Data-Hiding and Compression Schema Based on Image Inpainting
P.S.S. Akilashri1 , B. M .Kannan2
Section:Survey Paper, Product Type: Journal Paper
Volume-06 ,
Issue-11 , Page no. 243-245, Dec-2018
Online published on Dec 31, 2018
Copyright © P.S.S. Akilashri, B. M .Kannan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: P.S.S. Akilashri, B. M .Kannan, “Data-Hiding and Compression Schema Based on Image Inpainting,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.243-245, 2018.
MLA Citation
MLA Style Citation: P.S.S. Akilashri, B. M .Kannan "Data-Hiding and Compression Schema Based on Image Inpainting." International Journal of Computer Sciences and Engineering 06.11 (2018): 243-245.
APA Citation
APA Style Citation: P.S.S. Akilashri, B. M .Kannan, (2018). Data-Hiding and Compression Schema Based on Image Inpainting. International Journal of Computer Sciences and Engineering, 06(11), 243-245.
BibTex Citation
BibTex Style Citation:
@article{Akilashri_2018,
author = {P.S.S. Akilashri, B. M .Kannan},
title = {Data-Hiding and Compression Schema Based on Image Inpainting},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {243-245},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=579},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=579
TI - Data-Hiding and Compression Schema Based on Image Inpainting
T2 - International Journal of Computer Sciences and Engineering
AU - P.S.S. Akilashri, B. M .Kannan
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 243-245
IS - 11
VL - 06
SN - 2347-2693
ER -




Abstract
Digital images and videos are converted into the compressed forms for transmission. The compression and hiding the secret data in images is done because of a wide range of hackers. In order to overcome this, the messages are sent with the help of images. Many data hiding schemes have been found in the recent times with various compression techniques in digital images. Vector Quantization method help in error distortion and error diffusion which are a cause of progressive diffusion. The new idea is that one can side match vector quantization (SMVQ) and image inpainting. Data hiding and image compression can be integrated into a single module to sent the message. The receiver then finds the secret message using the image decompression technique through the index values in the segmented sections.
Key-Words / Index Term
Image Compression, Side Match Vector Quantization (SMVQ), Data Hiding, Image In Painting
References
[1] H. W. Tseng and C. C. Chang, “High capacity data hiding in JPEGcompressed images,” Informatica, vol. 15, no. 1, pp.127–142, 2004
[2] D. S. Taubman and M. W. Marcellin, JPEG2000: Image Compression Fundamentals Standards and Practice. Norwell, MA, USA: Kluwer, 2002.
[3] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Norwell, MA, USA: Kluwer, 1992.
[4] N. M. Nasrabadi and R. King, “Image coding using vector quantization: A review,” IEEE Trans. Commun., vol. 36, no. 8, pp. 957–971, Aug. 1988.
[5] Announcing the Advanced Encryption Standard (AES), National Institute of Standards & Technology, Gaithersburg, MD, USA, Nov. 2001.
[6] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun.ACM, vol. 21, no. 2, pp. 120–126, 1978.
[7] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062 –1078, Jul. 1999.
[8] C. D. Vleeschouwer, J. F. Delaigle, and B Macq, “Invisibility and application functionalities in perceptual watermarking: An overview,” Proc. IEEE, vol. 90, no. 1, pp. 64–77, Jan. 2002.
[9] C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Inf. Sci., vol. 141, no. 1, pp. 123–138, 2002
[10] W. B. Pennebaker and J. L. Mitchell, The JPEG Still Image Data Compression Standard. New York, NY, USA: Reinhold, 1993