CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Implementation of Optimum Compression Algorithm for Image and Text Data Transmission using DWT

Published on December 2015 by Sudha Rani J., Manjunath G.
National Conference on Electronics and Communication
Foundation of Computer Science USA
NCEC2015 - Number 2
December 2015
Authors: Sudha Rani J., Manjunath G.
9a0db579-5328-49a1-8e2a-c21170d4ba4a

Sudha Rani J., Manjunath G. . Implementation of Optimum Compression Algorithm for Image and Text Data Transmission using DWT. National Conference on Electronics and Communication. NCEC2015, 2 (December 2015), 21-24.

@article{
author = { Sudha Rani J., Manjunath G. },
title = { Implementation of Optimum Compression Algorithm for Image and Text Data Transmission using DWT },
journal = { National Conference on Electronics and Communication },
issue_date = { December 2015 },
volume = { NCEC2015 },
number = { 2 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 21-24 },
numpages = 4,
url = { /proceedings/ncec2015/number2/23717-1747/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Electronics and Communication
%A Sudha Rani J.
%A Manjunath G.
%T Implementation of Optimum Compression Algorithm for Image and Text Data Transmission using DWT
%J National Conference on Electronics and Communication
%@ 0975-8887
%V NCEC2015
%N 2
%P 21-24
%D 2015
%I International Journal of Computer Applications
Abstract

Companies, parliaments, institutes and military often need to transfer a highly sensitive data and always be alert about the risk if the data is leaked by unauthorized parties. Encryption can be implemented to securely transfer the data. It can further be secured by a secret key by the sender and sent to the recipient who can decrypt the data only using the secret key created by the sender. Text data being hid in the picture is another method to predict the limited text data, ability and its measure during encoding and decoding. This project involves the plan of how the text and image data can be securely sent from the source to destination without any fear of data being stolen or leaked by the unauthorized parties. The transform methodology used here is "discrete wavelet transform [DWT] and watermark" is embedded in the raw image and can be extracted by the recipient. It exhaustively defines data encoding and decoding using mat lab for small text messages and recommends such features.

References
  1. Yvette E. Gelogo and Tai-hoon Kim ,"Compressed images transmission issues and solutions"2006
  2. C-C Chang, M. S. Hwang, and T-S Chen. "A new encryption algorithm for image cryptosystems". The Journal of Systems and Software, 58:83–91, 2001
  3. Vladimir Cherkassky, Xuhao He, Prakash Balasubramanian, "Wireless transmission of image and video data",1996
  4. S. Poongodi and Dr. B,Kalaavathi, "The Transmission of Image and Data Through Video Signal Using Wavelet Transform" 2014.
  5. Sourav Bhattacharya, T. Chattopadhyay and Arpan Pal, "A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H. 264/AVC" 2006.
  6. Anwar H. Ibrahim and Waleed M. Ibrahim, "Text Hidden in Picture Using Steganography: Algorithms and Implications for Phase Embedding and Extraction Time", IJITCS, vol. 7, no. 3, January / February, 2013.
  7. F. Hartung and M. Kutter, "Multimedia watermarking techniques", Proceedings of the IEEE, vol. 87, no. 7, July 1999.
  8. I. J. Cox and M. L. Miller, "Electronic watermarking: the first 50 years". Fourth, IEEE Workshop on Multimedia Signal Processing, 2001, pp. 225-230, October 2001.
  9. Bibhudendra Acharya1, Saroj Kumar Panigrahy2, Sarat Kumar Patra3, and Ganapati Panda3, "Image encryption using advanced hill cipher algorithm", ACEEE International Journal on Signal and Image Processing Vol 1,No. 1,37-41, Jan 2010.
  10. Marwa Abd El-Wahed, Saleh Mesbah, and Amin Shoukr, "Efficiency and Security of some image encryption algorithms", Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008,London, U. K. 978-988, July2- 4,2008.
  11. Gang Qiu, Pina Marziliano, Anthony T. S. Ho, Dajun He, and Qibin Sun, "A hybrid watermarking scheme for H. 264/AVC video", Proceedings of the 17th International Conference on Pattern Recognition ICPR, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Video Watermarking Dwt Encryption.