CFP last date
22 July 2024
Reseach Article

Data hiding based on Color Image Compression Technique

Published on May 2013 by Pragati Pal, Sukanya Kulkarni
International Conference and Workshop on Emerging Trends in Technology 2014
Foundation of Computer Science USA
ICWET2014 - Number 1
May 2013
Authors: Pragati Pal, Sukanya Kulkarni
0822f84b-a9f9-414d-b9cc-653c53bc2298

Pragati Pal, Sukanya Kulkarni . Data hiding based on Color Image Compression Technique. International Conference and Workshop on Emerging Trends in Technology 2014. ICWET2014, 1 (May 2013), 21-26.

@article{
author = { Pragati Pal, Sukanya Kulkarni },
title = { Data hiding based on Color Image Compression Technique },
journal = { International Conference and Workshop on Emerging Trends in Technology 2014 },
issue_date = { May 2013 },
volume = { ICWET2014 },
number = { 1 },
month = { May },
year = { 2013 },
issn = 0975-8887,
pages = { 21-26 },
numpages = 6,
url = { /proceedings/icwet2014/number1/16530-1408/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and Workshop on Emerging Trends in Technology 2014
%A Pragati Pal
%A Sukanya Kulkarni
%T Data hiding based on Color Image Compression Technique
%J International Conference and Workshop on Emerging Trends in Technology 2014
%@ 0975-8887
%V ICWET2014
%N 1
%P 21-26
%D 2013
%I International Journal of Computer Applications
Abstract

In recent years use of multimedia is increased astronomically for various purposes. Therefore the files which contains the color images need lots of storage space in computers hard disk. Thus it has become essential to reduce the size of color images by applying some compression techniques so that the transfer of color images over network becomes easier and it takes less storage space. In this theses we present a color block truncation coding along with data hiding. Block Truncation Coding is one of the lossy compression technique which is basically used to reduce the size of digital image. In this method the computational involved is very simple. The compressed file obtained by BTC is further used to hide the secret data by bit reversal method.

References
  1. C. K. Chan and L. M. Cheng, `Hiding Data in Images by Simple LSB Substitution,'Pattern Recognition, Vol. 37, No. 3,Mar. 2004, pp. 469-474.
  2. C. C. Chang, T. S. Chen, and L. Z. Chung, `A Steganographic Method based uponJPEG and Quantization Table Modi_cation,' Information Sciences, Vol. 141,No. 1-2,Mar. 2002,pp 123-138
  3. C. C. Chang,C. Y. Lin, and Y. H. Fan, `Lossless Data Hiding for color images Based on Block Truncation Coding,' Pattern Recognition vol. 41, no. 7, pp. 2347-2357, July 2008.
  4. Y. C. Chou and H. H. Chang,`A Data Hiding Scheme for Color Image Using BTC Compression Technique,' IEEE Int. Conf. on Cognitive Informatics 2010.
  5. W. Bender, D. Gruhl, N. Morimoto, and a. Lu. , `Techniques for data hiding,' IBM Syst. J. 35 (34), no. 3, pp. 313-326, 1996.
  6. R. G. V. Schyndel,A. Z. Tirkel,C. F. Osborne, `A digital watermark' Proceedings of theIEEE International Conference on Image Processing (ICICP-94),Austin Texas, 1986, pp. 86-90.
  7. C. C. Chang, J. S. Hasiao and C. S. Chan, `Finding optimal LSB substitution in image hiding by dynamic programming strategy,' Pattern Recognition 36(7), 2003,pp 1583-1595.
  8. ] Y. H. Yu, C. C. Chang,and Y. C. Hu, `Hiding secret data in images via predictive coding,' Pattern Recognition 38(5) pp. 691-705, 2005.
  9. C. K. Chan, L. M. Cheng, `Hiding data in images by simple LSB substitution ,' Pattern Recognition34(3) 2001, 671-683.
  10. R. Z. Wang,C. F. Lin,J. C. Lin,`Image hiding by optimal LSB substitution and genetic algorithm,' Pattern Recognition(34)3 2001,671-683.
  11. J. Fridrich,M. Goljan and R. Du, `Lossless data embedding-new paradigm in digital watermarking,' Emerging Appl. Multimedia Data Hiding 2002(2) pp. 185-196, 2002.
  12. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, `Reversible Data Hiding' Proceedings of the IEEE International Conference on Image Processing Rochester, NY, 2002, pp. 157-160.
  13. C. De. Vleeschouwer, J. F. Delaigle, B. Macq. , `Circular interpretation of bijective transformation in lossless watermarking for media asset management,' IEEE Trans. Multimedia 5 (1), 2003,pp 97-105.
  14. ] J. Tian, `Reversible data embedding using a di_erence expansion,' IEEE Trans. Circuits Syst. Video Technol. 13(8) pp. 890-896, 2003.
  15. A. M. Allatar, `Reversible watermark using the di_erence expansion of a generalized integer transform ,' IEEE Trans. Image process. 13(8) 2004, 1147-1156.
  16. C. C. Chang, T. S. Chen, L. Z. Chung, `A steganographic method based upon JPEG and quantization table modi_cation,' Inf. Sci. 141 (1) pp. 123-138, 2002.
  17. I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, `Secure spread spectrum watermarking for multimedia' IEEE Trans. Image Process. 6(12), 1997, pp. 1673-1687.
  18. R. M. Gray, `Vector quantization,' IEEE Trans. Commun. 27(9), 1979,pp 1335-1341.
  19. E. J. Delp,O. R. Mitchell,`Image Compression using block truncation coding,' IEEE Trans. Acoust. Speech Signal Process. 1(2), 1984,pp 4-29.
  20. C. C. Chang,Y. C. Chou, and T. D. Kieu, `High capacity data hiding for grayscale Images,' Fundamenta Informaticae, Vol. 86, No. 4, Jul. 2008, pp. 435-446.
Index Terms

Computer Science
Information Sciences

Keywords

Btc Psnr Mean Standard Deviation Bit Plane Data Hiding