CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION

Size: px
Start display at page:

Download "CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION"

Transcription

1 CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION In the earlier part of the thesis different methods in the spatial domain and transform domain are studied This chapter deals with the techniques for hiding Information in the compressed domain. One of the most commonly studied image compression technique is Vector Quantization (VQ)[60], which is a lossy image compression technique based on the principle of block coding. VQ is a clustering technique & every cluster is represented by a codevector. It is widely used to compress grey-level images because of its low bit rate. The main concept of VQ is to utilize templates instead of blocks to do the image compression. These templates, also referred to as codewords or codevectors, are stored in a codebook, and the codebook is shared only between the sender and the receiver. Hence, the index value of the template is used to represent all the pixel values of the block so that data compression can be achieved. Such a mechanism is extremely easy to implement although the organization of the templates affects the quality of the compressed image. VQ compressed images can be used as cover objects to embed secret data. This is suitable for low bandwidth transmission channels because the amount of transmitted data is significantly reduced. VQ not only has faster encode/decode time and a simpler framework than JPEG/JPEG2000 but it also requires limited information during decoding and those advantages cost VQ a little low compression ratio and visual quality. Various clustering algorithms such as Linde-Buzo-Gray ()[64], Kekre s 172

2 Proportionate Error (KPE), Kekre s Median Codebook Generation (KMCG) and Kekre s Fast Codebook Generation (KFCG) have been implemented. Here media of hiding is image and secret data used is image or text message. 6.1 Vector Quantization for Information Hiding A variety of VQ techniques have been successfully applied in real applications such as speech and image coding [61, 62]. VQ works best in applications in which the decoder has only limited information and a fast execution time is required [63]. The key point to the design of a perfect VQ scheme is to generate a perfect codebook from the training images. The algorithm, proposed by Linde, Buzo and Gray in 1980 [64], gives a good solution and is probably the most famous codebook design algorithm. However, VQ still has its limitations. It usually generates visible boundaries between blocks since the current block is coded independently of its neighboring blocks. To deal with the above problem, side match vector quantization (SMVQ) was proposed by Kim in 1992 [65]. Kim successfully reduces the blocking effect by using local edge information and provides better visual quality and compression ratio than VQ does. Then, to make data hiding more convenient, some researchers have tried to hide secret data in cover images already compressed by VQ or SMVQ [66]. In [67], Lin et al. presented a method of embedding that was based on VQ compressed images. The approach involves reducing the size of the codebook and placing data in the remaining spaces of index values. A codebook is first partitioned into two sub-codebooks such that all pairs of the corresponding codevectors between subcodebooks are as similar as possible. Any modification of the least 173

3 significant bits of index values does not markedly distort the reconstructed image, because the two sub-codebooks have similar content. Accordingly, secret data can be placed into the LSB of all indices. In [68], Lu and Sun presented a similar method, but extended to partition the codebook into 2 k sub-codebooks for embedding k bits into a single index Vector Quantization VQ consists of three steps - Codebook design, Encoding and Decoding. VQ can be define as a mapping function that maps k- dimensional vector space to a finite set CB = {C 1,C 2,C 3,...,C N }.The set CB is called codebook consisting of N number of codevectors and each codevector C i = {c i1, c i2, c i3,, c ik } is of dimension k. The key to VQ is a good codebook. Codebook can be generated by clustering algorithms. The method most commonly used to generate codebook is the K-means algorithm [121,123]. The second step, as shown in Fig. 6.1 encoding requires searching codebook, here image is converted into blocks and the blocks are converted to vectors of dimension k. Each of these image vectors are searched for the nearest codevector in the codebook CB. Once the nearest codevector is obtained its index is sent to the receiver. At receiver decoding is done just by replacing the codevector corresponding to the index sent by the transmitter. Decoding phase is just a look up table technique. In Encoding phase image is divided into non overlapping blocks and each block then is converted to the training vector X i = (x i1, x i2,., x ik ). The codebook is then searched for the nearest codevector C min by computing squared Euclidian distance as 174

4 presented in equation 6.1 with vector X i with all the codevectors of the codebook CB. This method is called exhaustive search (ES). d(x i, C min ) = min 1 j N {d(x i,c j )} (6.1) where d(x i,c j ) = (X ip - C jp ) 2 Although the exhaustive search (ES) method gives the optimal result at the end, it involves heavy computational complexity. Observing the equation (6.1), it can be seen that to obtain one nearest codevector for training vector set; it requires N Euclidian distance computations where N is the size of the codebook. So for M image training vectors will require M x N number of Euclidian distance computations. It is obvious that if the codebook size is decreased the search time also decreases but at the cost of increased distortion and decreased accuracy. Figure 6.1: Block diagram of a basic VQ structure. 6.2 Codebook Generation Techniques In this section four Codebook Generation Techniques are studied Linde-Buzo-Gray () Algorithm The VQ design algorithm [64] is an iterative algorithm; the algorithm iteratively minimizes the total distortion by representing the training vectors by their corresponding codevectors. The algorithm requires an initial codebook C consist of initial codevector C 1. This codevector C 1 is obtained by taking the average of the 175

5 entire training sequence. The codevector is then split into two, by adding constant error in both positive and negative direction. The iterative algorithm is run with these two vectors as in initial codebook. The final two codevectors obtained are splitted into four and the process is repeated until the desired number of codevectors is obtained. The algorithm is summarized as. Let T= {X 1, X 2,, X M } be the training sequence consisting of M source vector. Assume that source vector is of length K, X m ={x m,1, x m,2, x m,k } for m=1, 2,., M Let N be the number of codevectors and let C = {c 1, c 2,, c N }, represents the codebook. Each codevector is k-dimensional, e.g., c n = (c n,1, c n,2,.., c n,k ), n= 1, 2,.. N Let e = (1,1,.,1) be an error vector of length k Let Q be the set of N clusters for N codevectors, i.e. Q(i) denotes the set of source vectors that forms the i th codevector (i.e. i th cluster) for i=1, 2,.., N let MSE be the set of mean square error of N clusters, i.e. MSE(i) denotes the mean square error of the i th cluster. 1. Given T. 2. Set N1=1 and Compute the initial codevector and mean square Error c 1 M 1 X m M m1 MSE(1) 1 Mk M m1 X m c

6 3. Assign C1 = C (i.e. all the elements of C={c 1, c 2,, c N } are copied to the elements of C1={c1 1, c1 2,, c1 N } respectively). Set j=1, Q1(1) = T and m=1 4. Splitting: For i=1, 2,, N1 c j = c1 i + e c j+1 = c1 i - e For v=1 to the number of source vector in Q1(i) compute the euclidean distance d1 between X v and c j and euclidean distance d2 between X v and c j+1 if d1< d2 then put X v in Q(m) else put put X v in Q(m+1) Compute codevectors c m and c m+1 by taking mean of all vectors in cluster Q(m) and Q(m+1) respectively. Also compute mean square error (i.e MSE(m) ) for cluster Q(m) using the following formula. MSE(m) 1 Zk z r1 x r c m 2 where Z is the total number of vectors in Q(m) and X r is the vector in the cluster Q(m) for r=1,2,., Z using the above equation compute the MSE(m+1) for the cluster Q(m+1) j=j+2,m=m+2 5. Compute the net mean square error, by taking the sum of products of the MSE(i) and the number of vectors in the cluster Q(i) for i=1,2,., N1 and divide this sum by Mk. 6. Set N1=2N1. if N1< N then Q1=Q and C1=C and go to step 4, else go to step Stop. Drawbacks of Algorithm algorithm uses constant error deviation for clustering thus the cluster elongation is +135 o to horizontal axis in two dimensional 177

7 cases. This results in inefficient clustering. Further in each iteration 2M Euclidean distances are computed (where M is the total number of training vectors) resulting in large computation time Kekre s Proportionate Error Algorithm (KPE) The drawback of algorithm is the cluster elongation is +135 o to horizontal axis in two dimensional cases. This results in inefficient clustering. To avoid the drawbacks, Kekre et al. [121,123] have suggested a new algorithm where instead of adding constant value, a proportionate error is added to the centroid in positive and negative direction in order to get initial two codevectors in codebook. The error ratio is decided by magnitude of coordinates of the centroid. Hereafter the procedure is same as that of. Steps for KPE Algorithm: Let T= {X 1, X 2,, X M } be the training sequence consisting of M source vector. Assume that source vector is of length K,.,X m ={x m,1, x m,2, x m,k } for m=1, 2,..., M. In this algorithm initial codevector is computed by taking the mean of all the training vectors X i for i=1, 2, M. Thus initially the codebook contains only one codevector. Then two vectors from the codevector are computed by adding proportionate error instead of adding constant. From the codevector proportions between the members of vector is calculated. Let k be the length of codevector. C={c 1, c 2,, c k } be the codevector, and E={e 1, e 2,., e k } be the error vector, c j = min{c i / i= 1,2,. k} where j is the index of the member of vector whose value is minimum among the vector members. Then assign e j = 1 and if c i / c j 10 then assign e i = c i / c j else assign e i = 10 for i j and i=1, 2,, k. 178

8 Two vectors v 1 and v 2 are formed by adding the error vector E to codevector C and by subtracting the error vector E from codevector C respectively. Euclidean distance between the all the training vectors X i with v 1 and with v 2 are computed, i.e. d 1 = v 1 -X i 2 and d 2 = v 2 -X i 2 for i=1,2,., M, if d 1 < d 2 then X i is put in cluster1 else X i is put in cluster2 and two clusters are created. From each cluster codevector is computed by taking the mean of all the vectors in the cluster. Thus the codebook size is increased to two. The above procedure is repeated for each of the codevector and that codebook size is increased to four. This procedure is repeated till the codebook size is increased to the size specified by the user or MSE is reduced to minimum permissible value. Drawbacks of KPE Algorithm In every iteration, 2M numbers of Euclidean distances are computed (where M is the total number of training vectors) Kekre s Median Codebook Generation (KMCG) The above two algorithms and KPE requires 2M Euclidean distance computations in every iteration hence are computational high and takes large time to generate codebook. In order to reduce the computational complexity of and KPE, every Euclidean computation is replaced by simple comparison. Hence KMCG [121,123] is fastest as compared to other codebook generation algorithms. In this algorithm image is divided in to blocks and blocks are converted to the vectors of size k. The equation

9 given below represents matrix T of size M x k consisting of M number of image training vectors of dimension k. x 1,1 x 1,2... x 1,k x 2,1 x 2,2... x 2,k T.... (6.2).... x M,1 x M,2... x M,k Each row of the matrix is the image training vector of dimension k. Steps for KMCG Algorithm: 1. Image is divided into the windows of size 2x2 pixels (each pixel consisting of red, green and blue components). 2. These are put in a row to get 12 values per vector. Collection of these vectors is a training set. 3. The training set is sorted with respect to first column. The Median of the first column is used to divide the training set in two parts and the median vector is put in the codebook. Set the codebook size equal to Further each part is then separately sorted with respect to second column to get two median values and these two median vectors are put into the codebook. Set the codebook size equal to The process of sorting is repeated till codebook of desire size is obtained. Here quick sort algorithm is used. This algorithm takes least time to generate codebook, since Euclidean distance computation is not required Kekre s Fast Codebook Generation (KFCG) The algorithm has the following drawbacks: 1. The algorithm heavily depends on calculation of Euclidean distance which requires multiplications and additions, which has a very high computational complexity. 180

10 2. Since ±1 error is added to generate two codevectors from a single vector. This tends to form the clusters which are in the two-dimensional case. Otherwise for higher dimensions, they are elongated which results in inefficient clustering. 3. In many cases the voids are generated leading to poor utilization of codebook. To avoid these drawbacks, a new algorithm has been suggested by Kekre et al. [121] where the multiplications are replaced by comparison and no addition of error is required to split the cluster in two parts. It has been observed that this algorithm is computationally less complex and takes less time as compared to. It also gives less MSE. The KFCG algorithm first calculates the average of the given cluster along the first dimension and then splits the cluster by keeping all the vectors which are less than or equal in one cluster and the remaining in another cluster. It then continues to split the resulting cluster by computing their average with respect to the next dimension. The process is repeated till the desired number of codevectors is obtained. The algorithm is summarized as follows. The algorithm reduces the codebook generation time since it avoids the Euclidean distance computations. Initially there is one cluster with the entire training vectors and the codevector C 1 which is centroid. In the first iteration of the algorithm, the clusters are formed by comparing first element of training vector with first element of code vector C 1. The vector X i is grouped into the cluster 1 if x i1 < c 11 otherwise vector X i is grouped into cluster 2. In second iteration, the cluster 1 is split into two by comparing second element x i2 of vector X i belonging to cluster 1 with that of the element c 12 of the codevector C 1. Cluster 2 is split into two by 181

11 comparing the element x i2 of vector X i belonging to cluster 2 with that of the element c 22 of the codevector C 2. This procedure is repeated till the codebook size is reached to the size specified by user. It is observed that this algorithm gives minimum error and requires least time to generate codebook as compared to and KPE. Steps for KFCG Algorithm: Let T= {X 1, X 2,, X M } be the training sequence consisting of M source vector. Assume that source vector is of length K X m = {x m,1, x m,2, x m,k } for m=1,2,., M. Let N be the number of codevectors and let C = {c 1, c 2,, c N },represents the codebook. Each codevector is k dimensional, e.g., c n = (c n,1, c n,2,, c n,k ), n= 1, 2,, N. Let Q be the set of N clusters for N codevectors, i.e Q(i) denotes the set of source vectors that forms the i th codevector for i=1, 2,.., N let MSE be the set of mean square error of N clusters i.e. MSE(i) denotes the mean square error of the i th cluster 1. Given T 2. Set N1=1 and Compute the initial codevector and mean squared error c 1 M 1 X m M m1 MSE(1) 1 Mk M m1 X m c Set i=1,m=1, Q1(1)=T 4. For n=1 to N1 182

12 Begin For j=1 to number of vectors in Q1(n) Begin Compare x j,i with c n,i if x j,i c n,i then put X j in Q(m) else put X j in Q(m+1) End Compute codevectors c m and c m+1 by taking mean of all vectors in set Q(m) and Q(m+1) respectively. Compute mean square error (i.e MSE(m) ) for cluster Q(m) using the following formula. MSE(m) 1 Zk z r1 x r c m 2 where Z is the total number of vectors in Q(m) and X r is the vector in the cluster Q(m) for r=1,2,., Z using the above equation compute the MSE(m+1) for the cluster Q(m+1) set m=2m+1 End 5. Compute the net mean square error by taking the sum of products of the MSE(i) and the number of vectors in the cluster Q(i) for i=1,2,., N1 and divide this sum by Mk. N1=2N1 Q1=Q 6. Set m=1, i=i+1; if i==k, then i=1 go to step 4 till codebook size increases to N., i.e N1==N This algorithm gives minimum error as compared to, KPE, and KMCG and also least time to generate codebook as compared to and KPE algorithm [119]. 183

13 6.3 Existing Approaches for Information Hiding In this section the existing method for Information Hiding is discussed Best pair first capacity algorithm Information hiding using the existing Best pair first capacity algorithm [158] gives a PSNR value of 29.09(db) for hiding bits using VQ which they claim to be more than (db) which is obtained by Jo et al. s [159] approach. The cover size used is 512 X 512 gray scale images. 6.4 Proposed Approaches for Information Hiding To improve the hiding capacity,using a cover size which is 0.75% of the cover size considered in [158] and [159], four new algorithms for information hiding in compressed domain using Vector Quantization are introduced which are listed below 1 Information Hiding in Vector Quantized Codebook. [71,76] 2 Information Hiding using Mixed Codebooks of Vector Quantization[69, 72, 85] 3 Information Hiding using Dictionary sort on vector quantized codebook [115] 4 Information Hiding based on size of cluster Information Hiding in Vector Quantized Codebook In [71, 76] this approach, the secret data is hidden inside codebook generated using various codebook generation algorithm such as [64], KPE [119], KMCG [121], KFCG [119,121]. There are various ways of hiding: 1 bit, 2 bits, 3 bits, 4 bits & variable bits hiding. 184

14 Here Information hidden in either 1 bit, 2 bits, 3 bits 4 bits or variable LSB s bits in the elements of codebook vector of the cover image. For embedding variable bits, KMLA method discussed in section 4.2 of chapter 4 is used. Here the intensity value of codebook vector element is checked, and depending upon the magnitude of the intensity, the number of bits to be embedded is decided Embedding and Recovery Procedure Divide the image into 2 2 block of pixel window Generate initial cluster of training set using the rows of 12 values per pixel window Apply codebook generation algorithm /KPE/KFCG/KMCG on initial cluster to obtain codebook of size 2048 codevector Embed every bit of each pixel of secret data in the LSB s of (i.e. 1, 2, 3, 4, variable bit method) each element of codevector belonging to CB Modified CB Generate Index based cover image Figure 6.2(a) Embedding Procedure of Information Hiding in Vector Quantized Codebook 185

15 Recovery Modified CB Index based cover image Extract secret data from LSB of every element of CB Reconstruct the original image by replacing each index by corresponding codevector Figure 6.2(b) Recovery Procedure of Information Hiding in Vector Quantized Codebook Experimental Results: Table 6.1 shows the average values for all covers and messages for 1,2,3,4 and variable bits for all 4 Codebook generation techniques. Table 6.1 Average values of PSNR, MSE and AFCPV using 1 bit, 2, 3, 4, and variable bits for Information hiding in Vector Quantized codebook method on, KPE, KMCG and KFCG codebook is of size 2048 Algorithm PSNR MSE AFCPV KPE BIT KMCG KFCG KPE BIT2 KMCG KFCG KPE BIT KMCG KFCG KPE BIT KMCG KFCG KPE VAR BIT KMCG KFCG Remark: It is observed that KFCG performs better than, KPE and KMCG considering MSE, PSNR and AFCPV. 186

16 Figure 6.3 shows the results for cover image Lioness and secret image work logo. ORIGINAL COVER SECRET MESSAGE 1 bit 2 Bits 3 Bits 4 Bits Variable Bits MSE = MSE = MSE = MSE = MSE = KPE MSE = MSE = MSE = MSE = MSE = KMCG MSE = MSE = MSE = MSE = MSE = KFCG MSE = MSE = MSE = MSE = MSE = Figure 6.3 Original Image, Secret image and Reconstructed images of Stego Codebook.with their MSE values. Secret Image retrieval has a 100% Accuracy, so is not shown here. Remark: It is observed that Stego is similar to the original image using any of the four codebook generation algorithms. Table 6.2 shows the hiding capacity for all covers and messages for 1,2,3,4 and variable bits for all 4 Codebook generation techniques Figure 6.4, 6.5, 6.6 and 6.7 show the hiding capacity, PSNR, MSE 187

17 and AFCPV for all 4 algorithms and 1,2,3,4 and variable bit hiding method. Table 6.2 Hiding Capacity in bits using 1 bit, 2 bits, 3 bits, 4 bits, and variable bits method on, KPE, KMCG and KFCG codebook of size 2048 Cover Images Hiding Capacity in bits 1 bit 2 bit 3 bit 4 bit Variable bits KPE KMCG KFCG Remark: It is observed that KMCG gives highest hiding capacity among, KPE, KMCG and KFCG for variable bit hiding, and is closer to 2 bit hiding method HIDING CAPACITY BIT 2 BIT 3 BIT 4 BIT VAR KPE KMCG KFCG Figure 6.4 Average values of Hiding Capacity in bits considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques Remark: It is observed that the KMCG has the highest hiding capacity.amongst the 4 codebook generation techniques used. 188

18 PSNR KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.5 Average values of PSNR considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques MSE KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.6 Average values of MSE considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques 189

19 AFCPV KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.7 Average values of AFCPV considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques Remark: It is observed that KFCG gives best performance among all the four CB generation techniques considering PSNR, MSE and AFCPV Information Hiding using Mixed Codebooks of Vector Quantization In VQ, as the size of codebook is increased, reconstructed image is very less distorted. Instead of using all codevectors of cobebook of a image, some codevectors are randomly selected and replaced by codevectors of codebook of other image, resulting in combined codebook. Random numbers are generated using shuffle algorithm. Shuffling is a procedure used to randomize a deck of playing cards to provide an element of chance in card games. In a computer, shuffling is equivalent to generating a random permutation of the cards. There are two basic algorithms for doing this, both popularized by Donald Knuth [116]. The first is simply to assign a random number to each card, and then to sort the cards in order of their random numbers. This will generate a random permutation, unless any of the random numbers generated are the same as any others (i.e. pairs, triplets etc). This 190

20 can be eliminated either assigning new random numbers to these cases, or reduced to an arbitrarily low probability by choosing a sufficiently wide range of random number choices. The second, generally known as the Knuth shuffle or Fisher Yates shuffle [116] is a linear-time algorithm which involves moving through the pack from top to bottom, swapping each card in turn with another card from a random position in the part of the pack that has not yet been passed through (including itself). Providing that the random numbers are unbiased, this will always generate a random permutation. Here [34-36], Codebook of size N/2 is generated for cover image as well as secret image using codebook generation algorithm. Then the two codebooks are merged to get mixed codebook of size N using shuffle algorithm which generates unique random numbers starting from 0 to N-1. If N is power of 2 then all odd numbers are relatively prime to N.Therefore d can be any odd number from 0 to N-1. The mixed codebook & distance d is used during retrieval of the secret message in order to reconstruct the secret image by separating the codebook which are in a mixed state due to shuffle algorithm, into individual codebooks by generating unique random number upto N using distance d. For secret messages which are text files, the Entire message is converted to codebook of size 256x12, which means first 12 characters form the 1 st row of the codebook, next 12 character become the 2 nd row of the codebook and so on. Then the proposed algorithm is used to hide the message codebook in the cover image codebook. 191

21 To improve the secrecy of text message every byte of text message is EX-ORed with a key. The text message is extracted by EX-ORing with same key. For a codebook of size M X N, P secret characters can be embedded, where P = M * N Shuffle algorithm 1. Select a distance d which is relatively prime to N. 2. Start generating the random number starting from 0. Numbers generated are 0, d, 2d, 3d and so on. 3. If number generated is > N then subtract N from it and add d to the remainder as the next random value. Go on adding d to previous value to get the next value. 4. The algorithm stops when the cover image codebook size is reached. Remaining indices are assigned to the secret message Experimental Results In the proposed approach, codebooks of cover image & secret message are combined to get mix codebook, so hiding capacity is more than 100%. Here codebooks of size 256 X 12 are generated for Cover as well as Secret image, which are of size 256 X 256 X3. These are combined using shuffle algorithm to form codebook of size 512 X 12. Figure 6.8 (a) shows the original (cover/.secret) image and Figure 6.8 (b) shows the reconstructed (cover/ secret) image. Here since codebook is created for secret message also, and since VQ is a lossy compression technique, error arising due to VQ is present in the reconstructed secret message, which is imperceptible. 192

22 Figure 6.8 (a) Original Cover Image/ Secret Image, MSE = KPE, MSE= KMCG, MSE = KFCG, MSE = Figure 6.8(b) Reconstructed images from mixed codebooks Table 6.3 Average values of PSNR, MSE and AFCPV using mixed codebook method using, KPE, KMCG and KFCG. (codebook is of size 512 X 12) Cover image/secret KPE KMCG KFCG image PSNR MSE PSNR MSE PSNR MSE PSNR MSE Img1(White Peacock) Img2(White Lioness) Img3(White Pigeons) Img4(Pussy Cat) Img5(Two roses) Img6(Pink flowers) Img7(Waterfall)) Img8(Colors) Img9(1Flower) Img10(Purple Flowers) Average Remark: It is observed that values of KFCG are better than the rest and minimum MSE is for Colors image which is a smooth image. P S N R C Average PSNR for Message For Mixed CodeBook Algorithm P S N R C Average MSE for Message For Mixed CodeBook Algorithm PSNR MSG 1 - MSG 10 OF SIZE 256 X 256 MSE MSG 1 - MSG 10 OF SIZE 256 X256 Figure 6.9 (a) Figure 6.9 (b) Figure 6.9 (a) and Figure 6.9 (b) Average PSNR and MSE for all 10 reconstructed messages for all 4 codebook generation techniques using with mixed codebook generation method Remark: It is observed that although the average MSE value is about 80, the error is imperceptible using any of the codebook generation technique with using mixed codebook method for Information Hiding. Only Vector Quantization error is present which is imperceptible as can be seen from Figure 6.8 (b) 193

23 In codebooks of cover image, codevectors of secret message are embedded at random positions. This approach improves secrecy of embedded image, since codebooks of cover image and secret message are combined. While reconstructing the image there is only quantization error. The advantage of this method is secret message can be larger than cover image, which gives more than 100 % hiding capacity. Also it is not necessary that the codebook of Cover and Message be created by the same codebook generation technique Steganography using Dictionary sort on vector quantized codebook This [115] approach is similar to Information Hiding using VQ. Here the secret information is hidden into the codebooks which are generated using various codebook generation algorithms such as [64], KPE [119, 123], KMCG [119,123], KFCG [119, 123, 125]. The only difference is, here after hiding secret data in a codebook, it is sorted and stego-image is reconstructed. Here again 1 bit, 2 bits, 3 bits, 4 bits and variable bit hiding approaches are used Encoding and Decoding The encoding is done as follows: 1 Divide the image into 2 2 non-overlapping blocks of pixels. 2 Generate initial cluster of training set using the rows of 12 values per pixel window. 3 Apply codebook generation algorithm /KPE/KFCG/KMCG on initial cluster to obtain codebook of size 2048 codevectors. 4 Perform dictionary sort on CB. 5 Hide data into sorted CB. 6 Add stego index position column in Stego CB. 7 Sort the stego CB. 8 From sorted CB reconstruct the image to form Stego image. 194

24 The decoding is done as follows: 1 Retrieval of secret message is done using the Stego Image and Stego index position column. 2 Stego image is divided into blocks generating training vectors. Collection of unique training vector is nothing but CB. 3 The entries of codebook are arranged using Stego index position column. 4 The secret data is extracted to get back the secret message Experimental Results Table 6.4 shows the average values of PSNR, MSE and AFCPV for all cover and secret images using Dictionary sort method with all the four CB generation methods. Table 6.4 Average values of PSNR, MSE and AFCPV using 1 bit, 2, 3, 4, and variable bits for Information Hiding using Dictionary sort method on, KPE, KMCG and KFCG codebook is of size 2048 Algorithm PSNR MSE AFCPV KPE BIT KMCG KFCG KPE BIT2 KMCG KFCG KPE BIT KMCG KFCG KPE BIT KMCG KFCG KPE VAR BIT KMCG KFCG Remark : It is observed that KPE performs better than other Codebook generation algorithms for Dictionary sort method for information hiding. 195

25 Figure 6.10 shows the Stego images with the secret message hidden in it. ORIGINAL COVER SECRET MESSAGE 1bit 2 Bits 3 Bits 4 Bits Variable Bits MSE = 29.2 MSE = MSE = MSE = MSE = KPE MSE = MSE = MSE = MSE = MSE = KMCG MSE = 74.8 MSE = MSE = MSE = MSE = KFCG MSE = MSE = MSE = MSE = MSE = Figure 6.10 Stego images for 1,2,3,4 and Variable bit method using dictionary sort and using, KPE, KMCG and KFCG codebook generation techniques (codebook size = 512) Remark: It is observed that Stego is similar to the original image using any of the four codebook generation algorithms. Figure 6.11 to Figure 6.13 show the PSNR, MSE, AFCPV for all four codebook generation techniques for hiding information using dictionary sort method. Figure 6.14 show the Hiding capacity for, KPE, KMCG and KFCG for dictionary sort method using Vector quantization. 196

26 PSNR KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.11 Average values of PSNR considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques MSE KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.12 Average values of MSE considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques AFCPV KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.13 Average values of AFCPV considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques 197

27 BIT 2 BIT 3 BIT 4 BIT VAR HIDING CAPACITY KPE KMCG KFCG Figure 6.14 Average values of Hiding Capacity considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques Remark: The Hiding capacity for KMCG is maximum among all four codebook generation techniques.as is seen in Figure 6.14 for variable bit hiding Information Hiding based on Size of cluster A vector quantizer maps k-dimensional vectors in the vector space R k into a finite set of vectors Y = {y i : i = 1, 2,..., N}. Each vector y i is called a code vector or a codeword and the set of all the codewords is called a codebook. In this proposed approach, codebooks of cover image and secret message are combined based on number of training vectors in the cluster of the cover image. Here KMCG algorithm is not used for generation of codebook since size of all cluster is same The Proposed Algorithm 1. Generate codebook of size 512 X 12 for cover image. 2. Generate codebook of size 256 X 12 for secret message. 3. Arrange the codevectors of codebooks of Cover in ascending order of number of code vectors in the cluster represented by codevector. 4. Replace the codevectors of coverimages by codevectors of secret message in such a way that codevector representing 198

28 less number of training vectors belonging to codebook of cover image are replaced by secret image codevectors,.so that the combined codebook of 512 X 12 size contains 256 X 12 codevectors belonging to the secret image. and the remaining to the cover image. 5. Combined Codebook of size 512 and index list of replaced codevectors is stored which is used during the reconstruction of the Secret message during retrieval Experimental Results Table 6.5 shows the result.using average values of PSNR, MSE and AFCPV for information hiding based on cluster size method. Table 6.5 Average values of PSNR, MSE and AFCPV using Information hiding based on cluster size using, KPE, and KFCG. (codebook is of size 512 X 12) Cover image/secret image KPE KFCG PSNR MSE PSNR MSE PSNR MSE Img1(White Peacock) Img2(White Lioness) Img3(White Pigeons) Img4(Pussy Cat) Img5(Two roses) Img6(Pink flowers) Img7(Waterfall)) Img8(Colors) Img9(1Flower) Img10(Purple Flowers) Average Remark: It is observed that KFCG performs better among, KPE and KFCG.It is also seen that for each algorithm independently Img3, Img4 Img8 and Img9 which are images where large clusters may get formed have better performance than others Figure 6.15 shows original cover image (img6) and the corresponding stego images reconstructed from codebooks generated using, KPE and KFCG algorithms. 199

29 Original Cover KPE KFCG Image Img6 MSE = MSE = MSE = Figure 6.15 Image results for reconstructed stego images using, KPE and KFCG for information hiding based on cluster size using Vector Quantization Remark : It is observed that reconstructed Stego is better using KFCG than using or KPE, although the MSE value is high. This has been tested consulting 10 people. P S N R C Average MSE for Message P S N R C Average PSNR for Message For Mixed CodeBook Algorithm MSE MSG 1 - MSG 10 OF SIZE 256 X256 PSNR MSG 1 - MSG 10 OF SIZE 256 X 256 Figure 6.16 Average values of MSE for information hiding using cluster based approach for, KPE and KFCG Figure 6.17 Average values of PSNR for information hiding using cluster based approach for, KPE and KFCG Remark: It is observed that KFCG performs better than and KPE. 6.5 Discussion: In this chapter four new methods of Information hiding in compressed domain using Vector Quantization are proposed. They are 1. Information Hiding using Vector Quantized Codebook 2. Information Hiding in mixed codebooks using shuffle algorithm 3. Information hiding using Dictionary Sort method 4. Information hiding based upon cluster size. 200

30 In the first method in which Information is hidden in a Vector Quantized codebook, 4 Codebook generation algorithms are used namely, KPE, KMCG and KFCG. Codebooks of cover images are generated using these algorithms and secret message bits are hidden. It is observed that KFCG performs better considering MSE, PSNR and AFCPV, whereas KMCG has highest hiding capacity out of, KPE, KMCG and KFCG. In the second method Information is hidden using shuffle algorithm. Here Codebooks of Cover as well as Secret image are generated and they are mixed using shuffle algorithm. Since hiding of information is nothing but mixing of the codebooks in a shuffled manner; it can give a hiding capacity of more than 100%. It is not necessary that the codebooks for Cover and Secret image be generated using the same codebook generation technique. Here since codebook is generated for secret message as well, VQ error is present in the retrieved Secret message and therefore it is advisable to use KFCG which has the least error among the four codebook generation techniques studied. In the third method information hiding is done using dictionary sort method, four codebook generation algorithms are used. They are, KPE, KMCG and KFCG. Here also similar to the first algorithm 1, 2, 3, 4 and variable bit method is used. The only difference is here after hiding secret data in a codebook, it is sorted and stegoimage is reconstructed. It is observed that KPE performs better than other algorithms considering MSE, PSNR. Regarding Hiding capacity KMCG gives maximum hiding capacity. In the fourth method which is based on the size of cluster. The clusters of the cover which are smaller that is which have less 201

31 number of codevectors are being replaced by the secret message codevectors. This is because they have a less contribution in the stego image and therefore if replaced by secret image codevector will not affect the quality much. Here for generation of codebook of cover KMCG is not used, since cluster formation in case of KMCG is of the same size. However, for codebook of secret image any of the four codebook generation techniques can be used. It is observed that for this method KFCG performs better. 202

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 89 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 778 784 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) Color Image Compression

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Feature-Guided K-Means Algorithm for Optimal Image Vector

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Compression of Image Using VHDL Simulation

Compression of Image Using VHDL Simulation Compression of Image Using VHDL Simulation 1) Prof. S. S. Mungona (Assistant Professor, Sipna COET, Amravati). 2) Vishal V. Rathi, Abstract : Maintenance of all essential information without any deletion

More information

Multilevel Compression Scheme using Vector Quantization for Image Compression

Multilevel Compression Scheme using Vector Quantization for Image Compression Multilevel Compression Scheme using Vector Quantization for Image Compression S.Vimala, B.Abidha, and P.Uma Abstract In this paper, we have proposed a multi level compression scheme, in which the initial

More information

Joint Image Classification and Compression Using Hierarchical Table-Lookup Vector Quantization

Joint Image Classification and Compression Using Hierarchical Table-Lookup Vector Quantization Joint Image Classification and Compression Using Hierarchical Table-Lookup Vector Quantization Navin Chadda, Keren Perlmuter and Robert M. Gray Information Systems Laboratory Stanford University CA-934305

More information

A Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization

A Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization Computer Science and Engineering. 0; (): -7 DOI: 0. 593/j.computer.000.0 A Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization B. Janet *, A. V. Reddy Dept.

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

KeyWords: Image Compression, LBG, ENN, BPNN, FBP.

KeyWords: Image Compression, LBG, ENN, BPNN, FBP. Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Image Compression

More information

A Review on LBG Algorithm for Image Compression

A Review on LBG Algorithm for Image Compression A Review on LBG Algorithm for Image Compression Ms. Asmita A.Bardekar #1, Mr. P.A.Tijare #2 # CSE Department, SGBA University, Amravati. Sipna s College of Engineering and Technology, In front of Nemani

More information

Comparative Study on VQ with Simple GA and Ordain GA

Comparative Study on VQ with Simple GA and Ordain GA Proceedings of the 9th WSEAS International Conference on Automatic Control, Modeling & Simulation, Istanbul, Turkey, May 27-29, 2007 204 Comparative Study on VQ with Simple GA and Ordain GA SADAF SAJJAD

More information

Adaptive data hiding based on VQ compressed images

Adaptive data hiding based on VQ compressed images Adaptive data hiding based on VQ compressed images W.-C. Du and W.-J. Hsu Vision, Image and Signal Processing, IEE Proceedings 22 Aug. 2003 Volume: 150, Issue: 4 Page(s): 233-238 Presented by Benjamin

More information

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) 5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1

More information

Voronoi Region. K-means method for Signal Compression: Vector Quantization. Compression Formula 11/20/2013

Voronoi Region. K-means method for Signal Compression: Vector Quantization. Compression Formula 11/20/2013 Voronoi Region K-means method for Signal Compression: Vector Quantization Blocks of signals: A sequence of audio. A block of image pixels. Formally: vector example: (0.2, 0.3, 0.5, 0.1) A vector quantizer

More information

Image Compression with Competitive Networks and Pre-fixed Prototypes*

Image Compression with Competitive Networks and Pre-fixed Prototypes* Image Compression with Competitive Networks and Pre-fixed Prototypes* Enrique Merida-Casermeiro^, Domingo Lopez-Rodriguez^, and Juan M. Ortiz-de-Lazcano-Lobato^ ^ Department of Applied Mathematics, University

More information

Image Compression Using SOFM

Image Compression Using SOFM Image Compression Using SOFM Ankit Aggarwal (03d05009) Anshu Agrawal (03005006) November 12, 2006 Why Image Compression? Application of data compression on digital images. Computer images are extremely

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

Optimization of Bit Rate in Medical Image Compression

Optimization of Bit Rate in Medical Image Compression Optimization of Bit Rate in Medical Image Compression Dr.J.Subash Chandra Bose 1, Mrs.Yamini.J 2, P.Pushparaj 3, P.Naveenkumar 4, Arunkumar.M 5, J.Vinothkumar 6 Professor and Head, Department of CSE, Professional

More information

CHAPTER 4 SEMANTIC REGION-BASED IMAGE RETRIEVAL (SRBIR)

CHAPTER 4 SEMANTIC REGION-BASED IMAGE RETRIEVAL (SRBIR) 63 CHAPTER 4 SEMANTIC REGION-BASED IMAGE RETRIEVAL (SRBIR) 4.1 INTRODUCTION The Semantic Region Based Image Retrieval (SRBIR) system automatically segments the dominant foreground region and retrieves

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems

Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Di Zhong a, Shih-Fu Chang a, John R. Smith b a Department of Electrical Engineering, Columbia University, NY,

More information

LOSSY COLOR IMAGE COMPRESSION BASED ON QUANTIZATION

LOSSY COLOR IMAGE COMPRESSION BASED ON QUANTIZATION LOSSY COLOR IMAGE COMPRESSION BASED ON QUANTIZATION by Hiba Shahid A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED SCIENCE The Faculty of Graduate and

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

Binary vector quantizer design using soft centroids

Binary vector quantizer design using soft centroids Signal Processing: Image Communication 14 (1999) 677}681 Binary vector quantizer design using soft centroids Pasi FraK nti *, Timo Kaukoranta Department of Computer Science, University of Joensuu, P.O.

More information

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Informatica 29 (2005) 335 341 335 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Hsien-Wen Tseng Department of Information Management Chaoyang University of Technology

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation

More information

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

Efficient Image Steganography Using Integer Wavelet Transform

Efficient Image Steganography Using Integer Wavelet Transform Efficient Image Steganography Using Integer Wavelet Transform DHIVYA DHARSHINI. K 1, Dr. K. ANUSDHA 2 1 M.Tech, Department of Electronics Engineering, Pondicherry University, Puducherry, India. 2 Assistant

More information

AN EFFICIENT CODEBOOK INITIALIZATION APPROACH FOR LBG ALGORITHM

AN EFFICIENT CODEBOOK INITIALIZATION APPROACH FOR LBG ALGORITHM AN EFFICIENT CODEBOOK INITIALIZATION APPROACH FOR ALGORITHM Arup Kumar Pal 1 and Anup Sar 2 1 Department of Computer Science and Engineering, NIT Jamshedpur, India arupkrpal@gmail.com 2 Department of Electronics

More information

Today. Lecture 4: Last time. The EM algorithm. We examine clustering in a little more detail; we went over it a somewhat quickly last time

Today. Lecture 4: Last time. The EM algorithm. We examine clustering in a little more detail; we went over it a somewhat quickly last time Today Lecture 4: We examine clustering in a little more detail; we went over it a somewhat quickly last time The CAD data will return and give us an opportunity to work with curves (!) We then examine

More information

THREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION

THREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION THREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION Hui Ting Teo and Mohd Fadzli bin Mohd Salleh School of Electrical and Electronic Engineering Universiti Sains Malaysia,

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

Module 8: Video Coding Basics Lecture 42: Sub-band coding, Second generation coding, 3D coding. The Lecture Contains: Performance Measures

Module 8: Video Coding Basics Lecture 42: Sub-band coding, Second generation coding, 3D coding. The Lecture Contains: Performance Measures The Lecture Contains: Performance Measures file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2042/42_1.htm[12/31/2015 11:57:52 AM] 3) Subband Coding It

More information

New Clustering Algorithm for Vector Quantization using Rotation of Error Vector

New Clustering Algorithm for Vector Quantization using Rotation of Error Vector New Clustering Algorithm for Vector Quantization using Rotation of Error Vector Dr. H. B. Kekre Computer Engineering Mukesh Patel School of Technology Management and Engineering, NMIMS University, Vileparle(w)

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring

1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring 1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring Shuai Yue 1, Zhi-Hui Wang 2, and Chin-Chen Chang 3 1 Department of Software, Dalian University of Technology, DaLian, China,

More information

A LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION

A LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION A LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION Ming-Hwa Sheu, Sh-Chi Tsai and Ming-Der Shieh Dept. of Electronic Eng., National Yunlin Univ. of Science and Technology, Yunlin,

More information

Reversible Data Hiding VIA Optimal Code for Image

Reversible Data Hiding VIA Optimal Code for Image Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering

More information

Module 7 VIDEO CODING AND MOTION ESTIMATION

Module 7 VIDEO CODING AND MOTION ESTIMATION Module 7 VIDEO CODING AND MOTION ESTIMATION Version ECE IIT, Kharagpur Lesson Block based motion estimation algorithms Version ECE IIT, Kharagpur Lesson Objectives At the end of this less, the students

More information

5.7. Fractal compression Overview

5.7. Fractal compression Overview 5.7. Fractal compression Overview 1. Introduction 2. Principles 3. Encoding 4. Decoding 5. Example 6. Evaluation 7. Comparison 8. Literature References 1 Introduction (1) - General Use of self-similarities

More information

The Steganography In Inactive Frames Of Voip

The Steganography In Inactive Frames Of Voip The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1

More information

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

More information

1 Case study of SVM (Rob)

1 Case study of SVM (Rob) DRAFT a final version will be posted shortly COS 424: Interacting with Data Lecturer: Rob Schapire and David Blei Lecture # 8 Scribe: Indraneel Mukherjee March 1, 2007 In the previous lecture we saw how

More information

Robust Lossless Data Hiding. Outline

Robust Lossless Data Hiding. Outline Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust

More information

Watermarking Moble Phone Color Images With Error Correction Codes

Watermarking Moble Phone Color Images With Error Correction Codes IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes

More information

ERROR VECTOR ROTATION USING KEKRE TRANSFORM FOR EFFICIENT CLUSTERING IN VECTOR QUANTIZATION

ERROR VECTOR ROTATION USING KEKRE TRANSFORM FOR EFFICIENT CLUSTERING IN VECTOR QUANTIZATION ERROR VECTOR ROTATION USING KEKRE TRANSFORM FOR EFFICIENT CLUSTERING IN VECTOR QUANTIZATION H. B. Kekre, Tanuja K. Sarode 2 and Jagruti K. Save 3 Professor, Mukesh Patel School of Technology Management

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Non-Parametric Vector Quantization Algorithm

Non-Parametric Vector Quantization Algorithm Non-Parametric Vector Quantization Algorithm 31 Non-Parametric Vector Quantization Algorithm Haemwaan Sivaraks and Athasit Surarerks, Non-members ABSTRACT Recently researches in vector quantization domain

More information

Statistical Image Compression using Fast Fourier Coefficients

Statistical Image Compression using Fast Fourier Coefficients Statistical Image Compression using Fast Fourier Coefficients M. Kanaka Reddy Research Scholar Dept.of Statistics Osmania University Hyderabad-500007 V. V. Haragopal Professor Dept.of Statistics Osmania

More information

CSEP 521 Applied Algorithms Spring Lossy Image Compression

CSEP 521 Applied Algorithms Spring Lossy Image Compression CSEP 521 Applied Algorithms Spring 2005 Lossy Image Compression Lossy Image Compression Methods Scalar quantization (SQ). Vector quantization (VQ). DCT Compression JPEG Wavelet Compression SPIHT UWIC (University

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

CHAPTER-6 WATERMARKING OF JPEG IMAGES

CHAPTER-6 WATERMARKING OF JPEG IMAGES CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by

More information

Iterative split-and-merge algorithm for VQ codebook generation published in Optical Engineering, 37 (10), pp , October 1998

Iterative split-and-merge algorithm for VQ codebook generation published in Optical Engineering, 37 (10), pp , October 1998 Iterative split-and-merge algorithm for VQ codebook generation published in Optical Engineering, 37 (10), pp. 2726-2732, October 1998 Timo Kaukoranta 1, Pasi Fränti 2 and Olli Nevalainen 1 1 Turku Centre

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

CHAPTER-6 WEB USAGE MINING USING CLUSTERING

CHAPTER-6 WEB USAGE MINING USING CLUSTERING CHAPTER-6 WEB USAGE MINING USING CLUSTERING 6.1 Related work in Clustering Technique 6.2 Quantifiable Analysis of Distance Measurement Techniques 6.3 Approaches to Formation of Clusters 6.4 Conclusion

More information

Modified SPIHT Image Coder For Wireless Communication

Modified SPIHT Image Coder For Wireless Communication Modified SPIHT Image Coder For Wireless Communication M. B. I. REAZ, M. AKTER, F. MOHD-YASIN Faculty of Engineering Multimedia University 63100 Cyberjaya, Selangor Malaysia Abstract: - The Set Partitioning

More information

Data Hiding Method Based on Graph Coloring and Pixel Block s Correlation in Color Image

Data Hiding Method Based on Graph Coloring and Pixel Block s Correlation in Color Image AUT Journal of Electrical Engineering AUT J. Elec. Eng., 49()(17)13-13 DOI: 16/eej.17.1676.4868 Data Hiding Method Based on Graph Coloring and Pixel Block s Correlation in Color Image G. Ghadimi 1, M.

More information

Genetic algorithm for optimal imperceptibility in image communication through noisy channel

Genetic algorithm for optimal imperceptibility in image communication through noisy channel Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

Figure (5) Kohonen Self-Organized Map

Figure (5) Kohonen Self-Organized Map 2- KOHONEN SELF-ORGANIZING MAPS (SOM) - The self-organizing neural networks assume a topological structure among the cluster units. - There are m cluster units, arranged in a one- or two-dimensional array;

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Metamorphosis of High Capacity Steganography Schemes

Metamorphosis of High Capacity Steganography Schemes 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami

More information

An Adaptive and Deterministic Method for Initializing the Lloyd-Max Algorithm

An Adaptive and Deterministic Method for Initializing the Lloyd-Max Algorithm An Adaptive and Deterministic Method for Initializing the Lloyd-Max Algorithm Jared Vicory and M. Emre Celebi Department of Computer Science Louisiana State University, Shreveport, LA, USA ABSTRACT Gray-level

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

On the Selection of Image Compression Algorithms

On the Selection of Image Compression Algorithms On the Selection of Image Compression Algorithms Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 300, Taiwan e-mail: cchen@cs.nthu.edu.tw Abstract This paper attempts

More information

A Color Image Digital Watermarking Scheme Based on SOFM

A Color Image Digital Watermarking Scheme Based on SOFM 302 A Color Image Digital Watermarking Scheme Based on SOFM J. Anitha 1, S. Immanuel Alex Pandian 2 1 Asst.Prof., Dept. of Computer Science and Engineering, Karunya University, Coimbatore, Tamilnadu, India.

More information

An Efficient Algorithm for Fingercode-Based Biometric Identification

An Efficient Algorithm for Fingercode-Based Biometric Identification An Efficient Algorithm for Fingercode-Based Biometric Identification Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, and Jia-Guang Sun School of Software, Tsinghua University, Beijing 100084, PR China sunhongwei@gmail.com,

More information

An Efficient Information Hiding Scheme with High Compression Rate

An Efficient Information Hiding Scheme with High Compression Rate IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 04 October 2016 ISSN (online): 2349-784X An Efficient Information Hiding Scheme with High Compression Rate Sarita S. Kamble

More information

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi

More information

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique

More information

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram , October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Clustering and Visualisation of Data

Clustering and Visualisation of Data Clustering and Visualisation of Data Hiroshi Shimodaira January-March 28 Cluster analysis aims to partition a data set into meaningful or useful groups, based on distances between data points. In some

More information

CHAPTER-4 WATERMARKING OF GRAY IMAGES

CHAPTER-4 WATERMARKING OF GRAY IMAGES CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do

More information

2. CNeT Architecture and Learning 2.1. Architecture The Competitive Neural Tree has a structured architecture. A hierarchy of identical nodes form an

2. CNeT Architecture and Learning 2.1. Architecture The Competitive Neural Tree has a structured architecture. A hierarchy of identical nodes form an Competitive Neural Trees for Vector Quantization Sven Behnke and Nicolaos B. Karayiannis Department of Mathematics Department of Electrical and Computer Science and Computer Engineering Martin-Luther-University

More information

A Grayscale Image Steganography Based upon Discrete Cosine Transformation

A Grayscale Image Steganography Based upon Discrete Cosine Transformation A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,

More information

FPGA implementation of a predictive vector quantization image compression algorithm for image sensor applications

FPGA implementation of a predictive vector quantization image compression algorithm for image sensor applications University of Wollongong Research Online Faculty of Health and Behavioural Sciences - Papers (Archive) Faculty of Science, Medicine and Health 2008 FPGA implementation of a predictive vector quantization

More information

Codebook generation for Image Compression with Simple and Ordain GA

Codebook generation for Image Compression with Simple and Ordain GA Codebook generation for Image Compression with Simple and Ordain GA SAJJAD MOHSIN, SADAF SAJJAD COMSATS Institute of Information Technology Department of Computer Science Tobe Camp, Abbotabad PAKISTAN

More information

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain

Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong

More information

Unsupervised Learning

Unsupervised Learning Unsupervised Learning Unsupervised learning Until now, we have assumed our training samples are labeled by their category membership. Methods that use labeled samples are said to be supervised. However,

More information

An Associative Watermarking based Image Authentication Scheme

An Associative Watermarking based Image Authentication Scheme An Associative Watermarking based Image Authentication Scheme Lamiaa M. El Bakrawy 1, Neveen I. Ghali 1, Aboul Ella Hassanien 2 and Ajith Abraham 3, 1 Faculty of Science, Al-Azhar University, Cairo, Egypt

More information

Cluster Analysis. Ying Shen, SSE, Tongji University

Cluster Analysis. Ying Shen, SSE, Tongji University Cluster Analysis Ying Shen, SSE, Tongji University Cluster analysis Cluster analysis groups data objects based only on the attributes in the data. The main objective is that The objects within a group

More information

MRT based Fixed Block size Transform Coding

MRT based Fixed Block size Transform Coding 3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions

Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions Data In single-program multiple-data (SPMD) parallel programs, global data is partitioned, with a portion of the data assigned to each processing node. Issues relevant to choosing a partitioning strategy

More information

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning

Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto

More information

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function

An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function Najme Maleki, Mehrdad Jalali, Majid Vafaei Jahan Department of Computer Engineering, Mashhad Branch, Islamic

More information

High payload using mixed codebooks of Vector Quantization

High payload using mixed codebooks of Vector Quantization High payload using mixed codebooks of Vector Quantization H. B. Kekre, Tanuja K. Sarode, Archana Athawale, Kalpana Sagvekar Abstract Data hiding involves conveying secret messages under the cover digital

More information

SSIM based image quality assessment for vector quantization based lossy image compression using LZW coding

SSIM based image quality assessment for vector quantization based lossy image compression using LZW coding Available online at www.ganpatuniversity.ac.in University Journal of Research ISSN (Online) 0000 0000, ISSN (Print) 0000 0000 SSIM based image quality assessment for vector quantization based lossy image

More information

Fast Fuzzy Clustering of Infrared Images. 2. brfcm

Fast Fuzzy Clustering of Infrared Images. 2. brfcm Fast Fuzzy Clustering of Infrared Images Steven Eschrich, Jingwei Ke, Lawrence O. Hall and Dmitry B. Goldgof Department of Computer Science and Engineering, ENB 118 University of South Florida 4202 E.

More information

International Journal of Innovative Research in Computer and Communication Engineering

International Journal of Innovative Research in Computer and Communication Engineering Data Hiding Using Difference Expension Method YASMEEN M.G,RAJALAKSHMI G Final year M.E, Arunai Engineering College, Thiruvannamalai, Tamilnadu, India Assistant Professor, Arunai Engineering College,Thiruvannamalai,

More information