Call for Paper - August 2020 Edition
IJCA solicits original research papers for the August 2020 Edition. Last date of manuscript submission is July 20, 2020. Read More

Implementation of Optimum Compression Algorithm for Image and Text Data Transmission using DWT

Print
PDF
IJCA Proceedings on National Conference on Electronics and Communication
© 2015 by IJCA Journal
NCEC 2015 - Number 2
Year of Publication: 2015
Authors:
Sudha Rani J.
Manjunath G.

Sudha Rani J. and Manjunath G.. Article: Implementation of Optimum Compression Algorithm for Image and Text Data Transmission using DWT. IJCA Proceedings on National Conference on Electronics and Communication NCEC 2015(2):21-24, December 2015. Full text available. BibTeX

@article{key:article,
	author = {Sudha Rani J. and Manjunath G.},
	title = {Article: Implementation of Optimum Compression Algorithm for Image and Text Data Transmission using DWT},
	journal = {IJCA Proceedings on National Conference on Electronics and Communication},
	year = {2015},
	volume = {NCEC 2015},
	number = {2},
	pages = {21-24},
	month = {December},
	note = {Full text available}
}

Abstract

Companies, parliaments, institutes and military often need to transfer a highly sensitive data and always be alert about the risk if the data is leaked by unauthorized parties. Encryption can be implemented to securely transfer the data. It can further be secured by a secret key by the sender and sent to the recipient who can decrypt the data only using the secret key created by the sender. Text data being hid in the picture is another method to predict the limited text data, ability and its measure during encoding and decoding. This project involves the plan of how the text and image data can be securely sent from the source to destination without any fear of data being stolen or leaked by the unauthorized parties. The transform methodology used here is "discrete wavelet transform [DWT] and watermark" is embedded in the raw image and can be extracted by the recipient. It exhaustively defines data encoding and decoding using mat lab for small text messages and recommends such features.

References

  • Yvette E. Gelogo and Tai-hoon Kim ,"Compressed images transmission issues and solutions"2006
  • C-C Chang, M. S. Hwang, and T-S Chen. "A new encryption algorithm for image cryptosystems". The Journal of Systems and Software, 58:83–91, 2001
  • Vladimir Cherkassky, Xuhao He, Prakash Balasubramanian, "Wireless transmission of image and video data",1996
  • S. Poongodi and Dr. B,Kalaavathi, "The Transmission of Image and Data Through Video Signal Using Wavelet Transform" 2014.
  • Sourav Bhattacharya, T. Chattopadhyay and Arpan Pal, "A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H. 264/AVC" 2006.
  • Anwar H. Ibrahim and Waleed M. Ibrahim, "Text Hidden in Picture Using Steganography: Algorithms and Implications for Phase Embedding and Extraction Time", IJITCS, vol. 7, no. 3, January / February, 2013.
  • F. Hartung and M. Kutter, "Multimedia watermarking techniques", Proceedings of the IEEE, vol. 87, no. 7, July 1999.
  • I. J. Cox and M. L. Miller, "Electronic watermarking: the first 50 years". Fourth, IEEE Workshop on Multimedia Signal Processing, 2001, pp. 225-230, October 2001.
  • Bibhudendra Acharya1, Saroj Kumar Panigrahy2, Sarat Kumar Patra3, and Ganapati Panda3, "Image encryption using advanced hill cipher algorithm", ACEEE International Journal on Signal and Image Processing Vol 1,No. 1,37-41, Jan 2010.
  • Marwa Abd El-Wahed, Saleh Mesbah, and Amin Shoukr, "Efficiency and Security of some image encryption algorithms", Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008,London, U. K. 978-988, July2- 4,2008.
  • Gang Qiu, Pina Marziliano, Anthony T. S. Ho, Dajun He, and Qibin Sun, "A hybrid watermarking scheme for H. 264/AVC video", Proceedings of the 17th International Conference on Pattern Recognition ICPR, 2004.