color image compression technique
An efficient color image compression technique
 
00463517b1e90c1e63000000
00463517b1e90c1e6300000000463517b1e90c1e63000000
00463517b1e90c1e63000000
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
F010232834
F010232834F010232834
F010232834
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
3-D WAVELET CODEC (COMPRESSION/DECOMPRESSION) FOR 3-D MEDICAL IMAGES
 
Enhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attackEnhancement of genetic image watermarking robust against cropping attack
Enhancement of genetic image watermarking robust against cropping attack
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTP
 
Embedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTPEmbedding Patient Information In Medical Images Using LBP and LTP
Embedding Patient Information In Medical Images Using LBP and LTP
 
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMSCOMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
COMPARISON OF CHANNEL ESTIMATION AND EQUALIZATION TECHNIQUES FOR OFDM SYSTEMS
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

  • 1. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P) www.ijiris.com _______________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-15, IJIRIS- All Rights Reserved Page -1 Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHIa , SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong University of science and technology Wuhan 430074,PR china b. associate professor,School of computer science, Huazhong University of science and technology Wuhan 430074,PR china Abstract— Steganography is a type of image information concealing technique which hides a secret message in a different media such as image, video and audio etc, called cover file. The main idea of steganography is to provide security to private or public data. In this paper we combined among Hadamard transformation and Absolute Moment Block Truncation Coding to make a new concept called (H-AMBTC), this concept used for compressing the cover file and conceal the secret data into the cover file. The H-AMBTC compression is not only image compression, but it is more than the AMBTC technique as only half of the number of pixels in the binary converted image are transmitted. In this paper, the comparison process of the H-AMBTC technique is done for 2x2, 4x4, 8x8 and 16x16 block sizes. H- AMBTC is a lossy technique as the cover image and the secret image can be recovered completely. Keywords— H-AMBTC, AMBTC, PSNR, Hadamard transform, Image information concealing, Steganography. I. INTRODUCTION Steganography is an old science, but its applications in the information concealing are new. However, steganography is referred to as a process to conceal secret data of different media (message, image, information, etc.) into another digital media (text, image, audio or video streams), called cover files, steganography can solve the problem of perception of the secret message. The media that conceals the data is called “cover’’ or “host’’ media. Computer based steganography is usually based on randomness. There are many occurrences of randomness in computer based information. Steganography data can be hidden into this random information. The merits of a steganography method are judged on whether the addition of the steganography data changes the randomness. Image steganography as an individual concept has already been discussed. [1] But a few researchers’ works on the images steganography combine with compression tools. In our work, we discuss how to combine the AMBTC technique and Hadamard transform to give a good technique called (H-AMBTC), and combined this work with the image steganography, in this case the image compressed steganography will be high powerful. AMBTC has the same general characteristics as BTC which includes low storage requirements and an extremely simple coding and decoding technique. The main idea of AMBTC is to preserve higher mean and lower mean of each small rectangular block of pixels spatially and non-overlapping divided from the original image. Thus it is necessary to increase the number of quantization levels to improve the image quality. The rest of this paper is organized as following: Sec.2 deals with the Preliminaries which are discussed the AMBTC, Hadamard transformation, compression procedures and image quality measurements. Sec.3, gives the details about the proposed scheme called an H-AMBTC and its algorithms respectively. In Sec.4, the performing and the results are analysed. Finally, Sec.5, gives the concluding remarks. II. PRELIMINARIES A. AMBTC Block Truncation Coding (BTC) technique is also called a moment preserving quantize. The AMBTC is improved by BTC to be more powerful in image compression to give a good results when the image compressed. The concept of (AMBTC) was introduced by Lema and Mitchell in 1984 [2,6]. The consideration of AMBTC is to maintain the mean and the first absolute moment of image blocks. [4]. in the original form of AMBTC, the image will be segmented into uniform or non-uniform blocks to be controlled. Image compression using AMBTC have very good measurement such as PSNR, MSE and BPP [1,8]. It has more advantages of preserving single pixel and edges having low computational complexity. Other options of the moments result either in lossy MSE or lossy computational complexity. In AMBTC algorithm, similar to BTC, there are four separate steps while coding a single block of size n x n. They are quad tree segmentation, bit plane omission, bit plane coding using 32 visual patterns and interpolative bit plane coding. In this paper, we compress the image using H-AMBTC; the combination of these two techniques it gives a powerful compressed image. B. HADAMARD TRANSFORMATION
  • 2. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P) www.ijiris.com _______________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-15, IJIRIS- All Rights Reserved Page -2 A Hadamard matrix H of order n is an n × n matrix of 1s and -1s in which HH´= nIn. (In is the n × n identify matrix.) [2,3]. Equivalently, a Hadamard matrix is an n × n matrix of 1s and -1s in which any two distinct rows agree in exactly n/2 positions (and thus disagree in exactly n/2 positions.). With this definition, the entries of the matrix don’t need to be 1s and -1s. They could be chosen from {red, green} or {0, 1} [3]. A Hadamard matrix can exist only if n is 1, 2, or a multiple of 4. It has been conjectured that Hadamard matrices exist for any n that is a multiple of 4. This is probably true but has not been proven [2]. (It has been verified at least through n= 664.). We will be interested primarily in the case where n is a power of 2, in which case Hadamard matrices are known to exist C. COMPRESSION PROCEDURE The image is divided into different blocks dependent on the Hadamard matrices such as 2x2, 4x4, 8x8 and 16x16 pixels. For each block, the Mean and Standard Deviation are calculated, these values change from block to block. These two values define what values the reconstructed or new block will have, in other words the blocks of the BTC compressed image will have the same mean and standard deviation of the original image blocks algorithm [5,7]. = ∑ (1) = ∑ ( ̅ − )2 (2) Where xi represents the ith pixel value of the image block and n is the total number of pixels in the block. The two values and are termed as quantizers of BTC. A two level quantization on the block is where we gain the compression, it is performed as follows: Y (i, j) = 1, x (i, j)> = 0, x (i, j) < x (3) Where x (i, j) are pixel elements of the original block and y (i, j) are elements of the compressed block. In other words it can be explained as: If a pixel value is greater than the mean it is assigned the value "1", otherwise "0". Values equal to the mean can have either a "1" or a "0" depending on the preference of the person implementing the algorithm. By this process each block is reduced to a bit plane. The bit plane along with F and c forms the compressed data. For example a block of 4 x 4 pixels will give a 32 bit compressed data, amounting to 2 BPP. This 16 bit block is stored or transmitted along with the values of Mean and Standard Deviation. Reconstruction at the decoding side is made with two values "H" and "L", which preserve the mean and the standard deviation. For example when we want to represent the 4x4 image blocks we have to applying the following equation: = ∑ (4) The same procedures for representation another image blocks (2x2, 8x8 and 16x16). D. IMAGE QUALITY MEASUREMENTS There are several kinds of parametric measure to measure the quality of an image which plays an important role in various image-processing applications. The parametric measures of image quality are broadly classified into two classes - one is subjective measure and the other is objective measure. In this paper we concentrate in objective measures [1,3] such as Peak Signal to Noise Ratio (PSNR), Weighted Peak Signal to Noise Ratio (WPSNR), Bit Rate (BR), Bit Peer Pixel (BPP) and Structural SIMilarity (SSIM) index. When an image compression algorithm has been implemented and designed to a system, it is important to be able to calculate its performance and this evaluation process should be done in such a manner that various kinds of compression techniques can compare their above mentioned measures [4]. In our proposed scheme, we makes only PSNR to measuring the image quality because the PSNR give an accurate values for the extracted data. III. PROPOSED SCHEME In this section, a lossy steganography for the H-AMBTC images compressing is produced and the performances of various block sizes are compared. For convenience, we define the notations used in this paper first. The original cover image is denoted as H and is a grayscale image. The H-AMBTC compressed code for H is represented by E, and the reconstructed AMBTC compressed image is denoted by R. Embedding is done by modifying E, and the result is an H- AMBTC compressed host-code E’. The receiver then uses the reconstruction procedure to obtain the H-AMBTC- compressed stego-image R’.
  • 3. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P) www.ijiris.com _______________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-15, IJIRIS- All Rights Reserved Page -3 The following steps exploring our proposed algorithm as: 1. H-AMBTC ENCODING ALGORITHM Step1: perform the image divide into blocks according to Hadamard matrix. Step2: Calculate the mean, lower and upper mean. Step3: If the bit value is less than mean value, it is replaced by zero otherwise it is replaced by one. Step4: The Conceal bit is obtained by XOR operation of the secret message and key. Step5: If the concealing bit is zero, the trio generated consists of lower mean, upper mean and the sequence of bits of the image block. Step6: If the concealing bit is one, the trio generated consists of upper mean, lower mean and the not operation of the sequence of bits of the image block. 2. H-AMBTC DECODING ALGORITHM Step1: In the trio is obtained if the first element of the trio is less than the second element, then the concealing bit is zero. Else the embedded bit is one. Step2: If the concealing bit is zero, the sequence of bits of the image block remains same. Step3: If the concealing bit is one, NOT operation is performed on the sequence of bits of the image block. Step4: If the binary image consists of one, it is replaced by upper mean else it is replaced by lower mean obtained from the trio. Now we apply the H-AMBTC with the differences Hadamard as below. But before this, we first give a basic idea about the Hadamard with H1, H2, H3 and H4 as: H1 = [1], H2 = 1 1 1 0 , H3 = 1 1 1 1 1 0 1 0 1 1 0 0 1 0 0 1 , H4 = ⎣ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎡ 1 1 1 1 1 1 1 1 1 1 0 1 0 1 0 1 0 1 0 0 1 1 0 0 1 1 1 1 1 0 0 1 1 0 0 1 1 1 1 0 0 0 0 0 1 0 1 0 0 0 0 1 0 0 0 1 0 1 0 1 1 1 1 0⎦ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎤ Definition1: In the Hadamard we have two matrices H= [1] and H´ = [0], where H is a matrix and H´ is the H invers. Now we convert the Hadamard matrices with the AMBTC technique to gate on the H-AMBTC for the color image. According to the H and H´, the summation of each blocks given in the following equations: H = ∑ (5) H´ = ∑ , where H´ is a invers of H (6) To represent the H-AMBTC with the new form for all Hadamard image blocks of the color image are given in the following form: H = [block], H´ = (7) The following hadamard matrixes shows the general forms for the H-AMBTC for H2 , H3, and H4 blocks will be: H2 = , H3 = and H4 = ⎣ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎡ ⎦ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎤
  • 4. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P) www.ijiris.com _______________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-15, IJIRIS- All Rights Reserved Page -4 To calculate the PSNR vales for the H-AMBTC, we must first calculates MSE, it is shown in the following: = ∑ ( − ) (8) And the new PSNR values are calculated using the following format: = 25.log 25 [ ∕ 255 ] (9) IV. PERFORMANCE AND RESULTS We have selected different blocks size for bit plane omission technique at three different levels of quad tree segmentation for the block size of 16 x 16. As we use a different image blocks size such as 2x2, 4 x 4 and 8x8. We have selected three values. We have applied different combination of threshold values on standard images of size 512 x 512. The PSNR values for the cover image and the reconstructed image is calculated and tabulated for different block sizes. A. Image compression in H-AMBTC B.Image stego of A image. Fig.1: The H-AMBTC method for the stego-image. TABLE1: COMPARISON OF PSNR OF 2X2, 4X4, 8X8 AND 16X16 BLOCK SIZES FOR TREE AND CAT IMAGE. images 2x2 Blocks 4x4 Blocks 8x8 Blocks 16x16 Blocks PSNR PSNR PSNR PSNR Tree 34.4877 32.0407 31.0162 24.3087 Cat 42.7776 33.8655 32.975 25.1356 This is the first time to combine between AMBTC and Hadamard transformation to give a good quality of image compression to be concealed. From the table.1, the PSNR values are measured to the difference blocks. The PSNR values give a good measurement for the stego-image, because the cover file has been compressed. The best PSNR value is given from 16x16 blocks for Tree and Cat images file. According to Fig.1 first, we has been compressed the cover image file. Secondly, we concealed the the secret image file in the cove image file which is compressed. The experimental our proposed scheme done by MatLab2011a edition. V. CONCLUSIONS In this paper, the H-AMBTC algorithm has been presented for the lossy data concealing technique that conceal the secret data in an interpolative AMBTC technique. Even though the AMBTC technique uses compression technique, the compression ratio is further increased using the H-AMBTC technique. This technique is lossy as the secret data can be completely recovered without any loss. The data extraction procedure is simple and the computational cost is less for the proposed method. ACKNOWLEDGMENT The authors gratefully acknowledge the support from the National Natural Science Foundation of China under (Grant No. 61173050).
  • 5. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 9, Volume 2 (November 2015) ISSN: 2349-7009 (P) www.ijiris.com _______________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-15, IJIRIS- All Rights Reserved Page -5 REFERENCES [1]. Kartik Sau, Ratan Kumar Basak, Amitabha Chanda, Image Compression based on Block Truncation Coding using Clifford Algebra , ELSEVIER, P r o c e d i a T e c h n o l o g y 1 0 ( 2 0 1 3 ) 6 9 9 – 7 0 6. [2]. M.PRAMEELAMMA, V.SRIDHAR, G. NAGENDRA, V.VARAPRASAD ,P.ANIL KUMAR, AMBTC- Compressed Images for Lossless Steganography, International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 6, August 2012. [3]. Kai-Kuang Ma, Member, IEEE, and Sarah A. Rajala, Senior Member, IEEE, New Properties of AMBTC, IEEE SIGNAL PROCESSING LETTERS, VOL. 2, NO. 2. FEBRUARY 1995. [4]. Chia-Chen Lin*, Yuehong Huang, Wei-Liang Tai, Novel Image Authentication Scheme for AMBTC-compressed Images, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. [5]. Y.-C. Hu, B.-H. Su and P. Y. Tsai, Colour image coding scheme using absolute moment block truncation coding and block prediction technique, The Imaging Science Journal Vol 56-2008. [6]. Juana Martínez Laguna, Raúl Cardona Meraz, Remote Sensing Image Compression Using Adaptive Interpolative Absolute Moment Block Truncation Coding, Juana Martinez Laguna Retrieved on: 04 August 2015. [7]. D.Harihara Santosh, U.V.S. Sitarama Varma, K.S.K Chaitanya Varma, Meena Jami, V.V.N.S Dileep, Absolute Moment Block Truncation Coding For Color Image Compression, International Journal of Innovative Technology and Exploring Engineering, Volume-2, Issue-6, May 2013. [8]. Gudapati Sri Kali, Hema Chowdary, A Comparison of Lossless Steganography Using I-AMBTC [9]. Technique for Various Block Sizes, IOSR Journal of Electronics and Communication Engineering, Volume 9, Issue 4, Ver. I (Jul - Aug. 2014), PP 60-65. [10]. YAHYA E. A. AL-SALHI, SONGFENG LU, Achieving High Throughput of Steganography & [11]. Steganalysis for Concealing images Information Using Buffers Concept, International Journal Data & Network Security, Vol 4, No 2-2015. AUTHORS BIOGRAPHY YAHYA E. A. ALSALHI is a Ph.D student in school of computer science, Huazhong University of Science & Technology, Wuhan, Hubei, P.R. china. He has completed M.Sc from the Department of Computer Science in B.A.M.U university, Aurangabad, Maharashtra, India in 2012. His research area of interest includes data and information security, digital image processing and algorithm designing. You may contact him at yahya_alsalhi@yahoo.com Songfeng Lu is working as an associate professor in School of Computer Science and Technology, Huazhong University of Science and Technology, China. He received Phd in Computer Science from Huazhong University of Science and Technology in 2001. His research areas include quantum computing, information security and data mining. You may contact him at lusongfeng@hust.edu.cn.