Open Access   Article Go Back

Data-Hiding and Compression Schema Based on Image Inpainting

P.S.S. Akilashri1 , B. M .Kannan2

Section:Survey Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 243-245, Dec-2018

Online published on Dec 31, 2018

Copyright © P.S.S. Akilashri, B. M .Kannan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P.S.S. Akilashri, B. M .Kannan, “Data-Hiding and Compression Schema Based on Image Inpainting,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.243-245, 2018.

MLA Style Citation: P.S.S. Akilashri, B. M .Kannan "Data-Hiding and Compression Schema Based on Image Inpainting." International Journal of Computer Sciences and Engineering 06.11 (2018): 243-245.

APA Style Citation: P.S.S. Akilashri, B. M .Kannan, (2018). Data-Hiding and Compression Schema Based on Image Inpainting. International Journal of Computer Sciences and Engineering, 06(11), 243-245.

BibTex Style Citation:
@article{Akilashri_2018,
author = {P.S.S. Akilashri, B. M .Kannan},
title = {Data-Hiding and Compression Schema Based on Image Inpainting},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {243-245},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=579},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=579
TI - Data-Hiding and Compression Schema Based on Image Inpainting
T2 - International Journal of Computer Sciences and Engineering
AU - P.S.S. Akilashri, B. M .Kannan
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 243-245
IS - 11
VL - 06
SN - 2347-2693
ER -

           

Abstract

Digital images and videos are converted into the compressed forms for transmission. The compression and hiding the secret data in images is done because of a wide range of hackers. In order to overcome this, the messages are sent with the help of images. Many data hiding schemes have been found in the recent times with various compression techniques in digital images. Vector Quantization method help in error distortion and error diffusion which are a cause of progressive diffusion. The new idea is that one can side match vector quantization (SMVQ) and image inpainting. Data hiding and image compression can be integrated into a single module to sent the message. The receiver then finds the secret message using the image decompression technique through the index values in the segmented sections.

Key-Words / Index Term

Image Compression, Side Match Vector Quantization (SMVQ), Data Hiding, Image In Painting

References

[1] H. W. Tseng and C. C. Chang, “High capacity data hiding in JPEGcompressed images,” Informatica, vol. 15, no. 1, pp.127–142, 2004
[2] D. S. Taubman and M. W. Marcellin, JPEG2000: Image Compression Fundamentals Standards and Practice. Norwell, MA, USA: Kluwer, 2002.
[3] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Norwell, MA, USA: Kluwer, 1992.
[4] N. M. Nasrabadi and R. King, “Image coding using vector quantization: A review,” IEEE Trans. Commun., vol. 36, no. 8, pp. 957–971, Aug. 1988.
[5] Announcing the Advanced Encryption Standard (AES), National Institute of Standards & Technology, Gaithersburg, MD, USA, Nov. 2001.
[6] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun.ACM, vol. 21, no. 2, pp. 120–126, 1978.
[7] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062 –1078, Jul. 1999.
[8] C. D. Vleeschouwer, J. F. Delaigle, and B Macq, “Invisibility and application functionalities in perceptual watermarking: An overview,” Proc. IEEE, vol. 90, no. 1, pp. 64–77, Jan. 2002.
[9] C. C. Chang, T. S. Chen, and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification,” Inf. Sci., vol. 141, no. 1, pp. 123–138, 2002
[10] W. B. Pennebaker and J. L. Mitchell, The JPEG Still Image Data Compression Standard. New York, NY, USA: Reinhold, 1993