SlideShare a Scribd company logo
1 of 5
Download to read offline
1
International Journal of Research and Innovation (IJRI)
JOINT DATA HIDING AND COMPRESSION BASED ON SALIENCY AND SMVQ
S. Girish1
, E. Balakrishna2
, S. Rehana Banu3
.
1 Research Scholar,Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.
2 Assistant Professor,Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.
3 Assistant Professor,Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.
*Corresponding Author:
S. Girish
Research Scholar,
Department of Electronics AndCommunication Engi-
neering, Chiranjeevi Reddy Institute of Engineering and
Technology,Anantapur, A. P, India.
Email: girish.seela@gmali.com.
Year of publication: 2016
Review Type: peer reviewed
Volume: I, Issue : I
Citation: S. Girish, Research Scholar"Joint Data Hiding
And Compression Based On Saliency And Smvq" Inter-
national Journal of Research and Innovation on Science,
Engineering and Technology (IJRISET) (2016) 01-05
DATA HIDING FOR IMAGE AUTHENTICATION
Introduction
For years, audio, image, and video have played impor-
tant role in journalism, archiving and litigation. King in-
cident played an important role in prosecution, a secretly
recorded conversation between Monica Lewinsky and
Linda Tripp touched off the 1998 presidential impeach-
ment, just to name a few. Keeping our focus on still pic-
tures, we have no difficulty in realizing that the validity of
the old saying “Picture never lies” has been challenged in
the digital world of multimedia. Compared with the tradi-
tional analog media, making seamless alteration is much
easier on digital media by software editing tools. With
the popularity of consumer-level scanner, printer, digital
camera, and digital camcorder, detecting tampering be-
comes an important concern. In this chapter, we discuss
using digital watermarking techniques to partially solve
this problem by embedding authentication data invisibly
into digital images. In general, authenticity is a relative
concept: whether an item is authentic or not is relative
to a reference or certain type of representation that is re-
garded as authentic.
The following features are desirable to construct an effec-
tive authentication scheme
1. to be able to determine whether an image has been
altered or not;
2. to be able to integrate authentication data with host
image rather than as a
separate data file;
3. the embedded authentication data be invisible under
normal viewing conditions;
4. to be able to locate alteration made on the image;
5. to allow the watermarked image be stored in lossy-
compression format, or more generally, to distinguish
moderate distortion that does not change the high-level
content vs. content tampering.
This chapter presents a general framework of watermark-
ing for authentication and proposes a new authentication
scheme by embedding a visually meaningful watermark
and a set of features in the transform domain of an image
via table look-up. The embedding is a Type-II embedding
according to Chapter 3. Making use of the predistortion
nature of Type-II embedding, our proposed approach can
be applied to compressed image using JPEG or other com-
pression techniques, and the watermarked image can be
kept in the compressed format. The proposed approach
therefore allows distinguishing moderate distortion that
does not change the high-level content versus content
tampering. The alteration made on the marked image can
be also localized.
These features make the proposed scheme suitable for
building a “trustworthy” digital camera. We also dem-
onstrate the use of shuffling (Chapter 4) in this specific
problem to equalize uneven embedding capacity and to
enhance both embedding rate and security.
Previous Work
The existing works on image authentication can be classi-
fied into several categories: digital signature based, pixel-
domain embedding, and transform-domain embedding.
The latter two categories are invisible fragile or semi-frag-
ile watermarking. Digital signature schemes are built on
Abstract
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the
increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes
large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel
equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip
communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a lin-
ear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
International Journal of Research and Innovation in
Electronics and Communication Engineering (IJRIECE)
2
International Journal of Research and Innovation (IJRI)
the ideas of hash (or called message digest) and public
key encryption that were originally developed for verify-
ing the authenticity of text data in network communica-
tion. Friedman extended it to digital image as follows. A
signature computed from the image data is stored sepa-
rately for future verification. This image signature can be
regarded as a special encrypted checksum. It is unlikely
that two different natural images have same signature,
and even if a single bit of image data changes, the sig-
nature may be totally different. Furthermore, public-key
encryption makes it very difficult to forge signature, en-
suring ] a high security level. After his work, Schneider et
al. [and Storck proposed content-based signature. They
produce signatures from low-level content features, such
as block mean intensity, to protect image content instead
of the exact representation. Another content-signature
approach by Lin et al. developed the signature based on a
relation between coefficient pairs that is invariant before
and after compression [41, 76]. Strictly speaking, these
signature schemes do not belong to watermarking since
the signature is stored separately instead of embedding
into images.
A STUDY OF VARIOUS IMAGE COMPRESSION
TECHNIQUES
IMAGE
An image is essentially a 2-D signal processed by the hu-
man visual system. The signals representing images are
usually in analog form. However, fo r processing, stor-
age and transmission by computer applications, they are
converted from analog to digital form. A digital image is
basically a 2-Dimensional array of pixels. Images form the
significant part of data, particularly in remote sensing, bi-
omedical and video conferencing applications. The use of
and dependence on information and computers continue
to grow, so too does our need for efficient ways of storing
and transmitting large amounts of data.
IMAGE COMPRESSION
Image compression addresses the problem of reducing
the amount of data required to represent a digital image.
It is a process intended to yield a compact representation
of an image, thereby reducing the image storage/trans-
mission requirements. Compression is achieved by the
removal of one or more of the three basic data redundan-
cies:
1.Coding Redundancy
2.Interpixel Redundancy
3.Psychovisual Redundancy
Coding redundancy is present when less than optimal
code words are used. Interpixel redundancy results from
correlations between the pixels of an image. Psychovisual
redundancy is due to data that is ignored by the human
visual system (i.e. visually non essential information).
BENEFITS OF COMPRESSION
• It provides a potential cost savings associated with send-
ing less data over switched telephone
• It not only reduces storage requirements but also overall
execution time.
• It also reduces the probability of transmission errorss-
ince fewer bits are transferred.
• It also provides a level of security against illicit monitor-
ing.
SALIENCY MODEL
Automatic scene analysis
In the last decade, security cameras have become a com-
mon sight in the urban landscape. The ability to monitor
a number of different places from one location has aided
crime prevention. A vast number of security cameras are
being installed in everything from public streets to train
carriages, which has spawned a fundamental problem.
On the London Underground alone, there are at least
9000 security cameras. Security staff can have as many
as 60 cameras to watch at any one time so monitoring
is an extremely difficult task, requiring considerable con-
centration for long periods of time (Donald, 1999). It is
easy to imagine that manpower on its own is not enough
to deal with the vast quantities of data that are being re-
corded. Automation is clearly the next step.
INFORMATION HIDING USING VECTOR QUANTIZA-
TION
In the earlier part of the thesis different methods in the
spatial domain and transform domain are studied This
chapter deals with the techniques for hiding Information
in the compressed domain. One of the most commonly
studied image compression technique is Vector Quan-
tization (VQ)[60], which is a lossy image compression
technique based on the principle of block coding. VQ is
a clustering technique & every cluster is represented by
a codevector. It is widely used to compress grey-level im-
ages because of its low bit rate. The main concept of VQ
is to utilize templates instead of blocks to do the image
compression. These templates, also referred to as code-
words or codevectors, are stored in a codebook, and the
codebook is shared only between the sender and the re-
ceiver. Hence, the index value of the template is used to
represent all the pixel values of the block so that data
compression can be achieved. Such a mechanism is ex-
tremely easy to implement although the organization of
the templates affects the quality of the compressed image.
Experimental Results:
Table Average values of PSNR, MSE and AFCPV using 1
bit , 2, 3, 4, and variable bits for Information hiding in
Vector Quantized codebook method on LBG, KPE, KMCG
and KFCG codebook is of size 2048
3
International Journal of Research and Innovation (IJRI)
Remark: It is observed that KFCG performs better
than LBG, KPE and KMCG considering MSE, PSNR and
AFCPV.
Figure shows the results for cover image Lioness and se-
cret image work logo
Remark: It is observed that Stego is similar to the
original image using any of the four codebook genera-
tion algorithms.
Table shows the hiding capacity for all covers and mes-
sages for 1,2,3,4 and variable bits for all 4 Codebook gen-
eration techniques Figure 6.4, 6.5, 6.6 and 6.7 show the
hiding capacity, PSNR, MSE and AFCPV for all 4 algo-
rithms and 1,2,3,4 and variable bit hiding method.
Table Hiding Capacity in bits using 1 bit, 2 bits, 3 bits, 4
bits, and variable bits method on LBG, KPE, KMCG and
KFCG codebook of size 2048.
Related work and our contribution
We should first note that classical image denoising al-
gorithms do not apply to image inpainting, since the re-
gions to be inpainted are usually large. That is, regions
occupied by top to bottom scratches along several film
frames, long cracks in photographs, superimposed large
fonts, and so on, are of significant larger size than the
type of noise assumed in common image enhancement
algorithms. In addition, in common image enhancement
applications, the pixels contain both information about
the real data and the noise, while in image in painting,
there is no significant information in the region to be
inpainted. The information is mainly in the regions sur-
rounding the areas to be inpainted. There is then a need
to develop specific techniques to address these problems.
Mainly three groups of works can be found in the lit-
erature related to digital in painting. The first one deals
with the restoration of films, the second one is related to
texture synthesis, and the third one, a significantly less
studied class though very influential to the work here pre-
sented, is related to disocclusion. Joyeux et al. [4] devised
a 2-steps frequency based reconstruction system for de-
tecting and removing line scratches in films. They propose
to first recover low and then high frequencies. Although
good results are obtained for their specific application,
the algorithm can not handle large loss areas. Frequency
domain algorithms trade a good recovery of the overall
structure of the regions for poor spatial results regarding,
for instance, the continuity of lines. Kokaram et al. [6] use
motion estimation and autoregressive models to interpo-
late losses in films from adjacent frames. The basic idea
is to copy into the gap the right pixels from neighboring
frames. The technique can not be applied to still images
or to films where the regions to be inpainted span many
frames.
Our contribution
Algorithms devised for film restoration are not appropri-
ate for our application since they normally work on rela-
tively small regions and rely on the existence of informa-
tion from several frames. On the other hand, algorithms
based on texture synthesis can fill large regions, but re-
quire the user to specify what texture to put where. This
is a significant limitation of these approaches, as may be
seen in examples presented later in this paper, where the
region to be inpainted is surrounded by hundreds of dif-
ferent backgrounds, some of them being structure and
not texture. The technique we propose does not require
any user intervention, once the region to be inpainted has
been selected. The algorithm is able to simultaneously
fill regions surrounded by different backgrounds, with-
out the user specifying “what to put where.” No assump-
tions on the topology of the region to be inpainted, or on
the simplicity of the image, are made. The algorithm is
devised for inpainting in structured regions (e.g., regions
crossing throughboundaries), though it is not devised to
reproduce large textured areas. As we will discuss later,
the combination of our proposed approach with texture
synthesis techniques is the subject of current research.
RESULTS
Input Image
The image is given to the saliency extraction block. The following is the
output of Saliency.
4
International Journal of Research and Innovation (IJRI)
Saliency output of the input image
Saliency MAP. Image divided into salient part and non salient part.
Then the original image is Compressed image using data SMVQ and
VQ along with data hiding. The following the output.
Compressed Image
The final Reconstructed image at the output.
CONCLUSION AND FUTURE SCOPE
In this project new methods of Information hiding in com-
pressed domain using Vector Quantization and SMVQ
are proposed. They are Information Hiding in salient im-
ages using Vector Quantized Codebook and SMVQ. In this
paper, we proposed a joint data-hiding and compression
scheme by using SMVQ and PDE-based image inpainting
and saliency detection. The blocks, except for those in
the leftmost and topmost of the image, can be embedded
with secret data and compressed simultaneously, and the
adopted compression method switches between SMVQ
and image inpainting adaptively according to the embed-
ding bits. VQ is also utilized for some complex blocks to
control the visual distortion and error diffusion. On the
receiver side, after segmenting the compressed codes into
a series of sections by the indicator bits, the embedded
secret bits can be easily extracted according to the index
values in the segmented sections, and the decompression
for all blocks can also be achieved successfully by VQ,
SMVQ, and image inpainting.
The existing code book generation can be improved and
produce better results. Some other techniques include.
The data size should be increased than the present.
REFERENCES
[1] W. B. Pennebaker and J. L. Mitchell, The JPEG Still
Image Data Compression Standard. New York, NY, USA:
Reinhold, 1993.
[2] D. S. Taubman and M. W. Marcellin, JPEG2000: Im-
age Compression Fundamentals Standards and Practice.
Norwell, MA, USA: Kluwer, 2002.
[3] A. Gersho and R. M. Gray, Vector Quantization and
Signal Compression. Norwell, MA, USA: Kluwer, 1992.
[4] N. M. Nasrabadi and R. King, “Image coding using vec-
tor quantization: A review,” IEEE Trans. Commun., vol.
36, no. 8, pp. 957–971, Aug. 1988.
[5] Announcing the Advanced Encryption Standard (AES),
National Institute of Standards & Technology, Gaithers-
burg, MD, USA, Nov. 2001.
[6] R. L. Rivest, A. Shamir, and L. Adleman, “A method
for obtaining digital signatures and public-key cryptosys-
tems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
[7] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn,
“Information hiding survey,” Proc. IEEE, vol. 87, no. 7,
pp. 1062–1078, Jul. 1999.
[8] C. D. Vleeschouwer, J. F. Delaigle, and B Macq, “Invis-
ibility and application functionalities in perceptual wa-
termarking: An overview,” Proc. IEEE, vol. 90, no. 1, pp.
64–77, Jan. 2002.
[9] C. C. Chang, T. S. Chen, and L. Z. Chung, “A steg-
anographic method based upon JPEG and quantization
table modification,” Inf. Sci., vol. 141, no. 1, pp. 123–138,
2002.
[10] H. W. Tseng and C. C. Chang, “High capacity data
hiding in JPEGcompressed images,” Informatica, vol. 15,
no. 1, pp. 127–142, 2004.
[11] P. C. Su and C. C. Kuo, “Steganography in JPEG2000
compressed images,” IEEE Trans. Consum. Electron., vol.
49, no. 4, pp. 824–832, Nov. 2003.
5
International Journal of Research and Innovation (IJRI)
[12] W. J. Wang, C. T. Huang, and S. J. Wang, “VQ appli-
cations in steganographic data hiding upon multimedia
images,” IEEE Syst. J., vol. 5, no. 4, pp. 528–537, Dec.
2011.
[13] Y. C. Hu, “High-capacity image hiding scheme based
on vector quantization,” Pattern Recognit., vol. 39, no. 9,
pp. 1715–1724, 2006.
[14] Y. P. Hsieh, C. C. Chang, and L. J. Liu, “A two-code-
book combination and three-phase block matching based
image-hiding scheme with high embedding capacity,” Pat-
tern Recognit., vol. 41, no. 10, pp. 3104–3113, 2008.
[15] C. H. Yang and Y. C. Lin, “Fractal curves to improve
the reversible data embedding for VQ-indexes based on
locally adaptive coding,” J. Vis. Commun. Image Repre-
sent., vol. 21, no. 4, pp. 334–342, 2010.
[16] Y. Linde, A. Buzo, and R. M. Gray, “An algorithm for
vector quantization design,” IEEE Trans. Commun., vol.
28, no. 1, pp. 84–95, Jan. 1980.
[17] C. C. Chang and W. C. Wu, “Fast planar-oriented rip-
ple search algorithm for hyperspace VQ codebook,” IEEE
Trans. Image Process., vol. 16, no. 6, pp. 1538–1547,
Jun. 2007.
[18] W. C. Du and W. J. Hsu, “Adaptive data hiding based
on VQ compressed images,” IEE Proc. Vis., Image Signal
Process., vol. 150, no. 4, pp. 233–238, Aug. 2003.
[19] C. C. Chang and W. C. Wu, “Hiding secret data adap-
tively in vector quantisation index tables,” IEE Proc. Vis.,
Image Signal Process., vol. 153, no. 5, pp. 589–597, Oct.
2006.
[20] C. C. Lin, S. C. Chen, and N. L. Hsueh, “Adaptive em-
bedding techniques for VQ-compressed images,” Inf. Sci.,
vol. 179, no. 3, pp. 140–149, 2009.
[21] C. H. Hsieh and J. C. Tsai, “Lossless compression of
VQ index with search-order coding,” IEEE Trans. Image
Process., vol. 5, no. 11, pp. 1579–1582, Nov. 1996.
[22] C. C. Lee, W. H. Ku, and S. Y. Huang, “A new steg-
anographic scheme based on vector quantisation and
search-order coding,” IET Image Process., vol. 3, no. 4,
pp. 243–248, 2009.
[23] S. C. Shie and S. D. Lin, “Data hiding based on com-
pressed VQ indices of images,” Comput. Standards Inter.,
vol. 31, no. 6, pp. 1143–1149, 2009.
[24] C. C. Chang, G. M. Chen, and M. H. Lin, “Information
hiding based on search-order coding for VQ indices,” Pat-
tern Recognit. Lett., vol. 25, no. 11, pp. 1253–1261, 2004.
[25] T. Kim, “Side match and overlap match vector quan-
tizers for images,” IEEE Trans. Image Process., vol. 1, no.
2, pp. 170–185, Apr. 1992.
AUTHOR
S. Girish,
Research Scholar,
Department of Electronics AndCommunication Engineering,
Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.
E. Balakrishna,
Assistant Professor,
Department of Electronics AndCommunication Engineering,
Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.
S. Rehana Banu ,
Assistant Professor,
Department of Electronics AndCommunication Engineering,
Chiranjeevi Reddy Institute of Engineering and Technology,
Anantapur, A. P, India.

More Related Content

What's hot

An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCSCJournals
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Publishing House
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingeSAT Journals
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 

What's hot (19)

An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB A Hybrid Digital Watermarking Approach Using Wavelets and LSB
A Hybrid Digital Watermarking Approach Using Wavelets and LSB
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking AlgorithmCryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
Lsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarkingLsb hiding using random approach for image watermarking
Lsb hiding using random approach for image watermarking
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 

Similar to Ijri ece-01-01 joint data hiding and compression based on saliency and smvq

Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET Journal
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesIJARIIT
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computingijtsrd
 

Similar to Ijri ece-01-01 joint data hiding and compression based on saliency and smvq (20)

dwm
dwmdwm
dwm
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
Efficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random PermutationEfficient Image Compression Technique using Clustering and Random Permutation
Efficient Image Compression Technique using Clustering and Random Permutation
 
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image SecurityIRJET- A Survey on Reversible Watermarking Techniques for Image Security
IRJET- A Survey on Reversible Watermarking Techniques for Image Security
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
IRJET - Blind Watermarking Technique using Redundant Wavelet Transform for Co...
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical ImagesAdvanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
Advanced Fuzzy Logic Based Image Watermarking Technique for Medical Images
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud ComputingAn Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
An Efficient and Safe Data Sharing Scheme for Mobile Cloud Computing
 

More from Ijripublishers Ijri

structural and modal analysis of an engine block by varying materials
 structural and modal analysis of an engine block by varying materials structural and modal analysis of an engine block by varying materials
structural and modal analysis of an engine block by varying materialsIjripublishers Ijri
 
life prediction analysis of tweel for the replacement of traditional wheels
 life prediction analysis of tweel for the replacement of traditional wheels life prediction analysis of tweel for the replacement of traditional wheels
life prediction analysis of tweel for the replacement of traditional wheelsIjripublishers Ijri
 
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...Ijripublishers Ijri
 
investigation on thermal properties of epoxy composites filled with pine app...
 investigation on thermal properties of epoxy composites filled with pine app... investigation on thermal properties of epoxy composites filled with pine app...
investigation on thermal properties of epoxy composites filled with pine app...Ijripublishers Ijri
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjripublishers Ijri
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Ijripublishers Ijri
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
 
Ijri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjripublishers Ijri
 
a prediction of thermal properties of epoxy composites filled with pine appl...
 a prediction of thermal properties of epoxy composites filled with pine appl... a prediction of thermal properties of epoxy composites filled with pine appl...
a prediction of thermal properties of epoxy composites filled with pine appl...Ijripublishers Ijri
 
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjripublishers Ijri
 
Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijripublishers Ijri
 
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijripublishers Ijri
 
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijripublishers Ijri
 
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijripublishers Ijri
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjripublishers Ijri
 
Ijricit 01-002 enhanced replica detection in short time for large data sets
Ijricit 01-002 enhanced replica detection in  short time for large data setsIjricit 01-002 enhanced replica detection in  short time for large data sets
Ijricit 01-002 enhanced replica detection in short time for large data setsIjripublishers Ijri
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijripublishers Ijri
 
cfd analysis on ejector cooling system with variable throat geometry
 cfd analysis on ejector cooling system with variable throat geometry cfd analysis on ejector cooling system with variable throat geometry
cfd analysis on ejector cooling system with variable throat geometryIjripublishers Ijri
 

More from Ijripublishers Ijri (20)

structural and modal analysis of an engine block by varying materials
 structural and modal analysis of an engine block by varying materials structural and modal analysis of an engine block by varying materials
structural and modal analysis of an engine block by varying materials
 
life prediction analysis of tweel for the replacement of traditional wheels
 life prediction analysis of tweel for the replacement of traditional wheels life prediction analysis of tweel for the replacement of traditional wheels
life prediction analysis of tweel for the replacement of traditional wheels
 
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...simulation and analysis of 4 stroke single cylinder direct injection diesel e...
simulation and analysis of 4 stroke single cylinder direct injection diesel e...
 
investigation on thermal properties of epoxy composites filled with pine app...
 investigation on thermal properties of epoxy composites filled with pine app... investigation on thermal properties of epoxy composites filled with pine app...
investigation on thermal properties of epoxy composites filled with pine app...
 
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedings
 
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
Jiri ece-01-03 adaptive temporal averaging and frame prediction based surveil...
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Ijri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parametersIjri te-03-011 performance testing of vortex tubes with variable parameters
Ijri te-03-011 performance testing of vortex tubes with variable parameters
 
a prediction of thermal properties of epoxy composites filled with pine appl...
 a prediction of thermal properties of epoxy composites filled with pine appl... a prediction of thermal properties of epoxy composites filled with pine appl...
a prediction of thermal properties of epoxy composites filled with pine appl...
 
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporatorIjri te-03-013 modeling and thermal analysis of air-conditioner evaporator
Ijri te-03-013 modeling and thermal analysis of air-conditioner evaporator
 
Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...Ijri te-03-012 design and optimization of water cool condenser for central ai...
Ijri te-03-012 design and optimization of water cool condenser for central ai...
 
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
Ijri cce-01-028 an experimental analysis on properties of recycled aggregate ...
 
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
Ijri me-02-031 predictive analysis of gate and runner system for plastic inje...
 
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Ijricit 01-002 enhanced replica detection in short time for large data sets
Ijricit 01-002 enhanced replica detection in  short time for large data setsIjricit 01-002 enhanced replica detection in  short time for large data sets
Ijricit 01-002 enhanced replica detection in short time for large data sets
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
cfd analysis on ejector cooling system with variable throat geometry
 cfd analysis on ejector cooling system with variable throat geometry cfd analysis on ejector cooling system with variable throat geometry
cfd analysis on ejector cooling system with variable throat geometry
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Ijri ece-01-01 joint data hiding and compression based on saliency and smvq

  • 1. 1 International Journal of Research and Innovation (IJRI) JOINT DATA HIDING AND COMPRESSION BASED ON SALIENCY AND SMVQ S. Girish1 , E. Balakrishna2 , S. Rehana Banu3 . 1 Research Scholar,Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India. 2 Assistant Professor,Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India. 3 Assistant Professor,Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India. *Corresponding Author: S. Girish Research Scholar, Department of Electronics AndCommunication Engi- neering, Chiranjeevi Reddy Institute of Engineering and Technology,Anantapur, A. P, India. Email: girish.seela@gmali.com. Year of publication: 2016 Review Type: peer reviewed Volume: I, Issue : I Citation: S. Girish, Research Scholar"Joint Data Hiding And Compression Based On Saliency And Smvq" Inter- national Journal of Research and Innovation on Science, Engineering and Technology (IJRISET) (2016) 01-05 DATA HIDING FOR IMAGE AUTHENTICATION Introduction For years, audio, image, and video have played impor- tant role in journalism, archiving and litigation. King in- cident played an important role in prosecution, a secretly recorded conversation between Monica Lewinsky and Linda Tripp touched off the 1998 presidential impeach- ment, just to name a few. Keeping our focus on still pic- tures, we have no difficulty in realizing that the validity of the old saying “Picture never lies” has been challenged in the digital world of multimedia. Compared with the tradi- tional analog media, making seamless alteration is much easier on digital media by software editing tools. With the popularity of consumer-level scanner, printer, digital camera, and digital camcorder, detecting tampering be- comes an important concern. In this chapter, we discuss using digital watermarking techniques to partially solve this problem by embedding authentication data invisibly into digital images. In general, authenticity is a relative concept: whether an item is authentic or not is relative to a reference or certain type of representation that is re- garded as authentic. The following features are desirable to construct an effec- tive authentication scheme 1. to be able to determine whether an image has been altered or not; 2. to be able to integrate authentication data with host image rather than as a separate data file; 3. the embedded authentication data be invisible under normal viewing conditions; 4. to be able to locate alteration made on the image; 5. to allow the watermarked image be stored in lossy- compression format, or more generally, to distinguish moderate distortion that does not change the high-level content vs. content tampering. This chapter presents a general framework of watermark- ing for authentication and proposes a new authentication scheme by embedding a visually meaningful watermark and a set of features in the transform domain of an image via table look-up. The embedding is a Type-II embedding according to Chapter 3. Making use of the predistortion nature of Type-II embedding, our proposed approach can be applied to compressed image using JPEG or other com- pression techniques, and the watermarked image can be kept in the compressed format. The proposed approach therefore allows distinguishing moderate distortion that does not change the high-level content versus content tampering. The alteration made on the marked image can be also localized. These features make the proposed scheme suitable for building a “trustworthy” digital camera. We also dem- onstrate the use of shuffling (Chapter 4) in this specific problem to equalize uneven embedding capacity and to enhance both embedding rate and security. Previous Work The existing works on image authentication can be classi- fied into several categories: digital signature based, pixel- domain embedding, and transform-domain embedding. The latter two categories are invisible fragile or semi-frag- ile watermarking. Digital signature schemes are built on Abstract Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a lin- ear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights. Compared with the separate driver–receiver design flow, over 50% energy reduction is observed. International Journal of Research and Innovation in Electronics and Communication Engineering (IJRIECE)
  • 2. 2 International Journal of Research and Innovation (IJRI) the ideas of hash (or called message digest) and public key encryption that were originally developed for verify- ing the authenticity of text data in network communica- tion. Friedman extended it to digital image as follows. A signature computed from the image data is stored sepa- rately for future verification. This image signature can be regarded as a special encrypted checksum. It is unlikely that two different natural images have same signature, and even if a single bit of image data changes, the sig- nature may be totally different. Furthermore, public-key encryption makes it very difficult to forge signature, en- suring ] a high security level. After his work, Schneider et al. [and Storck proposed content-based signature. They produce signatures from low-level content features, such as block mean intensity, to protect image content instead of the exact representation. Another content-signature approach by Lin et al. developed the signature based on a relation between coefficient pairs that is invariant before and after compression [41, 76]. Strictly speaking, these signature schemes do not belong to watermarking since the signature is stored separately instead of embedding into images. A STUDY OF VARIOUS IMAGE COMPRESSION TECHNIQUES IMAGE An image is essentially a 2-D signal processed by the hu- man visual system. The signals representing images are usually in analog form. However, fo r processing, stor- age and transmission by computer applications, they are converted from analog to digital form. A digital image is basically a 2-Dimensional array of pixels. Images form the significant part of data, particularly in remote sensing, bi- omedical and video conferencing applications. The use of and dependence on information and computers continue to grow, so too does our need for efficient ways of storing and transmitting large amounts of data. IMAGE COMPRESSION Image compression addresses the problem of reducing the amount of data required to represent a digital image. It is a process intended to yield a compact representation of an image, thereby reducing the image storage/trans- mission requirements. Compression is achieved by the removal of one or more of the three basic data redundan- cies: 1.Coding Redundancy 2.Interpixel Redundancy 3.Psychovisual Redundancy Coding redundancy is present when less than optimal code words are used. Interpixel redundancy results from correlations between the pixels of an image. Psychovisual redundancy is due to data that is ignored by the human visual system (i.e. visually non essential information). BENEFITS OF COMPRESSION • It provides a potential cost savings associated with send- ing less data over switched telephone • It not only reduces storage requirements but also overall execution time. • It also reduces the probability of transmission errorss- ince fewer bits are transferred. • It also provides a level of security against illicit monitor- ing. SALIENCY MODEL Automatic scene analysis In the last decade, security cameras have become a com- mon sight in the urban landscape. The ability to monitor a number of different places from one location has aided crime prevention. A vast number of security cameras are being installed in everything from public streets to train carriages, which has spawned a fundamental problem. On the London Underground alone, there are at least 9000 security cameras. Security staff can have as many as 60 cameras to watch at any one time so monitoring is an extremely difficult task, requiring considerable con- centration for long periods of time (Donald, 1999). It is easy to imagine that manpower on its own is not enough to deal with the vast quantities of data that are being re- corded. Automation is clearly the next step. INFORMATION HIDING USING VECTOR QUANTIZA- TION In the earlier part of the thesis different methods in the spatial domain and transform domain are studied This chapter deals with the techniques for hiding Information in the compressed domain. One of the most commonly studied image compression technique is Vector Quan- tization (VQ)[60], which is a lossy image compression technique based on the principle of block coding. VQ is a clustering technique & every cluster is represented by a codevector. It is widely used to compress grey-level im- ages because of its low bit rate. The main concept of VQ is to utilize templates instead of blocks to do the image compression. These templates, also referred to as code- words or codevectors, are stored in a codebook, and the codebook is shared only between the sender and the re- ceiver. Hence, the index value of the template is used to represent all the pixel values of the block so that data compression can be achieved. Such a mechanism is ex- tremely easy to implement although the organization of the templates affects the quality of the compressed image. Experimental Results: Table Average values of PSNR, MSE and AFCPV using 1 bit , 2, 3, 4, and variable bits for Information hiding in Vector Quantized codebook method on LBG, KPE, KMCG and KFCG codebook is of size 2048
  • 3. 3 International Journal of Research and Innovation (IJRI) Remark: It is observed that KFCG performs better than LBG, KPE and KMCG considering MSE, PSNR and AFCPV. Figure shows the results for cover image Lioness and se- cret image work logo Remark: It is observed that Stego is similar to the original image using any of the four codebook genera- tion algorithms. Table shows the hiding capacity for all covers and mes- sages for 1,2,3,4 and variable bits for all 4 Codebook gen- eration techniques Figure 6.4, 6.5, 6.6 and 6.7 show the hiding capacity, PSNR, MSE and AFCPV for all 4 algo- rithms and 1,2,3,4 and variable bit hiding method. Table Hiding Capacity in bits using 1 bit, 2 bits, 3 bits, 4 bits, and variable bits method on LBG, KPE, KMCG and KFCG codebook of size 2048. Related work and our contribution We should first note that classical image denoising al- gorithms do not apply to image inpainting, since the re- gions to be inpainted are usually large. That is, regions occupied by top to bottom scratches along several film frames, long cracks in photographs, superimposed large fonts, and so on, are of significant larger size than the type of noise assumed in common image enhancement algorithms. In addition, in common image enhancement applications, the pixels contain both information about the real data and the noise, while in image in painting, there is no significant information in the region to be inpainted. The information is mainly in the regions sur- rounding the areas to be inpainted. There is then a need to develop specific techniques to address these problems. Mainly three groups of works can be found in the lit- erature related to digital in painting. The first one deals with the restoration of films, the second one is related to texture synthesis, and the third one, a significantly less studied class though very influential to the work here pre- sented, is related to disocclusion. Joyeux et al. [4] devised a 2-steps frequency based reconstruction system for de- tecting and removing line scratches in films. They propose to first recover low and then high frequencies. Although good results are obtained for their specific application, the algorithm can not handle large loss areas. Frequency domain algorithms trade a good recovery of the overall structure of the regions for poor spatial results regarding, for instance, the continuity of lines. Kokaram et al. [6] use motion estimation and autoregressive models to interpo- late losses in films from adjacent frames. The basic idea is to copy into the gap the right pixels from neighboring frames. The technique can not be applied to still images or to films where the regions to be inpainted span many frames. Our contribution Algorithms devised for film restoration are not appropri- ate for our application since they normally work on rela- tively small regions and rely on the existence of informa- tion from several frames. On the other hand, algorithms based on texture synthesis can fill large regions, but re- quire the user to specify what texture to put where. This is a significant limitation of these approaches, as may be seen in examples presented later in this paper, where the region to be inpainted is surrounded by hundreds of dif- ferent backgrounds, some of them being structure and not texture. The technique we propose does not require any user intervention, once the region to be inpainted has been selected. The algorithm is able to simultaneously fill regions surrounded by different backgrounds, with- out the user specifying “what to put where.” No assump- tions on the topology of the region to be inpainted, or on the simplicity of the image, are made. The algorithm is devised for inpainting in structured regions (e.g., regions crossing throughboundaries), though it is not devised to reproduce large textured areas. As we will discuss later, the combination of our proposed approach with texture synthesis techniques is the subject of current research. RESULTS Input Image The image is given to the saliency extraction block. The following is the output of Saliency.
  • 4. 4 International Journal of Research and Innovation (IJRI) Saliency output of the input image Saliency MAP. Image divided into salient part and non salient part. Then the original image is Compressed image using data SMVQ and VQ along with data hiding. The following the output. Compressed Image The final Reconstructed image at the output. CONCLUSION AND FUTURE SCOPE In this project new methods of Information hiding in com- pressed domain using Vector Quantization and SMVQ are proposed. They are Information Hiding in salient im- ages using Vector Quantized Codebook and SMVQ. In this paper, we proposed a joint data-hiding and compression scheme by using SMVQ and PDE-based image inpainting and saliency detection. The blocks, except for those in the leftmost and topmost of the image, can be embedded with secret data and compressed simultaneously, and the adopted compression method switches between SMVQ and image inpainting adaptively according to the embed- ding bits. VQ is also utilized for some complex blocks to control the visual distortion and error diffusion. On the receiver side, after segmenting the compressed codes into a series of sections by the indicator bits, the embedded secret bits can be easily extracted according to the index values in the segmented sections, and the decompression for all blocks can also be achieved successfully by VQ, SMVQ, and image inpainting. The existing code book generation can be improved and produce better results. Some other techniques include. The data size should be increased than the present. REFERENCES [1] W. B. Pennebaker and J. L. Mitchell, The JPEG Still Image Data Compression Standard. New York, NY, USA: Reinhold, 1993. [2] D. S. Taubman and M. W. Marcellin, JPEG2000: Im- age Compression Fundamentals Standards and Practice. Norwell, MA, USA: Kluwer, 2002. [3] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Norwell, MA, USA: Kluwer, 1992. [4] N. M. Nasrabadi and R. King, “Image coding using vec- tor quantization: A review,” IEEE Trans. Commun., vol. 36, no. 8, pp. 957–971, Aug. 1988. [5] Announcing the Advanced Encryption Standard (AES), National Institute of Standards & Technology, Gaithers- burg, MD, USA, Nov. 2001. [6] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosys- tems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978. [7] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999. [8] C. D. Vleeschouwer, J. F. Delaigle, and B Macq, “Invis- ibility and application functionalities in perceptual wa- termarking: An overview,” Proc. IEEE, vol. 90, no. 1, pp. 64–77, Jan. 2002. [9] C. C. Chang, T. S. Chen, and L. Z. Chung, “A steg- anographic method based upon JPEG and quantization table modification,” Inf. Sci., vol. 141, no. 1, pp. 123–138, 2002. [10] H. W. Tseng and C. C. Chang, “High capacity data hiding in JPEGcompressed images,” Informatica, vol. 15, no. 1, pp. 127–142, 2004. [11] P. C. Su and C. C. Kuo, “Steganography in JPEG2000 compressed images,” IEEE Trans. Consum. Electron., vol. 49, no. 4, pp. 824–832, Nov. 2003.
  • 5. 5 International Journal of Research and Innovation (IJRI) [12] W. J. Wang, C. T. Huang, and S. J. Wang, “VQ appli- cations in steganographic data hiding upon multimedia images,” IEEE Syst. J., vol. 5, no. 4, pp. 528–537, Dec. 2011. [13] Y. C. Hu, “High-capacity image hiding scheme based on vector quantization,” Pattern Recognit., vol. 39, no. 9, pp. 1715–1724, 2006. [14] Y. P. Hsieh, C. C. Chang, and L. J. Liu, “A two-code- book combination and three-phase block matching based image-hiding scheme with high embedding capacity,” Pat- tern Recognit., vol. 41, no. 10, pp. 3104–3113, 2008. [15] C. H. Yang and Y. C. Lin, “Fractal curves to improve the reversible data embedding for VQ-indexes based on locally adaptive coding,” J. Vis. Commun. Image Repre- sent., vol. 21, no. 4, pp. 334–342, 2010. [16] Y. Linde, A. Buzo, and R. M. Gray, “An algorithm for vector quantization design,” IEEE Trans. Commun., vol. 28, no. 1, pp. 84–95, Jan. 1980. [17] C. C. Chang and W. C. Wu, “Fast planar-oriented rip- ple search algorithm for hyperspace VQ codebook,” IEEE Trans. Image Process., vol. 16, no. 6, pp. 1538–1547, Jun. 2007. [18] W. C. Du and W. J. Hsu, “Adaptive data hiding based on VQ compressed images,” IEE Proc. Vis., Image Signal Process., vol. 150, no. 4, pp. 233–238, Aug. 2003. [19] C. C. Chang and W. C. Wu, “Hiding secret data adap- tively in vector quantisation index tables,” IEE Proc. Vis., Image Signal Process., vol. 153, no. 5, pp. 589–597, Oct. 2006. [20] C. C. Lin, S. C. Chen, and N. L. Hsueh, “Adaptive em- bedding techniques for VQ-compressed images,” Inf. Sci., vol. 179, no. 3, pp. 140–149, 2009. [21] C. H. Hsieh and J. C. Tsai, “Lossless compression of VQ index with search-order coding,” IEEE Trans. Image Process., vol. 5, no. 11, pp. 1579–1582, Nov. 1996. [22] C. C. Lee, W. H. Ku, and S. Y. Huang, “A new steg- anographic scheme based on vector quantisation and search-order coding,” IET Image Process., vol. 3, no. 4, pp. 243–248, 2009. [23] S. C. Shie and S. D. Lin, “Data hiding based on com- pressed VQ indices of images,” Comput. Standards Inter., vol. 31, no. 6, pp. 1143–1149, 2009. [24] C. C. Chang, G. M. Chen, and M. H. Lin, “Information hiding based on search-order coding for VQ indices,” Pat- tern Recognit. Lett., vol. 25, no. 11, pp. 1253–1261, 2004. [25] T. Kim, “Side match and overlap match vector quan- tizers for images,” IEEE Trans. Image Process., vol. 1, no. 2, pp. 170–185, Apr. 1992. AUTHOR S. Girish, Research Scholar, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India. E. Balakrishna, Assistant Professor, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India. S. Rehana Banu , Assistant Professor, Department of Electronics AndCommunication Engineering, Chiranjeevi Reddy Institute of Engineering and Technology, Anantapur, A. P, India.