CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION
|
|
- Angelina Sherman
- 5 years ago
- Views:
Transcription
1 CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION In the earlier part of the thesis different methods in the spatial domain and transform domain are studied This chapter deals with the techniques for hiding Information in the compressed domain. One of the most commonly studied image compression technique is Vector Quantization (VQ)[60], which is a lossy image compression technique based on the principle of block coding. VQ is a clustering technique & every cluster is represented by a codevector. It is widely used to compress grey-level images because of its low bit rate. The main concept of VQ is to utilize templates instead of blocks to do the image compression. These templates, also referred to as codewords or codevectors, are stored in a codebook, and the codebook is shared only between the sender and the receiver. Hence, the index value of the template is used to represent all the pixel values of the block so that data compression can be achieved. Such a mechanism is extremely easy to implement although the organization of the templates affects the quality of the compressed image. VQ compressed images can be used as cover objects to embed secret data. This is suitable for low bandwidth transmission channels because the amount of transmitted data is significantly reduced. VQ not only has faster encode/decode time and a simpler framework than JPEG/JPEG2000 but it also requires limited information during decoding and those advantages cost VQ a little low compression ratio and visual quality. Various clustering algorithms such as Linde-Buzo-Gray ()[64], Kekre s 172
2 Proportionate Error (KPE), Kekre s Median Codebook Generation (KMCG) and Kekre s Fast Codebook Generation (KFCG) have been implemented. Here media of hiding is image and secret data used is image or text message. 6.1 Vector Quantization for Information Hiding A variety of VQ techniques have been successfully applied in real applications such as speech and image coding [61, 62]. VQ works best in applications in which the decoder has only limited information and a fast execution time is required [63]. The key point to the design of a perfect VQ scheme is to generate a perfect codebook from the training images. The algorithm, proposed by Linde, Buzo and Gray in 1980 [64], gives a good solution and is probably the most famous codebook design algorithm. However, VQ still has its limitations. It usually generates visible boundaries between blocks since the current block is coded independently of its neighboring blocks. To deal with the above problem, side match vector quantization (SMVQ) was proposed by Kim in 1992 [65]. Kim successfully reduces the blocking effect by using local edge information and provides better visual quality and compression ratio than VQ does. Then, to make data hiding more convenient, some researchers have tried to hide secret data in cover images already compressed by VQ or SMVQ [66]. In [67], Lin et al. presented a method of embedding that was based on VQ compressed images. The approach involves reducing the size of the codebook and placing data in the remaining spaces of index values. A codebook is first partitioned into two sub-codebooks such that all pairs of the corresponding codevectors between subcodebooks are as similar as possible. Any modification of the least 173
3 significant bits of index values does not markedly distort the reconstructed image, because the two sub-codebooks have similar content. Accordingly, secret data can be placed into the LSB of all indices. In [68], Lu and Sun presented a similar method, but extended to partition the codebook into 2 k sub-codebooks for embedding k bits into a single index Vector Quantization VQ consists of three steps - Codebook design, Encoding and Decoding. VQ can be define as a mapping function that maps k- dimensional vector space to a finite set CB = {C 1,C 2,C 3,...,C N }.The set CB is called codebook consisting of N number of codevectors and each codevector C i = {c i1, c i2, c i3,, c ik } is of dimension k. The key to VQ is a good codebook. Codebook can be generated by clustering algorithms. The method most commonly used to generate codebook is the K-means algorithm [121,123]. The second step, as shown in Fig. 6.1 encoding requires searching codebook, here image is converted into blocks and the blocks are converted to vectors of dimension k. Each of these image vectors are searched for the nearest codevector in the codebook CB. Once the nearest codevector is obtained its index is sent to the receiver. At receiver decoding is done just by replacing the codevector corresponding to the index sent by the transmitter. Decoding phase is just a look up table technique. In Encoding phase image is divided into non overlapping blocks and each block then is converted to the training vector X i = (x i1, x i2,., x ik ). The codebook is then searched for the nearest codevector C min by computing squared Euclidian distance as 174
4 presented in equation 6.1 with vector X i with all the codevectors of the codebook CB. This method is called exhaustive search (ES). d(x i, C min ) = min 1 j N {d(x i,c j )} (6.1) where d(x i,c j ) = (X ip - C jp ) 2 Although the exhaustive search (ES) method gives the optimal result at the end, it involves heavy computational complexity. Observing the equation (6.1), it can be seen that to obtain one nearest codevector for training vector set; it requires N Euclidian distance computations where N is the size of the codebook. So for M image training vectors will require M x N number of Euclidian distance computations. It is obvious that if the codebook size is decreased the search time also decreases but at the cost of increased distortion and decreased accuracy. Figure 6.1: Block diagram of a basic VQ structure. 6.2 Codebook Generation Techniques In this section four Codebook Generation Techniques are studied Linde-Buzo-Gray () Algorithm The VQ design algorithm [64] is an iterative algorithm; the algorithm iteratively minimizes the total distortion by representing the training vectors by their corresponding codevectors. The algorithm requires an initial codebook C consist of initial codevector C 1. This codevector C 1 is obtained by taking the average of the 175
5 entire training sequence. The codevector is then split into two, by adding constant error in both positive and negative direction. The iterative algorithm is run with these two vectors as in initial codebook. The final two codevectors obtained are splitted into four and the process is repeated until the desired number of codevectors is obtained. The algorithm is summarized as. Let T= {X 1, X 2,, X M } be the training sequence consisting of M source vector. Assume that source vector is of length K, X m ={x m,1, x m,2, x m,k } for m=1, 2,., M Let N be the number of codevectors and let C = {c 1, c 2,, c N }, represents the codebook. Each codevector is k-dimensional, e.g., c n = (c n,1, c n,2,.., c n,k ), n= 1, 2,.. N Let e = (1,1,.,1) be an error vector of length k Let Q be the set of N clusters for N codevectors, i.e. Q(i) denotes the set of source vectors that forms the i th codevector (i.e. i th cluster) for i=1, 2,.., N let MSE be the set of mean square error of N clusters, i.e. MSE(i) denotes the mean square error of the i th cluster. 1. Given T. 2. Set N1=1 and Compute the initial codevector and mean square Error c 1 M 1 X m M m1 MSE(1) 1 Mk M m1 X m c
6 3. Assign C1 = C (i.e. all the elements of C={c 1, c 2,, c N } are copied to the elements of C1={c1 1, c1 2,, c1 N } respectively). Set j=1, Q1(1) = T and m=1 4. Splitting: For i=1, 2,, N1 c j = c1 i + e c j+1 = c1 i - e For v=1 to the number of source vector in Q1(i) compute the euclidean distance d1 between X v and c j and euclidean distance d2 between X v and c j+1 if d1< d2 then put X v in Q(m) else put put X v in Q(m+1) Compute codevectors c m and c m+1 by taking mean of all vectors in cluster Q(m) and Q(m+1) respectively. Also compute mean square error (i.e MSE(m) ) for cluster Q(m) using the following formula. MSE(m) 1 Zk z r1 x r c m 2 where Z is the total number of vectors in Q(m) and X r is the vector in the cluster Q(m) for r=1,2,., Z using the above equation compute the MSE(m+1) for the cluster Q(m+1) j=j+2,m=m+2 5. Compute the net mean square error, by taking the sum of products of the MSE(i) and the number of vectors in the cluster Q(i) for i=1,2,., N1 and divide this sum by Mk. 6. Set N1=2N1. if N1< N then Q1=Q and C1=C and go to step 4, else go to step Stop. Drawbacks of Algorithm algorithm uses constant error deviation for clustering thus the cluster elongation is +135 o to horizontal axis in two dimensional 177
7 cases. This results in inefficient clustering. Further in each iteration 2M Euclidean distances are computed (where M is the total number of training vectors) resulting in large computation time Kekre s Proportionate Error Algorithm (KPE) The drawback of algorithm is the cluster elongation is +135 o to horizontal axis in two dimensional cases. This results in inefficient clustering. To avoid the drawbacks, Kekre et al. [121,123] have suggested a new algorithm where instead of adding constant value, a proportionate error is added to the centroid in positive and negative direction in order to get initial two codevectors in codebook. The error ratio is decided by magnitude of coordinates of the centroid. Hereafter the procedure is same as that of. Steps for KPE Algorithm: Let T= {X 1, X 2,, X M } be the training sequence consisting of M source vector. Assume that source vector is of length K,.,X m ={x m,1, x m,2, x m,k } for m=1, 2,..., M. In this algorithm initial codevector is computed by taking the mean of all the training vectors X i for i=1, 2, M. Thus initially the codebook contains only one codevector. Then two vectors from the codevector are computed by adding proportionate error instead of adding constant. From the codevector proportions between the members of vector is calculated. Let k be the length of codevector. C={c 1, c 2,, c k } be the codevector, and E={e 1, e 2,., e k } be the error vector, c j = min{c i / i= 1,2,. k} where j is the index of the member of vector whose value is minimum among the vector members. Then assign e j = 1 and if c i / c j 10 then assign e i = c i / c j else assign e i = 10 for i j and i=1, 2,, k. 178
8 Two vectors v 1 and v 2 are formed by adding the error vector E to codevector C and by subtracting the error vector E from codevector C respectively. Euclidean distance between the all the training vectors X i with v 1 and with v 2 are computed, i.e. d 1 = v 1 -X i 2 and d 2 = v 2 -X i 2 for i=1,2,., M, if d 1 < d 2 then X i is put in cluster1 else X i is put in cluster2 and two clusters are created. From each cluster codevector is computed by taking the mean of all the vectors in the cluster. Thus the codebook size is increased to two. The above procedure is repeated for each of the codevector and that codebook size is increased to four. This procedure is repeated till the codebook size is increased to the size specified by the user or MSE is reduced to minimum permissible value. Drawbacks of KPE Algorithm In every iteration, 2M numbers of Euclidean distances are computed (where M is the total number of training vectors) Kekre s Median Codebook Generation (KMCG) The above two algorithms and KPE requires 2M Euclidean distance computations in every iteration hence are computational high and takes large time to generate codebook. In order to reduce the computational complexity of and KPE, every Euclidean computation is replaced by simple comparison. Hence KMCG [121,123] is fastest as compared to other codebook generation algorithms. In this algorithm image is divided in to blocks and blocks are converted to the vectors of size k. The equation
9 given below represents matrix T of size M x k consisting of M number of image training vectors of dimension k. x 1,1 x 1,2... x 1,k x 2,1 x 2,2... x 2,k T.... (6.2).... x M,1 x M,2... x M,k Each row of the matrix is the image training vector of dimension k. Steps for KMCG Algorithm: 1. Image is divided into the windows of size 2x2 pixels (each pixel consisting of red, green and blue components). 2. These are put in a row to get 12 values per vector. Collection of these vectors is a training set. 3. The training set is sorted with respect to first column. The Median of the first column is used to divide the training set in two parts and the median vector is put in the codebook. Set the codebook size equal to Further each part is then separately sorted with respect to second column to get two median values and these two median vectors are put into the codebook. Set the codebook size equal to The process of sorting is repeated till codebook of desire size is obtained. Here quick sort algorithm is used. This algorithm takes least time to generate codebook, since Euclidean distance computation is not required Kekre s Fast Codebook Generation (KFCG) The algorithm has the following drawbacks: 1. The algorithm heavily depends on calculation of Euclidean distance which requires multiplications and additions, which has a very high computational complexity. 180
10 2. Since ±1 error is added to generate two codevectors from a single vector. This tends to form the clusters which are in the two-dimensional case. Otherwise for higher dimensions, they are elongated which results in inefficient clustering. 3. In many cases the voids are generated leading to poor utilization of codebook. To avoid these drawbacks, a new algorithm has been suggested by Kekre et al. [121] where the multiplications are replaced by comparison and no addition of error is required to split the cluster in two parts. It has been observed that this algorithm is computationally less complex and takes less time as compared to. It also gives less MSE. The KFCG algorithm first calculates the average of the given cluster along the first dimension and then splits the cluster by keeping all the vectors which are less than or equal in one cluster and the remaining in another cluster. It then continues to split the resulting cluster by computing their average with respect to the next dimension. The process is repeated till the desired number of codevectors is obtained. The algorithm is summarized as follows. The algorithm reduces the codebook generation time since it avoids the Euclidean distance computations. Initially there is one cluster with the entire training vectors and the codevector C 1 which is centroid. In the first iteration of the algorithm, the clusters are formed by comparing first element of training vector with first element of code vector C 1. The vector X i is grouped into the cluster 1 if x i1 < c 11 otherwise vector X i is grouped into cluster 2. In second iteration, the cluster 1 is split into two by comparing second element x i2 of vector X i belonging to cluster 1 with that of the element c 12 of the codevector C 1. Cluster 2 is split into two by 181
11 comparing the element x i2 of vector X i belonging to cluster 2 with that of the element c 22 of the codevector C 2. This procedure is repeated till the codebook size is reached to the size specified by user. It is observed that this algorithm gives minimum error and requires least time to generate codebook as compared to and KPE. Steps for KFCG Algorithm: Let T= {X 1, X 2,, X M } be the training sequence consisting of M source vector. Assume that source vector is of length K X m = {x m,1, x m,2, x m,k } for m=1,2,., M. Let N be the number of codevectors and let C = {c 1, c 2,, c N },represents the codebook. Each codevector is k dimensional, e.g., c n = (c n,1, c n,2,, c n,k ), n= 1, 2,, N. Let Q be the set of N clusters for N codevectors, i.e Q(i) denotes the set of source vectors that forms the i th codevector for i=1, 2,.., N let MSE be the set of mean square error of N clusters i.e. MSE(i) denotes the mean square error of the i th cluster 1. Given T 2. Set N1=1 and Compute the initial codevector and mean squared error c 1 M 1 X m M m1 MSE(1) 1 Mk M m1 X m c Set i=1,m=1, Q1(1)=T 4. For n=1 to N1 182
12 Begin For j=1 to number of vectors in Q1(n) Begin Compare x j,i with c n,i if x j,i c n,i then put X j in Q(m) else put X j in Q(m+1) End Compute codevectors c m and c m+1 by taking mean of all vectors in set Q(m) and Q(m+1) respectively. Compute mean square error (i.e MSE(m) ) for cluster Q(m) using the following formula. MSE(m) 1 Zk z r1 x r c m 2 where Z is the total number of vectors in Q(m) and X r is the vector in the cluster Q(m) for r=1,2,., Z using the above equation compute the MSE(m+1) for the cluster Q(m+1) set m=2m+1 End 5. Compute the net mean square error by taking the sum of products of the MSE(i) and the number of vectors in the cluster Q(i) for i=1,2,., N1 and divide this sum by Mk. N1=2N1 Q1=Q 6. Set m=1, i=i+1; if i==k, then i=1 go to step 4 till codebook size increases to N., i.e N1==N This algorithm gives minimum error as compared to, KPE, and KMCG and also least time to generate codebook as compared to and KPE algorithm [119]. 183
13 6.3 Existing Approaches for Information Hiding In this section the existing method for Information Hiding is discussed Best pair first capacity algorithm Information hiding using the existing Best pair first capacity algorithm [158] gives a PSNR value of 29.09(db) for hiding bits using VQ which they claim to be more than (db) which is obtained by Jo et al. s [159] approach. The cover size used is 512 X 512 gray scale images. 6.4 Proposed Approaches for Information Hiding To improve the hiding capacity,using a cover size which is 0.75% of the cover size considered in [158] and [159], four new algorithms for information hiding in compressed domain using Vector Quantization are introduced which are listed below 1 Information Hiding in Vector Quantized Codebook. [71,76] 2 Information Hiding using Mixed Codebooks of Vector Quantization[69, 72, 85] 3 Information Hiding using Dictionary sort on vector quantized codebook [115] 4 Information Hiding based on size of cluster Information Hiding in Vector Quantized Codebook In [71, 76] this approach, the secret data is hidden inside codebook generated using various codebook generation algorithm such as [64], KPE [119], KMCG [121], KFCG [119,121]. There are various ways of hiding: 1 bit, 2 bits, 3 bits, 4 bits & variable bits hiding. 184
14 Here Information hidden in either 1 bit, 2 bits, 3 bits 4 bits or variable LSB s bits in the elements of codebook vector of the cover image. For embedding variable bits, KMLA method discussed in section 4.2 of chapter 4 is used. Here the intensity value of codebook vector element is checked, and depending upon the magnitude of the intensity, the number of bits to be embedded is decided Embedding and Recovery Procedure Divide the image into 2 2 block of pixel window Generate initial cluster of training set using the rows of 12 values per pixel window Apply codebook generation algorithm /KPE/KFCG/KMCG on initial cluster to obtain codebook of size 2048 codevector Embed every bit of each pixel of secret data in the LSB s of (i.e. 1, 2, 3, 4, variable bit method) each element of codevector belonging to CB Modified CB Generate Index based cover image Figure 6.2(a) Embedding Procedure of Information Hiding in Vector Quantized Codebook 185
15 Recovery Modified CB Index based cover image Extract secret data from LSB of every element of CB Reconstruct the original image by replacing each index by corresponding codevector Figure 6.2(b) Recovery Procedure of Information Hiding in Vector Quantized Codebook Experimental Results: Table 6.1 shows the average values for all covers and messages for 1,2,3,4 and variable bits for all 4 Codebook generation techniques. Table 6.1 Average values of PSNR, MSE and AFCPV using 1 bit, 2, 3, 4, and variable bits for Information hiding in Vector Quantized codebook method on, KPE, KMCG and KFCG codebook is of size 2048 Algorithm PSNR MSE AFCPV KPE BIT KMCG KFCG KPE BIT2 KMCG KFCG KPE BIT KMCG KFCG KPE BIT KMCG KFCG KPE VAR BIT KMCG KFCG Remark: It is observed that KFCG performs better than, KPE and KMCG considering MSE, PSNR and AFCPV. 186
16 Figure 6.3 shows the results for cover image Lioness and secret image work logo. ORIGINAL COVER SECRET MESSAGE 1 bit 2 Bits 3 Bits 4 Bits Variable Bits MSE = MSE = MSE = MSE = MSE = KPE MSE = MSE = MSE = MSE = MSE = KMCG MSE = MSE = MSE = MSE = MSE = KFCG MSE = MSE = MSE = MSE = MSE = Figure 6.3 Original Image, Secret image and Reconstructed images of Stego Codebook.with their MSE values. Secret Image retrieval has a 100% Accuracy, so is not shown here. Remark: It is observed that Stego is similar to the original image using any of the four codebook generation algorithms. Table 6.2 shows the hiding capacity for all covers and messages for 1,2,3,4 and variable bits for all 4 Codebook generation techniques Figure 6.4, 6.5, 6.6 and 6.7 show the hiding capacity, PSNR, MSE 187
17 and AFCPV for all 4 algorithms and 1,2,3,4 and variable bit hiding method. Table 6.2 Hiding Capacity in bits using 1 bit, 2 bits, 3 bits, 4 bits, and variable bits method on, KPE, KMCG and KFCG codebook of size 2048 Cover Images Hiding Capacity in bits 1 bit 2 bit 3 bit 4 bit Variable bits KPE KMCG KFCG Remark: It is observed that KMCG gives highest hiding capacity among, KPE, KMCG and KFCG for variable bit hiding, and is closer to 2 bit hiding method HIDING CAPACITY BIT 2 BIT 3 BIT 4 BIT VAR KPE KMCG KFCG Figure 6.4 Average values of Hiding Capacity in bits considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques Remark: It is observed that the KMCG has the highest hiding capacity.amongst the 4 codebook generation techniques used. 188
18 PSNR KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.5 Average values of PSNR considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques MSE KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.6 Average values of MSE considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques 189
19 AFCPV KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.7 Average values of AFCPV considering all Cover images and Secretmesages for 1, 2, 3, 4 and variable bit hiding using, KPE, KMCG and KFCG codebook generation Techniques Remark: It is observed that KFCG gives best performance among all the four CB generation techniques considering PSNR, MSE and AFCPV Information Hiding using Mixed Codebooks of Vector Quantization In VQ, as the size of codebook is increased, reconstructed image is very less distorted. Instead of using all codevectors of cobebook of a image, some codevectors are randomly selected and replaced by codevectors of codebook of other image, resulting in combined codebook. Random numbers are generated using shuffle algorithm. Shuffling is a procedure used to randomize a deck of playing cards to provide an element of chance in card games. In a computer, shuffling is equivalent to generating a random permutation of the cards. There are two basic algorithms for doing this, both popularized by Donald Knuth [116]. The first is simply to assign a random number to each card, and then to sort the cards in order of their random numbers. This will generate a random permutation, unless any of the random numbers generated are the same as any others (i.e. pairs, triplets etc). This 190
20 can be eliminated either assigning new random numbers to these cases, or reduced to an arbitrarily low probability by choosing a sufficiently wide range of random number choices. The second, generally known as the Knuth shuffle or Fisher Yates shuffle [116] is a linear-time algorithm which involves moving through the pack from top to bottom, swapping each card in turn with another card from a random position in the part of the pack that has not yet been passed through (including itself). Providing that the random numbers are unbiased, this will always generate a random permutation. Here [34-36], Codebook of size N/2 is generated for cover image as well as secret image using codebook generation algorithm. Then the two codebooks are merged to get mixed codebook of size N using shuffle algorithm which generates unique random numbers starting from 0 to N-1. If N is power of 2 then all odd numbers are relatively prime to N.Therefore d can be any odd number from 0 to N-1. The mixed codebook & distance d is used during retrieval of the secret message in order to reconstruct the secret image by separating the codebook which are in a mixed state due to shuffle algorithm, into individual codebooks by generating unique random number upto N using distance d. For secret messages which are text files, the Entire message is converted to codebook of size 256x12, which means first 12 characters form the 1 st row of the codebook, next 12 character become the 2 nd row of the codebook and so on. Then the proposed algorithm is used to hide the message codebook in the cover image codebook. 191
21 To improve the secrecy of text message every byte of text message is EX-ORed with a key. The text message is extracted by EX-ORing with same key. For a codebook of size M X N, P secret characters can be embedded, where P = M * N Shuffle algorithm 1. Select a distance d which is relatively prime to N. 2. Start generating the random number starting from 0. Numbers generated are 0, d, 2d, 3d and so on. 3. If number generated is > N then subtract N from it and add d to the remainder as the next random value. Go on adding d to previous value to get the next value. 4. The algorithm stops when the cover image codebook size is reached. Remaining indices are assigned to the secret message Experimental Results In the proposed approach, codebooks of cover image & secret message are combined to get mix codebook, so hiding capacity is more than 100%. Here codebooks of size 256 X 12 are generated for Cover as well as Secret image, which are of size 256 X 256 X3. These are combined using shuffle algorithm to form codebook of size 512 X 12. Figure 6.8 (a) shows the original (cover/.secret) image and Figure 6.8 (b) shows the reconstructed (cover/ secret) image. Here since codebook is created for secret message also, and since VQ is a lossy compression technique, error arising due to VQ is present in the reconstructed secret message, which is imperceptible. 192
22 Figure 6.8 (a) Original Cover Image/ Secret Image, MSE = KPE, MSE= KMCG, MSE = KFCG, MSE = Figure 6.8(b) Reconstructed images from mixed codebooks Table 6.3 Average values of PSNR, MSE and AFCPV using mixed codebook method using, KPE, KMCG and KFCG. (codebook is of size 512 X 12) Cover image/secret KPE KMCG KFCG image PSNR MSE PSNR MSE PSNR MSE PSNR MSE Img1(White Peacock) Img2(White Lioness) Img3(White Pigeons) Img4(Pussy Cat) Img5(Two roses) Img6(Pink flowers) Img7(Waterfall)) Img8(Colors) Img9(1Flower) Img10(Purple Flowers) Average Remark: It is observed that values of KFCG are better than the rest and minimum MSE is for Colors image which is a smooth image. P S N R C Average PSNR for Message For Mixed CodeBook Algorithm P S N R C Average MSE for Message For Mixed CodeBook Algorithm PSNR MSG 1 - MSG 10 OF SIZE 256 X 256 MSE MSG 1 - MSG 10 OF SIZE 256 X256 Figure 6.9 (a) Figure 6.9 (b) Figure 6.9 (a) and Figure 6.9 (b) Average PSNR and MSE for all 10 reconstructed messages for all 4 codebook generation techniques using with mixed codebook generation method Remark: It is observed that although the average MSE value is about 80, the error is imperceptible using any of the codebook generation technique with using mixed codebook method for Information Hiding. Only Vector Quantization error is present which is imperceptible as can be seen from Figure 6.8 (b) 193
23 In codebooks of cover image, codevectors of secret message are embedded at random positions. This approach improves secrecy of embedded image, since codebooks of cover image and secret message are combined. While reconstructing the image there is only quantization error. The advantage of this method is secret message can be larger than cover image, which gives more than 100 % hiding capacity. Also it is not necessary that the codebook of Cover and Message be created by the same codebook generation technique Steganography using Dictionary sort on vector quantized codebook This [115] approach is similar to Information Hiding using VQ. Here the secret information is hidden into the codebooks which are generated using various codebook generation algorithms such as [64], KPE [119, 123], KMCG [119,123], KFCG [119, 123, 125]. The only difference is, here after hiding secret data in a codebook, it is sorted and stego-image is reconstructed. Here again 1 bit, 2 bits, 3 bits, 4 bits and variable bit hiding approaches are used Encoding and Decoding The encoding is done as follows: 1 Divide the image into 2 2 non-overlapping blocks of pixels. 2 Generate initial cluster of training set using the rows of 12 values per pixel window. 3 Apply codebook generation algorithm /KPE/KFCG/KMCG on initial cluster to obtain codebook of size 2048 codevectors. 4 Perform dictionary sort on CB. 5 Hide data into sorted CB. 6 Add stego index position column in Stego CB. 7 Sort the stego CB. 8 From sorted CB reconstruct the image to form Stego image. 194
24 The decoding is done as follows: 1 Retrieval of secret message is done using the Stego Image and Stego index position column. 2 Stego image is divided into blocks generating training vectors. Collection of unique training vector is nothing but CB. 3 The entries of codebook are arranged using Stego index position column. 4 The secret data is extracted to get back the secret message Experimental Results Table 6.4 shows the average values of PSNR, MSE and AFCPV for all cover and secret images using Dictionary sort method with all the four CB generation methods. Table 6.4 Average values of PSNR, MSE and AFCPV using 1 bit, 2, 3, 4, and variable bits for Information Hiding using Dictionary sort method on, KPE, KMCG and KFCG codebook is of size 2048 Algorithm PSNR MSE AFCPV KPE BIT KMCG KFCG KPE BIT2 KMCG KFCG KPE BIT KMCG KFCG KPE BIT KMCG KFCG KPE VAR BIT KMCG KFCG Remark : It is observed that KPE performs better than other Codebook generation algorithms for Dictionary sort method for information hiding. 195
25 Figure 6.10 shows the Stego images with the secret message hidden in it. ORIGINAL COVER SECRET MESSAGE 1bit 2 Bits 3 Bits 4 Bits Variable Bits MSE = 29.2 MSE = MSE = MSE = MSE = KPE MSE = MSE = MSE = MSE = MSE = KMCG MSE = 74.8 MSE = MSE = MSE = MSE = KFCG MSE = MSE = MSE = MSE = MSE = Figure 6.10 Stego images for 1,2,3,4 and Variable bit method using dictionary sort and using, KPE, KMCG and KFCG codebook generation techniques (codebook size = 512) Remark: It is observed that Stego is similar to the original image using any of the four codebook generation algorithms. Figure 6.11 to Figure 6.13 show the PSNR, MSE, AFCPV for all four codebook generation techniques for hiding information using dictionary sort method. Figure 6.14 show the Hiding capacity for, KPE, KMCG and KFCG for dictionary sort method using Vector quantization. 196
26 PSNR KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.11 Average values of PSNR considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques MSE KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.12 Average values of MSE considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques AFCPV KPE KMCG KFCG 1 BIT 2 BIT 3 BIT 4 BIT VAR BIT Figure 6.13 Average values of AFCPV considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques 197
27 BIT 2 BIT 3 BIT 4 BIT VAR HIDING CAPACITY KPE KMCG KFCG Figure 6.14 Average values of Hiding Capacity considering all Cover images and Secret mesages with 1, 2, 3, 4 and variable bit hiding for information hiding using Dictionary sort method using, KPE, KMCG and KFCG codebook generation Techniques Remark: The Hiding capacity for KMCG is maximum among all four codebook generation techniques.as is seen in Figure 6.14 for variable bit hiding Information Hiding based on Size of cluster A vector quantizer maps k-dimensional vectors in the vector space R k into a finite set of vectors Y = {y i : i = 1, 2,..., N}. Each vector y i is called a code vector or a codeword and the set of all the codewords is called a codebook. In this proposed approach, codebooks of cover image and secret message are combined based on number of training vectors in the cluster of the cover image. Here KMCG algorithm is not used for generation of codebook since size of all cluster is same The Proposed Algorithm 1. Generate codebook of size 512 X 12 for cover image. 2. Generate codebook of size 256 X 12 for secret message. 3. Arrange the codevectors of codebooks of Cover in ascending order of number of code vectors in the cluster represented by codevector. 4. Replace the codevectors of coverimages by codevectors of secret message in such a way that codevector representing 198
28 less number of training vectors belonging to codebook of cover image are replaced by secret image codevectors,.so that the combined codebook of 512 X 12 size contains 256 X 12 codevectors belonging to the secret image. and the remaining to the cover image. 5. Combined Codebook of size 512 and index list of replaced codevectors is stored which is used during the reconstruction of the Secret message during retrieval Experimental Results Table 6.5 shows the result.using average values of PSNR, MSE and AFCPV for information hiding based on cluster size method. Table 6.5 Average values of PSNR, MSE and AFCPV using Information hiding based on cluster size using, KPE, and KFCG. (codebook is of size 512 X 12) Cover image/secret image KPE KFCG PSNR MSE PSNR MSE PSNR MSE Img1(White Peacock) Img2(White Lioness) Img3(White Pigeons) Img4(Pussy Cat) Img5(Two roses) Img6(Pink flowers) Img7(Waterfall)) Img8(Colors) Img9(1Flower) Img10(Purple Flowers) Average Remark: It is observed that KFCG performs better among, KPE and KFCG.It is also seen that for each algorithm independently Img3, Img4 Img8 and Img9 which are images where large clusters may get formed have better performance than others Figure 6.15 shows original cover image (img6) and the corresponding stego images reconstructed from codebooks generated using, KPE and KFCG algorithms. 199
29 Original Cover KPE KFCG Image Img6 MSE = MSE = MSE = Figure 6.15 Image results for reconstructed stego images using, KPE and KFCG for information hiding based on cluster size using Vector Quantization Remark : It is observed that reconstructed Stego is better using KFCG than using or KPE, although the MSE value is high. This has been tested consulting 10 people. P S N R C Average MSE for Message P S N R C Average PSNR for Message For Mixed CodeBook Algorithm MSE MSG 1 - MSG 10 OF SIZE 256 X256 PSNR MSG 1 - MSG 10 OF SIZE 256 X 256 Figure 6.16 Average values of MSE for information hiding using cluster based approach for, KPE and KFCG Figure 6.17 Average values of PSNR for information hiding using cluster based approach for, KPE and KFCG Remark: It is observed that KFCG performs better than and KPE. 6.5 Discussion: In this chapter four new methods of Information hiding in compressed domain using Vector Quantization are proposed. They are 1. Information Hiding using Vector Quantized Codebook 2. Information Hiding in mixed codebooks using shuffle algorithm 3. Information hiding using Dictionary Sort method 4. Information hiding based upon cluster size. 200
30 In the first method in which Information is hidden in a Vector Quantized codebook, 4 Codebook generation algorithms are used namely, KPE, KMCG and KFCG. Codebooks of cover images are generated using these algorithms and secret message bits are hidden. It is observed that KFCG performs better considering MSE, PSNR and AFCPV, whereas KMCG has highest hiding capacity out of, KPE, KMCG and KFCG. In the second method Information is hidden using shuffle algorithm. Here Codebooks of Cover as well as Secret image are generated and they are mixed using shuffle algorithm. Since hiding of information is nothing but mixing of the codebooks in a shuffled manner; it can give a hiding capacity of more than 100%. It is not necessary that the codebooks for Cover and Secret image be generated using the same codebook generation technique. Here since codebook is generated for secret message as well, VQ error is present in the retrieved Secret message and therefore it is advisable to use KFCG which has the least error among the four codebook generation techniques studied. In the third method information hiding is done using dictionary sort method, four codebook generation algorithms are used. They are, KPE, KMCG and KFCG. Here also similar to the first algorithm 1, 2, 3, 4 and variable bit method is used. The only difference is here after hiding secret data in a codebook, it is sorted and stegoimage is reconstructed. It is observed that KPE performs better than other algorithms considering MSE, PSNR. Regarding Hiding capacity KMCG gives maximum hiding capacity. In the fourth method which is based on the size of cluster. The clusters of the cover which are smaller that is which have less 201
31 number of codevectors are being replaced by the secret message codevectors. This is because they have a less contribution in the stego image and therefore if replaced by secret image codevector will not affect the quality much. Here for generation of codebook of cover KMCG is not used, since cluster formation in case of KMCG is of the same size. However, for codebook of secret image any of the four codebook generation techniques can be used. It is observed that for this method KFCG performs better. 202
Available online at ScienceDirect. Procedia Computer Science 89 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 778 784 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) Color Image Compression
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationFeature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Feature-Guided K-Means Algorithm for Optimal Image Vector
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationCompression of Image Using VHDL Simulation
Compression of Image Using VHDL Simulation 1) Prof. S. S. Mungona (Assistant Professor, Sipna COET, Amravati). 2) Vishal V. Rathi, Abstract : Maintenance of all essential information without any deletion
More informationMultilevel Compression Scheme using Vector Quantization for Image Compression
Multilevel Compression Scheme using Vector Quantization for Image Compression S.Vimala, B.Abidha, and P.Uma Abstract In this paper, we have proposed a multi level compression scheme, in which the initial
More informationJoint Image Classification and Compression Using Hierarchical Table-Lookup Vector Quantization
Joint Image Classification and Compression Using Hierarchical Table-Lookup Vector Quantization Navin Chadda, Keren Perlmuter and Robert M. Gray Information Systems Laboratory Stanford University CA-934305
More informationA Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization
Computer Science and Engineering. 0; (): -7 DOI: 0. 593/j.computer.000.0 A Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization B. Janet *, A. V. Reddy Dept.
More informationCHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION
CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant
More informationKeyWords: Image Compression, LBG, ENN, BPNN, FBP.
Volume 3, Issue 6, June 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Image Compression
More informationA Review on LBG Algorithm for Image Compression
A Review on LBG Algorithm for Image Compression Ms. Asmita A.Bardekar #1, Mr. P.A.Tijare #2 # CSE Department, SGBA University, Amravati. Sipna s College of Engineering and Technology, In front of Nemani
More informationComparative Study on VQ with Simple GA and Ordain GA
Proceedings of the 9th WSEAS International Conference on Automatic Control, Modeling & Simulation, Istanbul, Turkey, May 27-29, 2007 204 Comparative Study on VQ with Simple GA and Ordain GA SADAF SAJJAD
More informationAdaptive data hiding based on VQ compressed images
Adaptive data hiding based on VQ compressed images W.-C. Du and W.-J. Hsu Vision, Image and Signal Processing, IEE Proceedings 22 Aug. 2003 Volume: 150, Issue: 4 Page(s): 233-238 Presented by Benjamin
More informationMRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)
5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1
More informationVoronoi Region. K-means method for Signal Compression: Vector Quantization. Compression Formula 11/20/2013
Voronoi Region K-means method for Signal Compression: Vector Quantization Blocks of signals: A sequence of audio. A block of image pixels. Formally: vector example: (0.2, 0.3, 0.5, 0.1) A vector quantizer
More informationImage Compression with Competitive Networks and Pre-fixed Prototypes*
Image Compression with Competitive Networks and Pre-fixed Prototypes* Enrique Merida-Casermeiro^, Domingo Lopez-Rodriguez^, and Juan M. Ortiz-de-Lazcano-Lobato^ ^ Department of Applied Mathematics, University
More informationImage Compression Using SOFM
Image Compression Using SOFM Ankit Aggarwal (03d05009) Anshu Agrawal (03005006) November 12, 2006 Why Image Compression? Application of data compression on digital images. Computer images are extremely
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationOptimization of Bit Rate in Medical Image Compression
Optimization of Bit Rate in Medical Image Compression Dr.J.Subash Chandra Bose 1, Mrs.Yamini.J 2, P.Pushparaj 3, P.Naveenkumar 4, Arunkumar.M 5, J.Vinothkumar 6 Professor and Head, Department of CSE, Professional
More informationCHAPTER 4 SEMANTIC REGION-BASED IMAGE RETRIEVAL (SRBIR)
63 CHAPTER 4 SEMANTIC REGION-BASED IMAGE RETRIEVAL (SRBIR) 4.1 INTRODUCTION The Semantic Region Based Image Retrieval (SRBIR) system automatically segments the dominant foreground region and retrieves
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationDifferential Compression and Optimal Caching Methods for Content-Based Image Search Systems
Differential Compression and Optimal Caching Methods for Content-Based Image Search Systems Di Zhong a, Shih-Fu Chang a, John R. Smith b a Department of Electrical Engineering, Columbia University, NY,
More informationLOSSY COLOR IMAGE COMPRESSION BASED ON QUANTIZATION
LOSSY COLOR IMAGE COMPRESSION BASED ON QUANTIZATION by Hiba Shahid A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED SCIENCE The Faculty of Graduate and
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationBinary vector quantizer design using soft centroids
Signal Processing: Image Communication 14 (1999) 677}681 Binary vector quantizer design using soft centroids Pasi FraK nti *, Timo Kaukoranta Department of Computer Science, University of Joensuu, P.O.
More informationA Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization
Informatica 29 (2005) 335 341 335 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Hsien-Wen Tseng Department of Information Management Chaoyang University of Technology
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationEfficient Image Steganography Using Integer Wavelet Transform
Efficient Image Steganography Using Integer Wavelet Transform DHIVYA DHARSHINI. K 1, Dr. K. ANUSDHA 2 1 M.Tech, Department of Electronics Engineering, Pondicherry University, Puducherry, India. 2 Assistant
More informationAN EFFICIENT CODEBOOK INITIALIZATION APPROACH FOR LBG ALGORITHM
AN EFFICIENT CODEBOOK INITIALIZATION APPROACH FOR ALGORITHM Arup Kumar Pal 1 and Anup Sar 2 1 Department of Computer Science and Engineering, NIT Jamshedpur, India arupkrpal@gmail.com 2 Department of Electronics
More informationToday. Lecture 4: Last time. The EM algorithm. We examine clustering in a little more detail; we went over it a somewhat quickly last time
Today Lecture 4: We examine clustering in a little more detail; we went over it a somewhat quickly last time The CAD data will return and give us an opportunity to work with curves (!) We then examine
More informationTHREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION
THREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION Hui Ting Teo and Mohd Fadzli bin Mohd Salleh School of Electrical and Electronic Engineering Universiti Sains Malaysia,
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationModule 8: Video Coding Basics Lecture 42: Sub-band coding, Second generation coding, 3D coding. The Lecture Contains: Performance Measures
The Lecture Contains: Performance Measures file:///d /...Ganesh%20Rana)/MY%20COURSE_Ganesh%20Rana/Prof.%20Sumana%20Gupta/FINAL%20DVSP/lecture%2042/42_1.htm[12/31/2015 11:57:52 AM] 3) Subband Coding It
More informationNew Clustering Algorithm for Vector Quantization using Rotation of Error Vector
New Clustering Algorithm for Vector Quantization using Rotation of Error Vector Dr. H. B. Kekre Computer Engineering Mukesh Patel School of Technology Management and Engineering, NMIMS University, Vileparle(w)
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationEnhancing the Image Compression Rate Using Steganography
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,
More information1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring
1 An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring Shuai Yue 1, Zhi-Hui Wang 2, and Chin-Chen Chang 3 1 Department of Software, Dalian University of Technology, DaLian, China,
More informationA LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION
A LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION Ming-Hwa Sheu, Sh-Chi Tsai and Ming-Der Shieh Dept. of Electronic Eng., National Yunlin Univ. of Science and Technology, Yunlin,
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationModule 7 VIDEO CODING AND MOTION ESTIMATION
Module 7 VIDEO CODING AND MOTION ESTIMATION Version ECE IIT, Kharagpur Lesson Block based motion estimation algorithms Version ECE IIT, Kharagpur Lesson Objectives At the end of this less, the students
More information5.7. Fractal compression Overview
5.7. Fractal compression Overview 1. Introduction 2. Principles 3. Encoding 4. Decoding 5. Example 6. Evaluation 7. Comparison 8. Literature References 1 Introduction (1) - General Use of self-similarities
More informationThe Steganography In Inactive Frames Of Voip
The Steganography In Inactive Frames Of Voip This paper describes a novel high-capacity steganography algorithm for embedding data in the inactive frames of low bit rate audio streams encoded by G.723.1
More informationA Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
More information1 Case study of SVM (Rob)
DRAFT a final version will be posted shortly COS 424: Interacting with Data Lecturer: Rob Schapire and David Blei Lecture # 8 Scribe: Indraneel Mukherjee March 1, 2007 In the previous lecture we saw how
More informationRobust Lossless Data Hiding. Outline
Robust Lossless Data Hiding Yun Q. Shi, Zhicheng Ni, Nirwan Ansari Electrical and Computer Engineering New Jersey Institute of Technology October 2010 1 Outline What is lossless data hiding Existing robust
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationERROR VECTOR ROTATION USING KEKRE TRANSFORM FOR EFFICIENT CLUSTERING IN VECTOR QUANTIZATION
ERROR VECTOR ROTATION USING KEKRE TRANSFORM FOR EFFICIENT CLUSTERING IN VECTOR QUANTIZATION H. B. Kekre, Tanuja K. Sarode 2 and Jagruti K. Save 3 Professor, Mukesh Patel School of Technology Management
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationNon-Parametric Vector Quantization Algorithm
Non-Parametric Vector Quantization Algorithm 31 Non-Parametric Vector Quantization Algorithm Haemwaan Sivaraks and Athasit Surarerks, Non-members ABSTRACT Recently researches in vector quantization domain
More informationStatistical Image Compression using Fast Fourier Coefficients
Statistical Image Compression using Fast Fourier Coefficients M. Kanaka Reddy Research Scholar Dept.of Statistics Osmania University Hyderabad-500007 V. V. Haragopal Professor Dept.of Statistics Osmania
More informationCSEP 521 Applied Algorithms Spring Lossy Image Compression
CSEP 521 Applied Algorithms Spring 2005 Lossy Image Compression Lossy Image Compression Methods Scalar quantization (SQ). Vector quantization (VQ). DCT Compression JPEG Wavelet Compression SPIHT UWIC (University
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationCHAPTER-6 WATERMARKING OF JPEG IMAGES
CHAPTER-6 WATERMARKING OF JPEG IMAGES 6.1 INTRODUCTION In the Chapter 4, we have discussed that we can improve the robustness of DCT and DWT based watermarking schemes against some well known attacks by
More informationIterative split-and-merge algorithm for VQ codebook generation published in Optical Engineering, 37 (10), pp , October 1998
Iterative split-and-merge algorithm for VQ codebook generation published in Optical Engineering, 37 (10), pp. 2726-2732, October 1998 Timo Kaukoranta 1, Pasi Fränti 2 and Olli Nevalainen 1 1 Turku Centre
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationCHAPTER-6 WEB USAGE MINING USING CLUSTERING
CHAPTER-6 WEB USAGE MINING USING CLUSTERING 6.1 Related work in Clustering Technique 6.2 Quantifiable Analysis of Distance Measurement Techniques 6.3 Approaches to Formation of Clusters 6.4 Conclusion
More informationModified SPIHT Image Coder For Wireless Communication
Modified SPIHT Image Coder For Wireless Communication M. B. I. REAZ, M. AKTER, F. MOHD-YASIN Faculty of Engineering Multimedia University 63100 Cyberjaya, Selangor Malaysia Abstract: - The Set Partitioning
More informationData Hiding Method Based on Graph Coloring and Pixel Block s Correlation in Color Image
AUT Journal of Electrical Engineering AUT J. Elec. Eng., 49()(17)13-13 DOI: 16/eej.17.1676.4868 Data Hiding Method Based on Graph Coloring and Pixel Block s Correlation in Color Image G. Ghadimi 1, M.
More informationGenetic algorithm for optimal imperceptibility in image communication through noisy channel
Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,
More information(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)
Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application
More informationFigure (5) Kohonen Self-Organized Map
2- KOHONEN SELF-ORGANIZING MAPS (SOM) - The self-organizing neural networks assume a topological structure among the cluster units. - There are m cluster units, arranged in a one- or two-dimensional array;
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationAn Adaptive and Deterministic Method for Initializing the Lloyd-Max Algorithm
An Adaptive and Deterministic Method for Initializing the Lloyd-Max Algorithm Jared Vicory and M. Emre Celebi Department of Computer Science Louisiana State University, Shreveport, LA, USA ABSTRACT Gray-level
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationOn the Selection of Image Compression Algorithms
On the Selection of Image Compression Algorithms Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 300, Taiwan e-mail: cchen@cs.nthu.edu.tw Abstract This paper attempts
More informationA Color Image Digital Watermarking Scheme Based on SOFM
302 A Color Image Digital Watermarking Scheme Based on SOFM J. Anitha 1, S. Immanuel Alex Pandian 2 1 Asst.Prof., Dept. of Computer Science and Engineering, Karunya University, Coimbatore, Tamilnadu, India.
More informationAn Efficient Algorithm for Fingercode-Based Biometric Identification
An Efficient Algorithm for Fingercode-Based Biometric Identification Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, and Jia-Guang Sun School of Software, Tsinghua University, Beijing 100084, PR China sunhongwei@gmail.com,
More informationAn Efficient Information Hiding Scheme with High Compression Rate
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 04 October 2016 ISSN (online): 2349-784X An Efficient Information Hiding Scheme with High Compression Rate Sarita S. Kamble
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationA Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution
Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique
More informationSteganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram
, October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationClustering and Visualisation of Data
Clustering and Visualisation of Data Hiroshi Shimodaira January-March 28 Cluster analysis aims to partition a data set into meaningful or useful groups, based on distances between data points. In some
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More information2. CNeT Architecture and Learning 2.1. Architecture The Competitive Neural Tree has a structured architecture. A hierarchy of identical nodes form an
Competitive Neural Trees for Vector Quantization Sven Behnke and Nicolaos B. Karayiannis Department of Mathematics Department of Electrical and Computer Science and Computer Engineering Martin-Luther-University
More informationA Grayscale Image Steganography Based upon Discrete Cosine Transformation
A Grayscale Image Steganography Based upon Discrete Cosine Transformation Chin-Chen Chang 1, Pei-Yu Lin, and Jun-Chou Chuang 3 1 Department of Information Engineering and Computer Science, Feng Chia University,
More informationFPGA implementation of a predictive vector quantization image compression algorithm for image sensor applications
University of Wollongong Research Online Faculty of Health and Behavioural Sciences - Papers (Archive) Faculty of Science, Medicine and Health 2008 FPGA implementation of a predictive vector quantization
More informationCodebook generation for Image Compression with Simple and Ordain GA
Codebook generation for Image Compression with Simple and Ordain GA SAJJAD MOHSIN, SADAF SAJJAD COMSATS Institute of Information Technology Department of Computer Science Tobe Camp, Abbotabad PAKISTAN
More informationQuality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique Using Hadamard Transform Domain YAHYA E. A. AL-SALHI a, SONGFENG LU *b a. Research Scholar, School of computer science, Huazhong
More informationUnsupervised Learning
Unsupervised Learning Unsupervised learning Until now, we have assumed our training samples are labeled by their category membership. Methods that use labeled samples are said to be supervised. However,
More informationAn Associative Watermarking based Image Authentication Scheme
An Associative Watermarking based Image Authentication Scheme Lamiaa M. El Bakrawy 1, Neveen I. Ghali 1, Aboul Ella Hassanien 2 and Ajith Abraham 3, 1 Faculty of Science, Al-Azhar University, Cairo, Egypt
More informationCluster Analysis. Ying Shen, SSE, Tongji University
Cluster Analysis Ying Shen, SSE, Tongji University Cluster analysis Cluster analysis groups data objects based only on the attributes in the data. The main objective is that The objects within a group
More informationMRT based Fixed Block size Transform Coding
3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationData Partitioning. Figure 1-31: Communication Topologies. Regular Partitions
Data In single-program multiple-data (SPMD) parallel programs, global data is partitioned, with a portion of the data assigned to each processing node. Issues relevant to choosing a partitioning strategy
More informationMultipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning
Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto
More informationAn Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function
An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function Najme Maleki, Mehrdad Jalali, Majid Vafaei Jahan Department of Computer Engineering, Mashhad Branch, Islamic
More informationHigh payload using mixed codebooks of Vector Quantization
High payload using mixed codebooks of Vector Quantization H. B. Kekre, Tanuja K. Sarode, Archana Athawale, Kalpana Sagvekar Abstract Data hiding involves conveying secret messages under the cover digital
More informationSSIM based image quality assessment for vector quantization based lossy image compression using LZW coding
Available online at www.ganpatuniversity.ac.in University Journal of Research ISSN (Online) 0000 0000, ISSN (Print) 0000 0000 SSIM based image quality assessment for vector quantization based lossy image
More informationFast Fuzzy Clustering of Infrared Images. 2. brfcm
Fast Fuzzy Clustering of Infrared Images Steven Eschrich, Jingwei Ke, Lawrence O. Hall and Dmitry B. Goldgof Department of Computer Science and Engineering, ENB 118 University of South Florida 4202 E.
More informationInternational Journal of Innovative Research in Computer and Communication Engineering
Data Hiding Using Difference Expension Method YASMEEN M.G,RAJALAKSHMI G Final year M.E, Arunai Engineering College, Thiruvannamalai, Tamilnadu, India Assistant Professor, Arunai Engineering College,Thiruvannamalai,
More information