1,413 research outputs found

    Data Embedding Using Block Truncation Coding

    Get PDF
         في هذا البحث تم تقديم طريقة إخفاء البيانات التي تخفي البيانات في مجال الضغط. تستخدم طريقة ترميز اقتطاع الكتلة (BTC) لإخفاء المعلومات. النقطة الأساسية في الطريقة المقترحة هي أن يتم تطبيقها أولاً باستخدام ترميز اقتطاع الكتلة التقليدية ثم يتم تطبيقه لاحقًا باستخدام ترميز اقتطاع الكتلة المحسن(IBTC)  .تظهر النتائج التجريبية أن IBTC تمكن من اخفاء كمية كبيرة من البيانات في الملف المضغوط مع الحفاظ على جودة صورة مرضية.In this paper, a data hiding method is presented that hide the data in the compression domain. The Block Truncation Coding (BTC) method is used for hiding the information. The key point of the proposed method is to first apply traditional Block Truncation Coding and later it applied using Improved Block Truncation Coding (IBTC). Experimental results show that IBTC can embed a large amount of data in the compressed file while maintaining satisfactory image quality

    Text Hiding in Coded Image Based on Quantization Level Modification and Chaotic Function

    Get PDF
    A text hiding method in codded image is presented in this paper that based on quantization level modification. The used image is transformed into wavelet domain by DWT and coefficient of transform is partitioned into predefined block size. Specific threshold has been used to classify these blocks into two types named smooth and complex. Each type has its own method of text hiding (binary data), for smooth blocks, secret bits which represent the text data are switched by the bitmap. In order to reduce distortion, the quantization levels are modified. To reach extra embedding payload the quantization level could carry extra two bits depending on other threshold. The complex block carry one data bit on each block and quantization levels are swapped to reduce distortion with bitmap flipping. The proposed method result shows a high signal to noise ratio, with studying capacity as important in this work

    Quantization Watermarking for Joint Compression and Data Hiding Schemes

    Get PDF
    International audienceEnrichment and protection of JPEG2000 images is an important issue. Data hiding techniques are a good solution to solve these problems. In this context, we can consider the joint approach to introduce data hiding technique into JPEG2000 coding pipeline. Data hiding consists of imperceptibly altering multimedia content, to convey some information. This process is done in such a way that the hidden data is not perceptible to an observer. Digital watermarking is one type of data hiding. In addition to the imperceptibility and payload constraints, the watermark should be robust against a variety of manipulations or attacks. We focus on trellis coded quantization (TCQ) data hiding techniques and propose two JPEG2000 compression and data hiding schemes. The properties of TCQ quantization, defined in JPEG2000 part 2, are used to perform quantization and information embedding during the same time. The first scheme is designed for content description and management applications with the objective of achieving high payloads. The compression rate/imperceptibility/payload trade off is our main concern. The second joint scheme has been developed for robust watermarking and can have consequently many applications. We achieve the better imperceptibility/robustness trade off in the context of JPEG2000 compression. We provide some experimental results on the implementation of these two schemes

    Histogram Based Data Cryptographic Technique with High Level Security

    Get PDF
    Histogram shifting plays a major role in reversible data hiding technique. By this shifting method the distortion is reduced and the embedding capacity may be increased. This proposed work uses, shifting and embedding function. The pixel elements of the original image are divided into two disjoint groups. The first group is used to carry the secret data and the second group adds some additional information which ensures the reversibility of data. The  parameter such as PSNR, embedding capacity and bit rate are used for comparisons of various image

    Adaptive speech compression based on AMBTC

    Get PDF
    Most of the AMBTC-based RDH (absolute instantaneous block truncation) schemes Cannot be decrypted because AMBTC, which is unknown to most device. Also, some of the RDH methods based on AMBTC. But the load capacity obtained is low. For this purpose, in this work, a scalable RDH scheme based on AMBTC was introduced from the AMBTC zip code. In contrast to the decoder-based AMBTC-based RDH methods that are only able to achieve a constant payload for adjust the audio. Due to its advantages, sound pressure has attracted a great deal of attention in the last 20 years. The main developments concern transmission requirements and storage capacity. The need for high-quality audio data has been increased due to sudden improvements in computer manufacturers and technologies. Therefore, the developments include speech compression technologies, in which the two compression classes are lossless. This paper aims to review techniques for specification compression methods using AMBTC (a momentary absolute block truncation notation based ) method, and to summarize their importance and uses

    Lossless data hiding using bit-depth embedding for JPEG2000 compressed bit-stream

    Get PDF
    We have proposed a reversible information hiding for binary images. In this paper, we presents a lossless data hiding method for JPEG2000 compressed data based on the reversible information hiding. In JPEG2000 compression, wavelet coefficients of an image are quantized,therefore, the least significant bit plane (LSB) can be extracted. The proposed method recovers the quantized wavelet coefficients of cover images from stego images. To realize this, we embed not only secret data and the JBIG2 bit-stream of a part of the LSB plane but also the bit-depth of the quantized coefficients on some code-blocks.Experimental results demonstrate the feasibility of application of the proposed method to image alteration detection for JPEG2000 compressed data.2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 15-17 Aug. 2008, Harbin, Chin
    corecore