167 research outputs found

    Bit Plane Coding Based Steganography Technique for JPEG2000 Images and Videos

    Get PDF
    In this paper, a Bit Plane Coding (BPC) based steganography technique for JPEG2000 images and Motion JPEG2000 video is proposed. Embedding in this technique is performed in the lowest significant bit planes of the wavelet coefficients of a cover image. In JPEG2000 standard, the number of bit planes of wavelet coefficients to be used in encoding is dependent on the compression rate and are used in Tier-2 process of JPEG2000. In the proposed technique, Tier-1 and Tier-2 processes of JPEG2000 and Motion JPEG2000 are executed twice on the encoder side to collect the information about the lowest bit planes of all code blocks of a cover image, which is utilized in embedding and transmitted to the decoder. After embedding secret data, Optimal Pixel Adjustment Process (OPAP) is applied on stego images to enhance its visual quality. Experimental results show that proposed technique provides large embedding capacity and better visual quality of stego images than existing steganography techniques for JPEG2000 compressed images and videos. Extracted secret image is similar to the original secret image

    Performance improvement of JPEG2000 steganography using QIM

    Get PDF
    This paper presents a modified QIM-JPEG2000 steganography which improves the previous JPEG2000 steganography using quantization index modulation (QIM). Since after-embedding changes on file size and PSNR by the modified QIM-JPEG2000 are smaller than those by the previous QIM-JPEG2000, the modified QIM-JPEG2000 should be more secure than the previous QIM-JPEG2000.4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 15-17, August, 2008, Harbin, Chin

    Non Oblivious Watermarking Technique for JPEG2000 Compressed Images Using Arnold Scrambling of Unequal Size Watermark Blocks

    Full text link
    In this paper, a watermarking technique for JPEG2000 compressed image is proposed. Scrambling of secret message is performed block-wise using Arnold Transform. Secret message is divided into non-overlapping blocks of unequal size and then Arnold transform is applied on each block and secret key is generated based on the periodicity of each block. Scrambled secret message is embedded into qualified significant wavelet coefficients of a cover image. After embedding the secret message into wavelet coefficients, the remaining processes of JPEG2000 standard are executed to compress the watermarked image at different compression rates. Scaling Factor (SF) is used to embed watermark into wavelet coefficients and the value of SF is stored into COM box of the code stream of JPEG2000 compressed image and this SF value and secret key are used to extract the embedded watermark on the receiver side. The performance of the proposed technique is robust to a variety of attacks like image cropping, salt and pepper noise, and rotation. Proposed technique is compared with the existing watermarking techniques for JPEG2000 compressed images to show its effectiveness

    WAVELET BASED DATA HIDING OF DEM IN THE CONTEXT OF REALTIME 3D VISUALIZATION (Visualisation 3D Temps-Réel à Distance de MNT par Insertion de Données Cachées Basée Ondelettes)

    No full text
    The use of aerial photographs, satellite images, scanned maps and digital elevation models necessitates the setting up of strategies for the storage and visualization of these data. In order to obtain a three dimensional visualization it is necessary to drape the images, called textures, onto the terrain geometry, called Digital Elevation Model (DEM). Practically, all these information are stored in three different files: DEM, texture and position/projection of the data in a geo-referential system. In this paper we propose to stock all these information in a single file for the purpose of synchronization. For this we have developed a wavelet-based embedding method for hiding the data in a colored image. The texture images containing hidden DEM data can then be sent from the server to a client in order to effect 3D visualization of terrains. The embedding method is integrable with the JPEG2000 coder to accommodate compression and multi-resolution visualization. Résumé L'utilisation de photographies aériennes, d'images satellites, de cartes scannées et de modèles numériques de terrains amène à mettre en place des stratégies de stockage et de visualisation de ces données. Afin d'obtenir une visualisation en trois dimensions, il est nécessaire de lier ces images appelées textures avec la géométrie du terrain nommée Modèle Numérique de Terrain (MNT). Ces informations sont en pratiques stockées dans trois fichiers différents : MNT, texture, position et projection des données dans un système géo-référencé. Dans cet article, nous proposons de stocker toutes ces informations dans un seul fichier afin de les synchroniser. Nous avons développé pour cela une méthode d'insertion de données cachées basée ondelettes dans une image couleur. Les images de texture contenant les données MNT cachées peuvent ensuite être envoyées du serveur au client afin d'effectuer une visualisation 3D de terrains. Afin de combiner une visualisation en multirésolution et une compression, l'insertion des données cachées est intégrable dans le codeur JPEG 2000

    Steganography based image compression

    Full text link
    The intention of image compression is to discard worthless data from image so as to shrink the quantity of data bits favored for image depiction, to lessen the storage space, broadcast bandwidth and time. Likewise, data hiding convenes scenarios by implanting the unfamiliar data into a picture in invisibility manner. The review offers, a method of image compression approaches by using DWT transform employing steganography scheme together in combination of SPIHT to compress an image

    An Analysis of LSB

    Get PDF

    Digital Image Steganography Based On Integer Haar Wavelet Transform And Coefficient Difference

    Get PDF
    The development of digital information led to the demand for information security technology that protects the confidentiality of information. Digital steganography is one of such technology that able to protect the information from illegal interception due to its capability to hide the existence of the information without attracting the eavesdropper‟s attention. Among digital media, digital image is the most widely used media for steganography. Discrete Cosine Transform (DCT) is a well-known technique in digital image steganography, but the block calculation of DCT may pose artifact on the images. The disadvantages of DCT can be eliminating by the Discrete Wavelet Transform (DWT) which is more compatible with the Human Visual System (HVS). However the floating point of DWT can causes loss of information. On the other hand, Integer Wavelet Transform (IWT) is represented in finite precision numbers, which can avoid the problem of floating point precision of DWT. In this study, the messages are embedded on the wavelet coefficients of 1-level Integer Haar Wavelet Transform (IHWT) using Coefficient Difference scheme that adopted from Pixel Value Differencing (PVD). The messages are embedded on the difference value of two adjacent wavelet coefficients. Peak Signal to Noise Ration (PSNR) and Structural Similarity (SSIM) are used to measure the quality of stego image. The result shows that the proposed method has outperformed the existing method that employ IHWT and Pixel Mapping Method (PMM) in term of capacity vs. imperceptibility, as well as the maximum capacity. This is due to the high degree of Coefficient Difference that can tolerate larger modification of wavelet coefficients. Moreover, the Coefficient Difference can be applied on all coefficients instead of either significant or insignificant coefficient. These lead to the both high capacity and imperceptibility of digital image steganography system

    A digital signature and watermarking based authentication system for JPEG2000 images

    Get PDF
    In this thesis, digital signature based authentication system was introduced, which is able to protect JPEG2000 images in different flavors, including fragile authentication and semi-fragile authentication. The fragile authentication is to protect the image at code-stream level, and the semi-fragile is to protect the image at the content level. The semi-fragile can be further classified into lossy and lossless authentication. With lossless authentication, the original image can be recovered after verification. The lossless authentication and the new image compression standard, JPEG2000 is mainly discussed in this thesis

    WG1N5315 - Response to Call for AIC evaluation methodologies and compression technologies for medical images: LAR Codec

    Get PDF
    This document presents the LAR image codec as a response to Call for AIC evaluation methodologies and compression technologies for medical images.This document describes the IETR response to the specific call for contributions of medical imaging technologies to be considered for AIC. The philosophy behind our coder is not to outperform JPEG2000 in compression; our goal is to propose an open source, royalty free, alternative image coder with integrated services. While keeping the compression performances in the same range as JPEG2000 but with lower complexity, our coder also provides services such as scalability, cryptography, data hiding, lossy to lossless compression, region of interest, free region representation and coding
    • …
    corecore