CFP last date
20 May 2024
Reseach Article

Data Hiding and Compression Encryption through Discrete Wavelet Transform and Block Coding

by Shiva Dwivedi, Sreeja Nair
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 38
Year of Publication: 2019
Authors: Shiva Dwivedi, Sreeja Nair
10.5120/ijca2019919260

Shiva Dwivedi, Sreeja Nair . Data Hiding and Compression Encryption through Discrete Wavelet Transform and Block Coding. International Journal of Computer Applications. 178, 38 ( Aug 2019), 30-34. DOI=10.5120/ijca2019919260

@article{ 10.5120/ijca2019919260,
author = { Shiva Dwivedi, Sreeja Nair },
title = { Data Hiding and Compression Encryption through Discrete Wavelet Transform and Block Coding },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2019 },
volume = { 178 },
number = { 38 },
month = { Aug },
year = { 2019 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number38/30787-2019919260/ },
doi = { 10.5120/ijca2019919260 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:52:32.207907+05:30
%A Shiva Dwivedi
%A Sreeja Nair
%T Data Hiding and Compression Encryption through Discrete Wavelet Transform and Block Coding
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 38
%P 30-34
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The ubiquitous nature of digital network systems means that digital documents can be copied and distributed easily to large numbers of people with no cost. Individuals can download sound, picture and video records, and they can impart them to companions and they can control or adjust their unique substance. This is the reason there is an earnest need to ensure the copyright of such media. There are various advances that will give insurance from unlawful replicating. Advanced watermarking calculations were created to take care of this issue. To secure and less space data hiding and compression encryption through discrete shearlet transform (DST) and block based coding algorithm is present paper. According to efficient scheme is increase PSNR (peak signal to noise ratio), SSIM (similarity index) and decrease mean square error (MSE).

References
  1. Awdhesh K. Shukla, Akanksha Singh, Balvinder Singh and Amod Kumar, “A Secure and High-Capacity Data-Hiding Method using Compression, Encryption and Optimized Pixel Value Differencing”, IEEE Access, October 8, 2018.
  2. S. Thakur, A. K. Singh, S. P. Ghrera, and M. Elhoseny, ``Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications,'' in Multimedia Tools and Applications, pp. no. 01-14, Springer, 2018.
  3. R. Srivastava, B. Kumar, A. K. Singh, and A. Mohan, “Computationally efficient joint imperceptible image watermarking and JPEG compression: A green computing approach,'' Multimedia Tools Appl., vol. 77, No. 13, pp. no. 16447-16459, IEEE 2017.
  4. D. S. Chauhan, A. K. Singh, A. Adarsh, B. Kumar, and J. P. Saini, “Combining Mexican hat wavelet and spread spectrum for adaptive water-marking and its statistical detection using medical images,'' in Multimedia Tools and Applications, pp. no. 01-15, Springer 2017.
  5. N. Senthil Kumaran, and S. Abinaya, “Comparison Analysis of Digital Image Watermarking using DWT and LSB Technique”, International Conference on Communication and Signal Processing, April 6-8, 2016, India.
  6. Aase, S.O., Husoy, J.H. and Waldemar, P. (2014) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16.
  7. Ahmed, F. and Moskowitz, I.S. (2014) Composite Signature Based Watermarking for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8.
  8. Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2013) Blind Image Watermarking Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893.
  9. Ali, J.M.H. and Hassanien, A.E. (2012) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104.
  10. Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512.
Index Terms

Computer Science
Information Sciences

Keywords

DST Block Coding Data Hiding