SlideShare a Scribd company logo
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3
155
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
Secured Reversible Data Transmission by Using Gzip Deflector
Algorithm for Encoded AVC Video
1,
Gokiladeepa.G, 2,
Gayathri.S, 2,
Heeba.S.D, 2,
Pavithra.R
1
Assistant Professor, Department Of Information Technology, SNS College of Engineering, TamilNadu, India
2
UG Scholar, Dept. of Information Technology, SNS College of Engineering ,TamilNadu, India
Abstract
Reversible data transmission, visible watermarking and steganography schemes that can be employed
along with multimedia applications. However, these methods are susceptible to quantization errors provided by
standard image/video compression standards. In this work we present a secured data transmission using novel
reversible visible watermarking scheme for H.264/AVC encoded video sequences. The proposed approach
reversibly embeds the residual information that will then be used by the decoder to recover the original image or
video frame. The residual information is losslessly compressed using the Gzip Deflector algorithm to minimize
the information to be embedded and reduce the distortion provided by RCM. The compressed information is
then encrypted using the 128–bit Advanced Encryption Standard (AES). Furthermore we add security in this
work if the key does not match we provide irrelevant information or unwanted data’s to the decoder. And
finally we compared our proposed work with existing state of art.
Index Terms – Information embedding, data compression, lossless recovery, reversible watermarking scheme,
DCT, AES, GZip Deflector algorithm.
1. INTRODUCTION
The recent growth of computer networks and multimedia systems has contributed to the proliferation of
multimedia con-tent. However, the availability of multimedia editing software has raised the issue of increased
distortion level[1]unauthorized manipulation of proprietary material. Visible watermarking techniques have been
extensively used to protect copyrighted material. However, traditional approaches, such as [2] are not able to
recover the original image/video quality after watermarking extraction.The methods proposed for removable
visible watermarking schemes where authenticated users are allowed to approximate the visible watermark.
Nonetheless, these methods only manage to recover an approximate version of the original image after
watermark extraction [12] and are therefore unsuitable for military, law and medical applications.There are
several reversible visible watermarking schemes that can be employed for many applications [3]. However,
these methods are susceptible to quantization errors provided by standard image/video compression standards.
Therefore, these methods are not suitable for most Internet applications where multimedia content needs to be
compressed prior transmission. In previous work, the same author has presented a reversible watermarking
scheme for JPEG image compression . However, this method cannot be directly integrated within current video
compression standards, mainly due to the spatio-temporal prediction mechanisms being employed by video
standards.
This paper presents secured data transmission by an adaptation of the reversible visible watermarking
scheme presented, for H.264/AVC video coding. The proposed method computes the residual error caused by
the embedded watermark which is losslessly compressed using the GZip Deflector algorithm and then encrypted
using the Advanced Encryption Standard (AES). The resulting information is embedded within the trans-form
coefficients of every macroblock (MB) pair using the Reversible Contrast Mapping (RCM).The simulation
results clearly show that the proposed mechanism outperforms the state of the art approach where Peak Signal-
to-Noise Ratio (PSNR) gains of up to 7 dB were registered. The structure of this paper is as follows. Section II
provides a detailed description of each component involved in the Reversible Visible Watermarking Embedding
process while the Reversible Visible Watermark Extraction process is described in section III. Section IV
presents the testing environment and presents the simulation results. The final comments and conclusion are
delivered in section V.
2. Information Embedding
A High level description of the proposed Reversible Visible Watermark Embedding process for video
content is illustrated in Fig.1. The original frame I is first fed to the information Embedding process which
inserts a visible watermark within its Region of Interest (ROI) to generate the frame IW. Given that the
embedded watermark directly affects the image content, it makes this process irreversible.The resulting
watermarked frame IW is then compressed using the Video Encoder 1 process which employs motion estimation
Secured Reversible Data Transmission By Using Gzip...
156
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
and spatial prediction of the standard H.264/AVC encoder [4] to minimize the residual error EWC to be entropy
coded. The motion vectors and modes selected for each Macro block (MB) are registered in the Control
Information module. This information is then used by the video encoder to compress the original image I which
outputs the residual error EC. This process computes neither motion estimation nor mode decision, but relies
solely on the information contained within the Control Information module, thus significantly reduce the
complexity of the system.
Fig.1 Schematic diagram of Information Embedding process.
The difference between the residual errors of the compressed watermarked image EWC [5]and the compressed
image EC provides the discrepancy image D. This image contains 0 values outside the ROI, while having low
magnitude values within the ROI. Therefore, in order to minimize the information to be embedded within the
image, only the message M encompassing the Region of Interest within D is losslessly encoded and encrypted.
The encrypted message ME is then embedded within the watermarked image IW using a re-visible watermarking
approach. More information about each individual module is provided in the following sub-sections.
2.1 Data Embedding
The Visible Watermarking Embedding process is used to perceptibly insert a watermark W into a
primary image I so that the watermark is visible by the human eye. The purpose of these watermarks is to be
noticeable without significantly reducing the quality of the image. The method adopted in this work considers
the human vision system (HVS model) and the image content to insert the watermark without significantly
degrading the perceptual quality of the image/video content. This process dissects the host image I into non-
overlapping 8× 8 blocks. The watermark pattern W is then adaptively embedded into the host image using
In
W
(i, j) = [αnIn(i,j)] , if W(i,j) =1
In(i,j) , otherwise (1)
where [ ] represents the floor function, In
W
and In denote the nth
8×8 block of the watermarked image IW and the
host image I respectively, i and j are spatial coordinates within the block and n is the nth
adaptive scaling
coefficient. The scaling coefficients n are dependent on both the human perception and image content and
determine the visibility of the watermark pattern. More information about the derivation of these scaling
coefficients can be found in [8] and [12].
2.2 Video Encoder and DCT
The Video Encoder process employs the standard H.264/AVC encoder [6] to compress the supplied
video content.This process employs spatial prediction and motion estimation to minimize the residual error to be
encoded. The encoder derives the residual information to be encoded by subtracting the predicted frame from the
original frame. The resulting residual information is de-correlated using the discrete cosine transform (DCT)
transformation [10][9] and quantized to keep the least amount of information while still achieving an acceptable
level of image quality. The quantized transform coefficients are then inverse quantized and inverse transformed
to recover the residual error E which also includes the quantization error introduced by the lossy nature of the
standard video codec.
Fig. 2. DCT Based Watermark Technique.
Secured Reversible Data Transmission By Using Gzip...
157
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
The proposed method employs two Video Encoder pro-cesses. The Video Encoder 1 process receives the
watermarked frame IW and computes motion estimation and spatial pre-diction to compress the video. The
resulting modes selected and motion vectors are then stored in the Control Information module while the
resulting residual error EWC is outputted. On the other hand, the Video Encoder to process receives the original
video stream I and compresses it using the motion vectors and mode selected available in the Control
Information module. This is done to ensure synchronization between the two processes and to minimize the
computational complexity of the proposed system.
2.3 Data Compression and Encryption
The discrepancy message D is derived by subtracting the residual EC from the residual EWC. As it can
be seen from Fig. 1, the non-zero coefficients reside only within the Region of Interest. Therefore, in order to
minimize the data to be embedded, the Region of Interest is extracted from the discrepancy message D to
generate the message M and this information is then passed through the Lossless Encoder process.The Lossless
Encoder process adopts a simple encoding strategy, where each pixel in M is represented by a 10–bit codeword.
The Most Significant Bit (MSB) is used to flag whether the pixel is a watermark (1) or not (0). The second MSB
represents the polarity of the coefficient where negative coefficients are marked by a 1. The remaining 8–bits
represent the magnitude of the coefficients of the residual error message M. Given that the decoder needs some
extra information to be able to decode the encoded message (e.g. watermark dimensions and coordinates of the
ROI), this information is concatenated to M prior to lossless encoding. The resulting 10–bit code words are then
compressed using the public do-main lossless Gzip Deflector algorithm [14].
2.4 AES (Advanced Encryption Standard)
To enhance the security, a 128–bit Advanced Encryption Standard (AES) [13] is used to encrypt the
information to be embedded so that only authenticated users can recover the original image.The AES algorithm
is a symmetric key algorithm which means the same key is used to both encrypt and decrypt a message. Also,
the cipher text produced by the AES algorithm is the same size as the plain text message. Most of the operations
in the AES algorithm take place on bytes of data or on words of data 4 bytes long, which are represented in the
field GF(28), called the Galois Field. AES is based on a design principle known as a Substitution permutation
network. AES operates on a 4×4 matrix of bytes, termed the state. The AES cipher is specified as a number of
repetitions of transformation rounds that convert the input plaintext into the final output of cipher text. Each
round consists of several processing steps, including one that depends on the encryption key. A set of reverse
rounds are applied to transform cipher text back into the original plaintext using the same encryption key. The
AES algorithm loops through certain sections Nr times. It is fast in both software and hardware.AES Algorithm
have following steps
Advantages of using AES algorithm:
1) Very Secure.
2) Reasonable Cost.
3) Main Characteristics
i) Flexibility, ii) Simplicity
1) Key Expansion—Round keys are derived from the cipher key using
Rijndael's key schedule.
2) Initial Round
a) Add Round Key—each byte of the state is combined with the
round key using bitwise XOR.
3) Rounds
a) Sub Bytes—a non-linear substitution step where each byte is
replaced with another according to a lookup table.
b)Shift Rows—A transposition step where each row of the state is
shifted cyclically a certain number of steps.
c) Mix Columns—a mixing operation which operates on the
columns of the state, combining the four bytes in each column.
d) Add Round Key
4) Final Round (no Mix Columns)
a) Sub Bytes
b) Shift Rows
c) Add Round Key
Secured Reversible Data Transmission By Using Gzip...
158
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
2.5 Reversible Contrast Mapping (RCM)
The Reversible Watermarking process adopts the Reversible Contrast Mapping (RCM) mechanism
presented in [15] to embed the encrypted information ME within the watermarked image IW . The RCM
algorithm was used since it is reported to provide high-capacity data embedding without the requirement of the
transmission of any additional side information.The RCM algorithm considers x and y to be a pair of
coefficients whose values [11] reside in the range [0; L]. The forward RCM algorithm transforms the pixel pairs
according to
x = 2x - y; y = 2y - x (2)
In order to prevent overflow and underflow, the transformed pixel pairs are restricted within the range
0 ≤ x≤ L, 0 ≤ y ≤L (3)
The original coefficients can be recovered using the following inverse transformation
x= [(2/3) x+ (1/3) y], Y= [(1/3) x+ (2/3) y)] (4)
Where [ ] is the ceil function.
The RCM method substitutes the Least Significant Bit (LSB) of x and y. The LSB of x is set to 1 to indicate a
transformed pair while 0 otherwise. The information bit b is then embedded within the LSB of y. More
information about this method can be found in [15].The method proposed in [8], which is considered as the state
of the art method, applies the RCM algorithm in the spatial domain. However, the RCM method cannot be
applied in the spatial domain when considering compressed images since the embedded information will be
distorted by the Quantization process of the image/video codec. It was further shown that the RCM method can
modify the transformed coefficients prior entropy coding, thus mak-ing recovery of the original transform
coefficients possible. However, the transform coefficients provide different levels of distortions, and therefore it
is more desirable to embed the information within high frequency coefficients which provide the least distortion
to the human vision system.
Therefore, considering a P Q image, the Reversible Watermarking scans the blocks column-wise and grabs the
first two neighbouring 4 4 transformed blocks. It embeds the first bit within the coordinate (3,3) which
corresponds to the highest frequency coefficient. The remaining P
32
Q
1 bits are then stored within the coefficient
with coordinates (3,3) of the remaining neighbour blocks. Once all the blocks have been used this process goes
back to the first two neighbouring blocks and embeds the second P
32
Q
bits within the coefficient coordinate (3,2).
This process proceeds until either the whole bit stream is embedded or else when all the transform coefficients
are used. It is important to notice that the RCM algorithm can be used to embed information more than once
within the same coefficients. However, this will contribute to major distortions within the image. Therefore, the
transform coefficients were only used once for embedding. The Reversible Watermarking process then outputs
the image IRV C which is then entropy encoded and transmitted.
3. Information Extraction
The Information Extraction process in-verts the computations performed by the Reversible Visible
Watermark Embedding process. It receives the entropy coded information and decodes it to recover the image
IRV W .The Reversible Data Extraction process then computes the inverse RCM function[13] to extract the
encrypted message ME and the visible watermarked residual EW . The message ME is then decrypted and
decoded to derive the message M. The message M contains the residual watermark within a Region of Interest
together with additional information suitable to reconstruct the discrepancy image D. The im-ages D and EWC
are then summed to generate EC. The Video Decoder then is able to recover the original compressed video
sequence IC.
4. Simulation Result
The proposed Reversible Visible Watermarking Scheme was implemented using the C++ programming
language. The raw video sequences considered in these simulation results were encoded using a Common
Intermediate Format (CIF) resolution at 30fps with a format IPPP using the Baseline Profile of H.264/AVC. The
video was encoded using only the 4 4 transform size. The Quantization Parameter is set to a default of 20 unless
otherwise specified. The logos employed in these experiments included some of the logos.
TABLE I
Performance Analysis of the Proposed Reversible Visible Watermarking Embedding Process
Secured Reversible Data Transmission By Using Gzip...
159
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
TABLE I
Performance Analysis of the Proposed Reversible Visible Watermarking Embedding Process
Table I illustrates the performance of the proposed Re-versible Visible Watermarking Embedding mechanism.
It can be clearly seen that the compression efficiency provided by the Lossless Encoder process is between 1.8
and 2.5. This compression efficiency is almost constant and thus not affected by the logo size. It can be further
noticed that the larger the size of the logo to be embedded the lower is the quality of the Watermarked Video IW .
This is quite intuitive since larger logos need to modify more DCT coefficients thus inevitably reducing the
perceptual quality of the Watermarked Video.The proposed system was compared to the Yang method which
was adapted for compressed video. As it can be seen from Fig. 2, the quality of the proposed method is superior
to the method adopted in [8]. In fact, it can be seen that no matter how much information is reversible embedded
the proposed system manages to recover the original quality for authenticated users. This is mainly due to the
fact that the information is being embedded on the compressed transform coefficients. On the other hand, the
performance of the state of the art approach degrades with increasing embedding information since the
information is hidden within the spatial domain which is corrupted by the Quantization process.
Fig. 3. Performance of the Yang method [8] and the proposed method at different number of embedded bits
Fig. 4. Performance of the Yang [8] and the proposed method at different Quantization Parameters (a) Foreman
(b) Paris Sequence
Fig. 5. Subjective results when using the (a) method proposed by Yang [8] and the (b) Proposed method. QP was
set to 30.
The performance of the proposed scheme was further analysed using different Quantization Parameters. As
Logo Width Height ME Size Comp. IW PSNR
(Bytes) Ratio (dB)
ATLSS 163 216 14408 2.4436 26.2887
DARPA 130 263 16461 2.0770 26.9543
Censcir 82 225 8747 2.1093 30.1921
Robotics 130 108 5623 2.4969 31.4413
CIT 82 225 8472 2.1778 31.7764
HCII 65 65 2253 1.8753 37.4408
Secured Reversible Data Transmission By Using Gzip...
160
||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com||
shown in Fig. 3, the proposed system clearly outperforms the method presented in [7] where PSNR gains of up
to 7 dB were achieved. The superiority of the proposed method is more evident in Fig. 4 where it can be seen
that the method proposed by Yang does not manage to extract the reversible information since it was corrupted
by quantization errors induced by the lossy Video Encoder process. The quantization errors generally provide
syntax and semantic violations in the De-Encryption and Lossless Decoding processes which are thus not able to
recover the original embedded information. On the other hand the proposed method manages to recover the
original compressed video when the user is authenticated.
5. Comments And Conclusion
This paper has presented a secured data Transmission with Advanced Encryption Standard (AES) using
novel reversible visible water-marking scheme for H.264/AVC encoded video. The proposed method computes
the information required by the decoder to recover the original compressed video when receiving the
watermarked video sequence. The additional information is reversibly embedded within the transform
coefficients of the watermarked video. The authenticated users are then enabled to extract the information
hidden within the transform coefficients to recover the original compressed image.The experimental results have
shown the superiority of the proposed system where PSNR gains of up to 7 dB was registered relative to the
state of the art approach. It was further shown that the information to be hidden can be compressed with
compression efficiency between 1.8 and 2.5.And the distortion provided by the RCM method is reduced.
Furthermore, watermark estimation functions can be employed in order to reduce the energy within the message
D to be decoded.
References
[1] Reuben A.Farrugia ―Reversible Visibe Watermarking for H.264/AVC Encoded Video‖ IEEE Conference,May 2011
[2] A.Watson,‖Visually Optimal DCT Quantization Matrices for Individual Images‖, in Data Compression Conference,
1993. DCC ’93., 1993, pp. –187.
[3] S.-K. Yip, O. Au, C.-W. Ho, and H.-M. Wong, ―Lossless Visible Water-Marking‖ , in Multimedia and Expo, 2006
IEEE International Conference on, 9-12 2006, pp. 853 –856
[4] Xiao Zeng, Zhen-YongChen, MingChen and Zhang Xiong,‖ Reversible Video Watermarking Using Motion
Estimation and Prediction Error Expansion,‖journal of information science and engineering 27,465-479(2011)
[5] R. A. Farrugia, ―A Reversible Visible Watermarking Scheme for Com-pressed Images‖, ‖, in MELECON 2010 -
2010 15th IEEE Mediterranean Electrotechnical Conference, , 26-28 2010, pp. 212 –217
[6] T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, ―Overview of the H.264/AVC Video Coding Standard,‖
IEEE Transactions on, Vol. 13, no. 7, pp. 560 –576, July 2003
[7] S.P.Mohanty ,K.R.Ramakrishnan, and M.S. Kankanhalli,―A DCT Domain Visible Watermarking Technique for
Images,‖ in Multimedia andExpo, 2000, IEEE International Conference on, NewYork, USA, pp. 1029–1032
[8] D. Coltuc and J.-M. Chassery, ―Very Fast Watermarking by Reversible Contrast Mapping,‖ Signal Processing
Letters, IEEE, Vol. 14, no. 4, pp.255-258,April 2007
[9] A. Watson, ―Visually Optimal DCT Quantization Matrices for Individual Images‖, ,‖ in Data Compression
Conference, 1993. DCC ’93, 1993, pp. 178–187
[10] Y.Yang, X. Sun, H. Yang, and C.-T. Li, , ―Removable Visible Image Watermarking Algorithm in the Discrete
Cosine Transform Domain,‖ Expo, 2000. ICME 2000. 2000 IEEE International Conference on, New York, NY ,
USA, pp. 1029–1032
[11] A. Alattar, ―Reversible of a Generalized Integer Transform ,‖ Image Processing, IEEE Transactions on, Vol.
13,no.8,pp. 1147-1156,Aug.2004
[12] Y. Hu and B. Jeon, ―Reversible Visible Watermarking and Lossless Recovery of Visible Watermarking and Original
Images,‖Circuits and Systems for Video Technology IEEE Transactions on,Vol.16,no.11,pp.1423-1429,Nov.2006
[13] Advanced Encryption Standard (AES), FIPS PUB Std.197,2001
[14] (2010)Thezlibwebsite.[Online].Available http://www.zlib.net/
[15] B.-B. Huang and S.-X. Tang, ―A Contrast-Sensitive Visible Water- MarkingScheme,‖IEEE MultiMedia,vol.13,no.2
pp. 60– 66, 2006.

More Related Content

What's hot

Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...
TELKOMNIKA JOURNAL
 
50120140506015
5012014050601550120140506015
50120140506015
IAEME Publication
 
Performance and Analysis of Video Compression Using Block Based Singular Valu...
Performance and Analysis of Video Compression Using Block Based Singular Valu...Performance and Analysis of Video Compression Using Block Based Singular Valu...
Performance and Analysis of Video Compression Using Block Based Singular Valu...
IJMER
 
C010421720
C010421720C010421720
C010421720
IOSR Journals
 
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
INFOGAIN PUBLICATION
 
IRJET- RGB Image Compression using Multi-Level Block Trunction Code Algor...
IRJET-  	  RGB Image Compression using Multi-Level Block Trunction Code Algor...IRJET-  	  RGB Image Compression using Multi-Level Block Trunction Code Algor...
IRJET- RGB Image Compression using Multi-Level Block Trunction Code Algor...
IRJET Journal
 
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERHARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
cscpconf
 
1820 1824
1820 18241820 1824
1820 1824
Editor IJARCET
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
eSAT Publishing House
 
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGES
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGESA FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGES
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGES
cscpconf
 
A fragile watermarking based on binomial transform in color images
A fragile watermarking based on binomial transform in color imagesA fragile watermarking based on binomial transform in color images
A fragile watermarking based on binomial transform in color images
csandit
 
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...
TELKOMNIKA JOURNAL
 
A130104
A130104A130104
A130104
irjes
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET Journal
 
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET -  	  Underwater Image Enhancement using PCNN and NSCT FusionIRJET -  	  Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET Journal
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
IJERA Editor
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
csandit
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
IAEME Publication
 
1674 1677
1674 16771674 1677
1674 1677
Editor IJARCET
 

What's hot (19)

Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...Imperceptible and secure image watermarking using DCT and random spread techn...
Imperceptible and secure image watermarking using DCT and random spread techn...
 
50120140506015
5012014050601550120140506015
50120140506015
 
Performance and Analysis of Video Compression Using Block Based Singular Valu...
Performance and Analysis of Video Compression Using Block Based Singular Valu...Performance and Analysis of Video Compression Using Block Based Singular Valu...
Performance and Analysis of Video Compression Using Block Based Singular Valu...
 
C010421720
C010421720C010421720
C010421720
 
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
5 ijaems sept-2015-9-video feature extraction based on modified lle using ada...
 
IRJET- RGB Image Compression using Multi-Level Block Trunction Code Algor...
IRJET-  	  RGB Image Compression using Multi-Level Block Trunction Code Algor...IRJET-  	  RGB Image Compression using Multi-Level Block Trunction Code Algor...
IRJET- RGB Image Compression using Multi-Level Block Trunction Code Algor...
 
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERHARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
 
1820 1824
1820 18241820 1824
1820 1824
 
Video copy detection using segmentation method and
Video copy detection using segmentation method andVideo copy detection using segmentation method and
Video copy detection using segmentation method and
 
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGES
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGESA FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGES
A FRAGILE WATERMARKING BASED ON BINOMIAL TRANSFORM IN COLOR IMAGES
 
A fragile watermarking based on binomial transform in color images
A fragile watermarking based on binomial transform in color imagesA fragile watermarking based on binomial transform in color images
A fragile watermarking based on binomial transform in color images
 
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...
Improved Key Frame Extraction Using Discrete Wavelet Transform with Modified ...
 
A130104
A130104A130104
A130104
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET -  	  Underwater Image Enhancement using PCNN and NSCT FusionIRJET -  	  Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
ROBUST COLOUR IMAGE WATERMARKING SCHEME BASED ON FEATURE POINTS AND IMAGE NOR...
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
 
1674 1677
1674 16771674 1677
1674 1677
 

Similar to Z03301550160

A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
International Journal of Technical Research & Application
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
researchinventy
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
ijceronline
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
IRJET Journal
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
sophiabelthome
 
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
IJECEIAES
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
IAESIJEECS
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
AROCKIAJAYAIECW
 
A0540106
A0540106A0540106
A0540106
IOSR Journals
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
IJERA Editor
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET Journal
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
TELKOMNIKA JOURNAL
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
IJET - International Journal of Engineering and Techniques
 
Robust adaptive intra refresh for
Robust adaptive intra refresh forRobust adaptive intra refresh for
Robust adaptive intra refresh for
IJCSEA Journal
 
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEOROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
IJCSEA Journal
 
Robust Adaptive Intra Refresh for Multiview Video
Robust Adaptive Intra Refresh for Multiview VideoRobust Adaptive Intra Refresh for Multiview Video
Robust Adaptive Intra Refresh for Multiview Video
IJCSEA Journal
 
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEOROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
IJCSEA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
IAEME Publication
 

Similar to Z03301550160 (20)

A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
Image Authentication Using Digital Watermarking
Image Authentication Using Digital WatermarkingImage Authentication Using Digital Watermarking
Image Authentication Using Digital Watermarking
 
Comparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its RobustnessComparison of Invisible Digital Watermarking Techniques for its Robustness
Comparison of Invisible Digital Watermarking Techniques for its Robustness
 
International journal of signal and image processing issues vol 2015 - no 1...
International journal of signal and image processing issues   vol 2015 - no 1...International journal of signal and image processing issues   vol 2015 - no 1...
International journal of signal and image processing issues vol 2015 - no 1...
 
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style
 
18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)18 17 jan17 13470 rakesh ahuja revised-version(edit)
18 17 jan17 13470 rakesh ahuja revised-version(edit)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
A0540106
A0540106A0540106
A0540106
 
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...
 
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
IRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVDIRJET-  	  Image Compression Technique for Quantized Encrypted Images using SVD
IRJET- Image Compression Technique for Quantized Encrypted Images using SVD
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
Robust adaptive intra refresh for
Robust adaptive intra refresh forRobust adaptive intra refresh for
Robust adaptive intra refresh for
 
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEOROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
 
Robust Adaptive Intra Refresh for Multiview Video
Robust Adaptive Intra Refresh for Multiview VideoRobust Adaptive Intra Refresh for Multiview Video
Robust Adaptive Intra Refresh for Multiview Video
 
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEOROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
ROBUST ADAPTIVE INTRA REFRESH FOR MULTIVIEW VIDEO
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Digital image watermarking using dct with high security of
Digital image watermarking using dct with high security ofDigital image watermarking using dct with high security of
Digital image watermarking using dct with high security of
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Z03301550160

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 155 ||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com|| Secured Reversible Data Transmission by Using Gzip Deflector Algorithm for Encoded AVC Video 1, Gokiladeepa.G, 2, Gayathri.S, 2, Heeba.S.D, 2, Pavithra.R 1 Assistant Professor, Department Of Information Technology, SNS College of Engineering, TamilNadu, India 2 UG Scholar, Dept. of Information Technology, SNS College of Engineering ,TamilNadu, India Abstract Reversible data transmission, visible watermarking and steganography schemes that can be employed along with multimedia applications. However, these methods are susceptible to quantization errors provided by standard image/video compression standards. In this work we present a secured data transmission using novel reversible visible watermarking scheme for H.264/AVC encoded video sequences. The proposed approach reversibly embeds the residual information that will then be used by the decoder to recover the original image or video frame. The residual information is losslessly compressed using the Gzip Deflector algorithm to minimize the information to be embedded and reduce the distortion provided by RCM. The compressed information is then encrypted using the 128–bit Advanced Encryption Standard (AES). Furthermore we add security in this work if the key does not match we provide irrelevant information or unwanted data’s to the decoder. And finally we compared our proposed work with existing state of art. Index Terms – Information embedding, data compression, lossless recovery, reversible watermarking scheme, DCT, AES, GZip Deflector algorithm. 1. INTRODUCTION The recent growth of computer networks and multimedia systems has contributed to the proliferation of multimedia con-tent. However, the availability of multimedia editing software has raised the issue of increased distortion level[1]unauthorized manipulation of proprietary material. Visible watermarking techniques have been extensively used to protect copyrighted material. However, traditional approaches, such as [2] are not able to recover the original image/video quality after watermarking extraction.The methods proposed for removable visible watermarking schemes where authenticated users are allowed to approximate the visible watermark. Nonetheless, these methods only manage to recover an approximate version of the original image after watermark extraction [12] and are therefore unsuitable for military, law and medical applications.There are several reversible visible watermarking schemes that can be employed for many applications [3]. However, these methods are susceptible to quantization errors provided by standard image/video compression standards. Therefore, these methods are not suitable for most Internet applications where multimedia content needs to be compressed prior transmission. In previous work, the same author has presented a reversible watermarking scheme for JPEG image compression . However, this method cannot be directly integrated within current video compression standards, mainly due to the spatio-temporal prediction mechanisms being employed by video standards. This paper presents secured data transmission by an adaptation of the reversible visible watermarking scheme presented, for H.264/AVC video coding. The proposed method computes the residual error caused by the embedded watermark which is losslessly compressed using the GZip Deflector algorithm and then encrypted using the Advanced Encryption Standard (AES). The resulting information is embedded within the trans-form coefficients of every macroblock (MB) pair using the Reversible Contrast Mapping (RCM).The simulation results clearly show that the proposed mechanism outperforms the state of the art approach where Peak Signal- to-Noise Ratio (PSNR) gains of up to 7 dB were registered. The structure of this paper is as follows. Section II provides a detailed description of each component involved in the Reversible Visible Watermarking Embedding process while the Reversible Visible Watermark Extraction process is described in section III. Section IV presents the testing environment and presents the simulation results. The final comments and conclusion are delivered in section V. 2. Information Embedding A High level description of the proposed Reversible Visible Watermark Embedding process for video content is illustrated in Fig.1. The original frame I is first fed to the information Embedding process which inserts a visible watermark within its Region of Interest (ROI) to generate the frame IW. Given that the embedded watermark directly affects the image content, it makes this process irreversible.The resulting watermarked frame IW is then compressed using the Video Encoder 1 process which employs motion estimation
  • 2. Secured Reversible Data Transmission By Using Gzip... 156 ||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com|| and spatial prediction of the standard H.264/AVC encoder [4] to minimize the residual error EWC to be entropy coded. The motion vectors and modes selected for each Macro block (MB) are registered in the Control Information module. This information is then used by the video encoder to compress the original image I which outputs the residual error EC. This process computes neither motion estimation nor mode decision, but relies solely on the information contained within the Control Information module, thus significantly reduce the complexity of the system. Fig.1 Schematic diagram of Information Embedding process. The difference between the residual errors of the compressed watermarked image EWC [5]and the compressed image EC provides the discrepancy image D. This image contains 0 values outside the ROI, while having low magnitude values within the ROI. Therefore, in order to minimize the information to be embedded within the image, only the message M encompassing the Region of Interest within D is losslessly encoded and encrypted. The encrypted message ME is then embedded within the watermarked image IW using a re-visible watermarking approach. More information about each individual module is provided in the following sub-sections. 2.1 Data Embedding The Visible Watermarking Embedding process is used to perceptibly insert a watermark W into a primary image I so that the watermark is visible by the human eye. The purpose of these watermarks is to be noticeable without significantly reducing the quality of the image. The method adopted in this work considers the human vision system (HVS model) and the image content to insert the watermark without significantly degrading the perceptual quality of the image/video content. This process dissects the host image I into non- overlapping 8× 8 blocks. The watermark pattern W is then adaptively embedded into the host image using In W (i, j) = [αnIn(i,j)] , if W(i,j) =1 In(i,j) , otherwise (1) where [ ] represents the floor function, In W and In denote the nth 8×8 block of the watermarked image IW and the host image I respectively, i and j are spatial coordinates within the block and n is the nth adaptive scaling coefficient. The scaling coefficients n are dependent on both the human perception and image content and determine the visibility of the watermark pattern. More information about the derivation of these scaling coefficients can be found in [8] and [12]. 2.2 Video Encoder and DCT The Video Encoder process employs the standard H.264/AVC encoder [6] to compress the supplied video content.This process employs spatial prediction and motion estimation to minimize the residual error to be encoded. The encoder derives the residual information to be encoded by subtracting the predicted frame from the original frame. The resulting residual information is de-correlated using the discrete cosine transform (DCT) transformation [10][9] and quantized to keep the least amount of information while still achieving an acceptable level of image quality. The quantized transform coefficients are then inverse quantized and inverse transformed to recover the residual error E which also includes the quantization error introduced by the lossy nature of the standard video codec. Fig. 2. DCT Based Watermark Technique.
  • 3. Secured Reversible Data Transmission By Using Gzip... 157 ||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com|| The proposed method employs two Video Encoder pro-cesses. The Video Encoder 1 process receives the watermarked frame IW and computes motion estimation and spatial pre-diction to compress the video. The resulting modes selected and motion vectors are then stored in the Control Information module while the resulting residual error EWC is outputted. On the other hand, the Video Encoder to process receives the original video stream I and compresses it using the motion vectors and mode selected available in the Control Information module. This is done to ensure synchronization between the two processes and to minimize the computational complexity of the proposed system. 2.3 Data Compression and Encryption The discrepancy message D is derived by subtracting the residual EC from the residual EWC. As it can be seen from Fig. 1, the non-zero coefficients reside only within the Region of Interest. Therefore, in order to minimize the data to be embedded, the Region of Interest is extracted from the discrepancy message D to generate the message M and this information is then passed through the Lossless Encoder process.The Lossless Encoder process adopts a simple encoding strategy, where each pixel in M is represented by a 10–bit codeword. The Most Significant Bit (MSB) is used to flag whether the pixel is a watermark (1) or not (0). The second MSB represents the polarity of the coefficient where negative coefficients are marked by a 1. The remaining 8–bits represent the magnitude of the coefficients of the residual error message M. Given that the decoder needs some extra information to be able to decode the encoded message (e.g. watermark dimensions and coordinates of the ROI), this information is concatenated to M prior to lossless encoding. The resulting 10–bit code words are then compressed using the public do-main lossless Gzip Deflector algorithm [14]. 2.4 AES (Advanced Encryption Standard) To enhance the security, a 128–bit Advanced Encryption Standard (AES) [13] is used to encrypt the information to be embedded so that only authenticated users can recover the original image.The AES algorithm is a symmetric key algorithm which means the same key is used to both encrypt and decrypt a message. Also, the cipher text produced by the AES algorithm is the same size as the plain text message. Most of the operations in the AES algorithm take place on bytes of data or on words of data 4 bytes long, which are represented in the field GF(28), called the Galois Field. AES is based on a design principle known as a Substitution permutation network. AES operates on a 4×4 matrix of bytes, termed the state. The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of cipher text. Each round consists of several processing steps, including one that depends on the encryption key. A set of reverse rounds are applied to transform cipher text back into the original plaintext using the same encryption key. The AES algorithm loops through certain sections Nr times. It is fast in both software and hardware.AES Algorithm have following steps Advantages of using AES algorithm: 1) Very Secure. 2) Reasonable Cost. 3) Main Characteristics i) Flexibility, ii) Simplicity 1) Key Expansion—Round keys are derived from the cipher key using Rijndael's key schedule. 2) Initial Round a) Add Round Key—each byte of the state is combined with the round key using bitwise XOR. 3) Rounds a) Sub Bytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. b)Shift Rows—A transposition step where each row of the state is shifted cyclically a certain number of steps. c) Mix Columns—a mixing operation which operates on the columns of the state, combining the four bytes in each column. d) Add Round Key 4) Final Round (no Mix Columns) a) Sub Bytes b) Shift Rows c) Add Round Key
  • 4. Secured Reversible Data Transmission By Using Gzip... 158 ||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com|| 2.5 Reversible Contrast Mapping (RCM) The Reversible Watermarking process adopts the Reversible Contrast Mapping (RCM) mechanism presented in [15] to embed the encrypted information ME within the watermarked image IW . The RCM algorithm was used since it is reported to provide high-capacity data embedding without the requirement of the transmission of any additional side information.The RCM algorithm considers x and y to be a pair of coefficients whose values [11] reside in the range [0; L]. The forward RCM algorithm transforms the pixel pairs according to x = 2x - y; y = 2y - x (2) In order to prevent overflow and underflow, the transformed pixel pairs are restricted within the range 0 ≤ x≤ L, 0 ≤ y ≤L (3) The original coefficients can be recovered using the following inverse transformation x= [(2/3) x+ (1/3) y], Y= [(1/3) x+ (2/3) y)] (4) Where [ ] is the ceil function. The RCM method substitutes the Least Significant Bit (LSB) of x and y. The LSB of x is set to 1 to indicate a transformed pair while 0 otherwise. The information bit b is then embedded within the LSB of y. More information about this method can be found in [15].The method proposed in [8], which is considered as the state of the art method, applies the RCM algorithm in the spatial domain. However, the RCM method cannot be applied in the spatial domain when considering compressed images since the embedded information will be distorted by the Quantization process of the image/video codec. It was further shown that the RCM method can modify the transformed coefficients prior entropy coding, thus mak-ing recovery of the original transform coefficients possible. However, the transform coefficients provide different levels of distortions, and therefore it is more desirable to embed the information within high frequency coefficients which provide the least distortion to the human vision system. Therefore, considering a P Q image, the Reversible Watermarking scans the blocks column-wise and grabs the first two neighbouring 4 4 transformed blocks. It embeds the first bit within the coordinate (3,3) which corresponds to the highest frequency coefficient. The remaining P 32 Q 1 bits are then stored within the coefficient with coordinates (3,3) of the remaining neighbour blocks. Once all the blocks have been used this process goes back to the first two neighbouring blocks and embeds the second P 32 Q bits within the coefficient coordinate (3,2). This process proceeds until either the whole bit stream is embedded or else when all the transform coefficients are used. It is important to notice that the RCM algorithm can be used to embed information more than once within the same coefficients. However, this will contribute to major distortions within the image. Therefore, the transform coefficients were only used once for embedding. The Reversible Watermarking process then outputs the image IRV C which is then entropy encoded and transmitted. 3. Information Extraction The Information Extraction process in-verts the computations performed by the Reversible Visible Watermark Embedding process. It receives the entropy coded information and decodes it to recover the image IRV W .The Reversible Data Extraction process then computes the inverse RCM function[13] to extract the encrypted message ME and the visible watermarked residual EW . The message ME is then decrypted and decoded to derive the message M. The message M contains the residual watermark within a Region of Interest together with additional information suitable to reconstruct the discrepancy image D. The im-ages D and EWC are then summed to generate EC. The Video Decoder then is able to recover the original compressed video sequence IC. 4. Simulation Result The proposed Reversible Visible Watermarking Scheme was implemented using the C++ programming language. The raw video sequences considered in these simulation results were encoded using a Common Intermediate Format (CIF) resolution at 30fps with a format IPPP using the Baseline Profile of H.264/AVC. The video was encoded using only the 4 4 transform size. The Quantization Parameter is set to a default of 20 unless otherwise specified. The logos employed in these experiments included some of the logos. TABLE I Performance Analysis of the Proposed Reversible Visible Watermarking Embedding Process
  • 5. Secured Reversible Data Transmission By Using Gzip... 159 ||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com|| TABLE I Performance Analysis of the Proposed Reversible Visible Watermarking Embedding Process Table I illustrates the performance of the proposed Re-versible Visible Watermarking Embedding mechanism. It can be clearly seen that the compression efficiency provided by the Lossless Encoder process is between 1.8 and 2.5. This compression efficiency is almost constant and thus not affected by the logo size. It can be further noticed that the larger the size of the logo to be embedded the lower is the quality of the Watermarked Video IW . This is quite intuitive since larger logos need to modify more DCT coefficients thus inevitably reducing the perceptual quality of the Watermarked Video.The proposed system was compared to the Yang method which was adapted for compressed video. As it can be seen from Fig. 2, the quality of the proposed method is superior to the method adopted in [8]. In fact, it can be seen that no matter how much information is reversible embedded the proposed system manages to recover the original quality for authenticated users. This is mainly due to the fact that the information is being embedded on the compressed transform coefficients. On the other hand, the performance of the state of the art approach degrades with increasing embedding information since the information is hidden within the spatial domain which is corrupted by the Quantization process. Fig. 3. Performance of the Yang method [8] and the proposed method at different number of embedded bits Fig. 4. Performance of the Yang [8] and the proposed method at different Quantization Parameters (a) Foreman (b) Paris Sequence Fig. 5. Subjective results when using the (a) method proposed by Yang [8] and the (b) Proposed method. QP was set to 30. The performance of the proposed scheme was further analysed using different Quantization Parameters. As Logo Width Height ME Size Comp. IW PSNR (Bytes) Ratio (dB) ATLSS 163 216 14408 2.4436 26.2887 DARPA 130 263 16461 2.0770 26.9543 Censcir 82 225 8747 2.1093 30.1921 Robotics 130 108 5623 2.4969 31.4413 CIT 82 225 8472 2.1778 31.7764 HCII 65 65 2253 1.8753 37.4408
  • 6. Secured Reversible Data Transmission By Using Gzip... 160 ||Issn||2250-3005|| (Online) ||March||2013|| ||www.ijceronline.com|| shown in Fig. 3, the proposed system clearly outperforms the method presented in [7] where PSNR gains of up to 7 dB were achieved. The superiority of the proposed method is more evident in Fig. 4 where it can be seen that the method proposed by Yang does not manage to extract the reversible information since it was corrupted by quantization errors induced by the lossy Video Encoder process. The quantization errors generally provide syntax and semantic violations in the De-Encryption and Lossless Decoding processes which are thus not able to recover the original embedded information. On the other hand the proposed method manages to recover the original compressed video when the user is authenticated. 5. Comments And Conclusion This paper has presented a secured data Transmission with Advanced Encryption Standard (AES) using novel reversible visible water-marking scheme for H.264/AVC encoded video. The proposed method computes the information required by the decoder to recover the original compressed video when receiving the watermarked video sequence. The additional information is reversibly embedded within the transform coefficients of the watermarked video. The authenticated users are then enabled to extract the information hidden within the transform coefficients to recover the original compressed image.The experimental results have shown the superiority of the proposed system where PSNR gains of up to 7 dB was registered relative to the state of the art approach. It was further shown that the information to be hidden can be compressed with compression efficiency between 1.8 and 2.5.And the distortion provided by the RCM method is reduced. Furthermore, watermark estimation functions can be employed in order to reduce the energy within the message D to be decoded. References [1] Reuben A.Farrugia ―Reversible Visibe Watermarking for H.264/AVC Encoded Video‖ IEEE Conference,May 2011 [2] A.Watson,‖Visually Optimal DCT Quantization Matrices for Individual Images‖, in Data Compression Conference, 1993. DCC ’93., 1993, pp. –187. [3] S.-K. Yip, O. Au, C.-W. Ho, and H.-M. Wong, ―Lossless Visible Water-Marking‖ , in Multimedia and Expo, 2006 IEEE International Conference on, 9-12 2006, pp. 853 –856 [4] Xiao Zeng, Zhen-YongChen, MingChen and Zhang Xiong,‖ Reversible Video Watermarking Using Motion Estimation and Prediction Error Expansion,‖journal of information science and engineering 27,465-479(2011) [5] R. A. Farrugia, ―A Reversible Visible Watermarking Scheme for Com-pressed Images‖, ‖, in MELECON 2010 - 2010 15th IEEE Mediterranean Electrotechnical Conference, , 26-28 2010, pp. 212 –217 [6] T. Wiegand, G. Sullivan, G. Bjontegaard, and A. Luthra, ―Overview of the H.264/AVC Video Coding Standard,‖ IEEE Transactions on, Vol. 13, no. 7, pp. 560 –576, July 2003 [7] S.P.Mohanty ,K.R.Ramakrishnan, and M.S. Kankanhalli,―A DCT Domain Visible Watermarking Technique for Images,‖ in Multimedia andExpo, 2000, IEEE International Conference on, NewYork, USA, pp. 1029–1032 [8] D. Coltuc and J.-M. Chassery, ―Very Fast Watermarking by Reversible Contrast Mapping,‖ Signal Processing Letters, IEEE, Vol. 14, no. 4, pp.255-258,April 2007 [9] A. Watson, ―Visually Optimal DCT Quantization Matrices for Individual Images‖, ,‖ in Data Compression Conference, 1993. DCC ’93, 1993, pp. 178–187 [10] Y.Yang, X. Sun, H. Yang, and C.-T. Li, , ―Removable Visible Image Watermarking Algorithm in the Discrete Cosine Transform Domain,‖ Expo, 2000. ICME 2000. 2000 IEEE International Conference on, New York, NY , USA, pp. 1029–1032 [11] A. Alattar, ―Reversible of a Generalized Integer Transform ,‖ Image Processing, IEEE Transactions on, Vol. 13,no.8,pp. 1147-1156,Aug.2004 [12] Y. Hu and B. Jeon, ―Reversible Visible Watermarking and Lossless Recovery of Visible Watermarking and Original Images,‖Circuits and Systems for Video Technology IEEE Transactions on,Vol.16,no.11,pp.1423-1429,Nov.2006 [13] Advanced Encryption Standard (AES), FIPS PUB Std.197,2001 [14] (2010)Thezlibwebsite.[Online].Available http://www.zlib.net/ [15] B.-B. Huang and S.-X. Tang, ―A Contrast-Sensitive Visible Water- MarkingScheme,‖IEEE MultiMedia,vol.13,no.2 pp. 60– 66, 2006.