Compression and Segmentation of JPEG Images Using DWT

被引:0
作者
Gomathi, T. [1 ]
机构
[1] Sathyabama Univ, Dept Elect & Telecommun Engn, Madras 119, Tamil Nadu, India
来源
RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES | 2015年 / 6卷 / 02期
关键词
Data hiding; JPEG; steganography; DCT; DWT; IWT; EDCC; Turbo Code; IIWT and IDWT;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Hiding capacity is very important for efficient covert communications. For JPEG compressed images, it is necessary to enlarge the hiding capacity because the available redundancy is very limited. Steganography enables to have a secret communication in modern information technology using Dual Transform Technique for Robust Steganography (DTTRS) [1]. The implementation of the Dual transform technique is carried out in the following sequences. The JPEG compressed grayscale cover image is segmented into 4*4 blocks each and Discrete Wavelet Transform (DWT) is applied on each block. The blocks of vertical band of 2*2 each obtained from the resulting DWT coefficients are considered and Integer Wavelet Transform (IWT) is applied to get blocks of 1*1 each. Next, to each 1*1 Block of the cover image, the secret data is embedded using LSB replacement technique. On applying IIWT and IDWT, stego image is derived. Error Detection and Correction Code (EDCC) technique is implemented to ensure more reliable communication. For EDCC, Turbo Codes have been implemented in the field of forward error correction and high performance error correction so as to achieve maximal information over a limited bandwidth communication link. The encoded message is now hidden into the DWT and IWT transformed cover image by LSB substitution method. At the receiver side, the stego image is subjected to IIWT and IDWT. Then the encoded secret data is retrieved after error detection and correction by the decoding process.
引用
收藏
页码:1682 / 1694
页数:13
相关论文
共 17 条
  • [1] Abdelwahab A.A., 2008, P 25 NAT RAD SCI C E
  • [2] Bhattacharyya Souvik, 2010, Proceedings of the 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010), P173, DOI 10.1109/ITC.2010.68
  • [3] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [4] A steganographic method based upon JPEG and quantization table modification
    Chang, CC
    Chen, TS
    Chung, LZ
    [J]. INFORMATION SCIENCES, 2002, 141 (1-2) : 123 - 138
  • [5] Chen P. Y., 2002, 2002 IEEE INT S INT, P453
  • [6] Chen Yongqiang, 2010, INT C EL CONTR ENG, V18, P74
  • [7] El Safy R. O., 2009, 2009 International Conference on Networking and Media Convergence (ICNM'09), P111, DOI 10.1109/ICNM.2009.4907200
  • [8] Secret Communication Using JPEG Double Compression
    Guo, Jing-Ming
    Le, Thanh-Nam
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (10) : 879 - 882
  • [9] Jaskolka J., 2011, P 44 HAW INT C SYST, P1, DOI DOI 10.1145/2179298.2179343
  • [10] Jiun-Jian Liaw, 2010, Proceedings of the 2010 Fourth International Conference on Genetic and Evolutionary Computing (ICGEC 2010), P650, DOI 10.1109/ICGEC.2010.166