CFP last date
22 April 2024
Reseach Article

Data Compression and Hiding using Improved Vector Quantization Techniques

Published on April 2014 by A. Suresh, P. Malathi
Machine Learning: Challenges and Opportunities Ahead
Foundation of Computer Science USA
MLCONF - Number 1
April 2014
Authors: A. Suresh, P. Malathi
12cfd6d2-510d-4575-9230-7189bcee5ccc

A. Suresh, P. Malathi . Data Compression and Hiding using Improved Vector Quantization Techniques. Machine Learning: Challenges and Opportunities Ahead. MLCONF, 1 (April 2014), 17-22.

@article{
author = { A. Suresh, P. Malathi },
title = { Data Compression and Hiding using Improved Vector Quantization Techniques },
journal = { Machine Learning: Challenges and Opportunities Ahead },
issue_date = { April 2014 },
volume = { MLCONF },
number = { 1 },
month = { April },
year = { 2014 },
issn = 0975-8887,
pages = { 17-22 },
numpages = 6,
url = { /proceedings/mlconf/number1/16134-1012/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Machine Learning: Challenges and Opportunities Ahead
%A A. Suresh
%A P. Malathi
%T Data Compression and Hiding using Improved Vector Quantization Techniques
%J Machine Learning: Challenges and Opportunities Ahead
%@ 0975-8887
%V MLCONF
%N 1
%P 17-22
%D 2014
%I International Journal of Computer Applications
Abstract

Generally, Embedding of needful information in a host signal without any loss of host information is required for copyrights protection. Customer identification can be embedded directly into multimedia files, this guide to a number of definite requirements with respect to robustness, simplicity and complexity. In early stages, data hiding can be processed based on vector quantization (VQ) compressed code. Most of this method just hides data into the VQ compressed code, other than not dealing with the quality of VQ decompressed image. Furthermore, if the hiding method is irreversible then the quality of VQ decompressed image shall be not as good as PSNR values and mapping vectors from a vector space to a finite number of regions in that space need more time to search regions. To overcome these problems, vector quantization in data hiding schema proposed a K-Means Multi-Objective Genetic Algorithm (KMOGA) with vector quantization methods. In this proposed approach, a finite number of regions results are found from K-Means multi-objective genetic algorithm and vector quantization technique which can split and compress the data into smaller groups and are embedded into the multimedia pixels. This KMOGA-VQ method enables for effective pixel utilization and retrieves the content without any loss of original pixels. This kind of KMOGA-VQ is based on indices, whereas, the data content can be mapped into many to one form than VQ methods.

References
  1. Petitcolas, FAP, Anderson, RJ and Kuhn, MG, 1999. "Information hiding-a survey," Proceedings of the IEEE, Vol. 87, No. 7, pp. 1062-1078.
  2. Chang, CC, Hsiao, JY, and Chan, CS, 2003. "Finding Optimal Least Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy," Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595.
  3. Yang, CH, 2008. "Inverted Pattern Approach to Improve Image Quality of Information Hiding by LSB Substitution," Pattern Recognition, Vol. 41, No. 8, pp. 2674-2683.
  4. Chang, CK and Cheng, LM, 2004. "Hiding Data in Images by Simple LSB Substitution," Pattern Recognition, Vol. 37, No. 3, pp. 469-474.
  5. Barton, JM, 1997. "Method and apparatus for embedding authentication information within digital data," U. S. Patent 5 646 997.
  6. Bruyndonckx, O, Quisquater, JJ and Macq, B, 1995. "Spatial method for copyright labeling of digital images", Proceedings of IEEE Nonlinear Signal Processing Workshop, pp. 456-459.
  7. Jayaraman S, Esakkirajan S, Veerakumar T, 2009. "Digital image processing copyright",tata Mcgraw Hill Education private limited.
  8. Jamal Hussein, 2010. "Spatial domain Watermarking scheme for color images based on log average luminance", Int'l Journal of Computing, Volume 2, Issue 1.
  9. Nikolaidis and Pitas, 1998. "Robust Image Watermarking the Spatial Domain", International Journal of Signal Processing", Vol. 66, Issue 3, pp. 385 – 403.
  10. Verma P, Agarwal, DP and Jain S, 2007. "Spatial Domain Robust Blind Watermarking for Color Image", Asian Journal of Information Technology, Vol. 6, Issue. 4, pp. 430 – 435.
  11. Wu, DC, Tsai, WH. , 2000. "Spatial-Domain Image Hiding Using an Image Differencing", IEEE Proceedings -Vision, Image and Signal Processing, Vol. 147, Issue. 1, pp. 29 – 37.
  12. Juan Hernandez, Martin Amado, Fernando Perez, 2000. "DCT Domain Watermarking Techniques for Still Images: Detector Performance analysis and new structure", IEEE Transactions on Image Processing, Vol. 9, No. 1, pp. 55 – 68.
  13. Ali Al-Haj, 2007. "Combined DWT – DCT Digital Image Watermarking", Journal of ComputerScience, Vol. 3, Issue. 9, pp. 740-746.
  14. Lu, ZM, Sun, SH, 2000. "Digital image watermarking technique based on vector quantisation," Electronics Letters, Vol. 36, No. 4, pp. 303-305.
  15. Jo, M and Kim, HD, 2002. "A digital image watermarking scheme based on vector quantization," IEICE Transactions on Information and Systems, Vol. E85-D, No. 6, pp. 1054-1056.
  16. Chang, CC, Wu, WC and Hu, YC, 2007. "Lossless recovery of a VQ index table with embedded secret data," Journal of Visual Communication and Image Representation, Vol. 18, No. 3, pp. 207-216.
  17. Yang, CH and Lin, YC, 2009. "Reversible data hiding of a VQ index table based on referred counts," Journal of Visual Communication and Image Representation, Vol. 20, No. 6, pp. 399-407.
Index Terms

Computer Science
Information Sciences

Keywords

Data Hiding Stenography Water Marking Vector Quantization Copyright Protections.