Top Banner
 IJSTE - International Journal of Science Technology & Engineering | Volume 1 | Issue 12 | June 2015 ISSN (online): 2349-784X All rights reserved by www.ijste.org  51 A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting Pooja M. Patil Dr. V. R.Udupi  PG Scholar Professor  Department of Electronics and Communication Engineering Department of Electronics and Communication Engineering Gogte Institute of Technology, Belgaum, India Gogte Institute of Technology, Belgaum, India Prof. Subrahmanya  Professor  Department of Electronics and Communication Engineering  Gogte Institute of Technology, Belgaum, India Abstract  In this paper, we propose a joint data-hiding and compression scheme for the images using the compression method that is side match vector quantization (SMVQ) and image in painting. Here we are going to use two functions as data hiding and image compression can be integrated into one module. Then on the sender side, except for the blocks which are in the leftmost and topmost of image, and then by raster scanning each residual block is being embedded with the compress simultaneously by the SMVQ and in painting image and according to current bit. And the VQ that is vector quantization is done only for the complex  block that it controls the distortion and diffusion err or which causes by compression. Then at receiver side, after segmentin g the image which was having compressed codes into the section of series by bits of indicator, so at the receiver it achieves the decompression and extraction the secret bits successful that is by the process of index value used in section of segmentation. The results will demonstrate the propose scheme. Keywords: Image Compression, Side Match Vector Quantization (SMVQ), Data Hiding, Image In Painting  _______________________________ I. INTRODUCTION The rapid development of Internet technology that in development, people can transmit the data and share digital (images, video) content with each other conveniently and it is rapidly used. In order to guarantee communication (that is internet) efficiency and save the network bandwidth, efficiency, compression techniques can be implemented in digital components to reduce redundancy, noise and the quality of the decompressed should also be preserved. Most digital content, digital images and videos, are converted into the compressed form of transmission. Another important issue in a network environment is how to transmit the secret or private data securely through the internet. In the traditional cryptographic methods, the encryption process is used to convert the plaintext into cipher text using the encryption algorithm; the meaningless random data of the ciphertext may also arouse the suspicion from the attacker. On the other side decryption process are used to convert the Ciphertext into plain text. Ciphertext implies meaningless random data. Even though cryptographic methods are providing better security, there may be a chance of finding a plain text by the attacker. To solve this problem in steganography technique is developed in both academia, industry and more. The goal of cryptography is to make text/information unreadable by a third party or attacker, whereas the goal of steganography is to hide the data from a third party or attacker. Due to the rapid use of digital images on the Internet, how to compress the images and hide the secret data into the compressed form of images efficiently deserves in depth study. There many data hiding schemes for compress ed codes that it is applied to hide the data ,i.e stenography etc. which apply to various different compression techniques of images, that may be JPEG200, JPEG, vector quantization (VQ). But digital images are most popular because of their usage on the internet. Different application uses different Steganography techniques on their requirements Lossy data compression techniques that create smaller image by discarding excess image pixel from the original image. VQ is used due to its simplicity and cost effectiveness for digital image compression. The Euclidean distance is taken to evaluate the similarity between the codewords in the codebook and image block for the VQ compression process. The block is represented, that is recorded which is having the index of the codeword with smallest distance. The index values containing in the table for all  blocks are generated as code of VQ compression. And only index values are stored instead of pixel values. And through lookup table for each received index, that is a VQ decompression process. The side match vector quantization (SMVQ) is an improved version of VQ. Both the subcodebooks and codebook are used to generate index value.
7

A Novel Joint Data Hiding and Compression Scheme Based On SMVQ and Image Inpainting

Nov 01, 2015

Download

Documents

IJSTE

In this paper, we propose a joint data-hiding and compression scheme for the images using the compression method that is side match vector quantization (SMVQ) and image in painting. Here we are going to use two functions as data hiding and image compression can be integrated into one module. Then on the sender side, except for the blocks which are in the leftmost and topmost of image, and then by raster scanning each residual block is being embedded with the compress simultaneously by the SMVQ and in painting image and according to current bit. And the VQ that is vector quantization is done only for the complex block that it controls the distortion and diffusion error which causes by compression. Then at receiver side, after segmenting the image which was having compressed codes into the section of series by bits of indicator, so at the receiver it achieves the decompression and extraction the secret bits successful that is by the process of index value used in section of segmentation. The results will demonstrate the propose scheme.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • IJSTE - International Journal of Science Technology & Engineering | Volume 1 | Issue 12 | June 2015 ISSN (online): 2349-784X

    All rights reserved by www.ijste.org

    51

    A Novel Joint Data Hiding and Compression

    Scheme Based on SMVQ and Image Inpainting

    Pooja M. Patil Dr. V. R.Udupi

    PG Scholar Professor

    Department of Electronics and Communication Engineering Department of Electronics and Communication Engineering

    Gogte Institute of Technology, Belgaum, India Gogte Institute of Technology, Belgaum, India

    Prof. Subrahmanya

    Professor

    Department of Electronics and Communication Engineering

    Gogte Institute of Technology, Belgaum, India

    Abstract

    In this paper, we propose a joint data-hiding and compression scheme for the images using the compression method that is side

    match vector quantization (SMVQ) and image in painting. Here we are going to use two functions as data hiding and image

    compression can be integrated into one module. Then on the sender side, except for the blocks which are in the leftmost and

    topmost of image, and then by raster scanning each residual block is being embedded with the compress simultaneously by the

    SMVQ and in painting image and according to current bit. And the VQ that is vector quantization is done only for the complex

    block that it controls the distortion and diffusion error which causes by compression. Then at receiver side, after segmenting the

    image which was having compressed codes into the section of series by bits of indicator, so at the receiver it achieves the

    decompression and extraction the secret bits successful that is by the process of index value used in section of segmentation. The

    results will demonstrate the propose scheme.

    Keywords: Image Compression, Side Match Vector Quantization (SMVQ), Data Hiding, Image In Painting

    ________________________________________________________________________________________________________

    I. INTRODUCTION

    The rapid development of Internet technology that in development, people can transmit the data and share digital (images, video)

    content with each other conveniently and it is rapidly used. In order to guarantee communication (that is internet) efficiency and

    save the network bandwidth, efficiency, compression techniques can be implemented in digital components to reduce

    redundancy, noise and the quality of the decompressed should also be preserved. Most digital content, digital images and videos,

    are converted into the compressed form of transmission. Another important issue in a network environment is how to transmit

    the secret or private data securely through the internet.

    In the traditional cryptographic methods, the encryption process is used to convert the plaintext into cipher text using the

    encryption algorithm; the meaningless random data of the ciphertext may also arouse the suspicion from the attacker. On the

    other side decryption process are used to convert the Ciphertext into plain text. Ciphertext implies meaningless random data.

    Even though cryptographic methods are providing better security, there may be a chance of finding a plain text by the attacker.

    To solve this problem in steganography technique is developed in both academia, industry and more. The goal of cryptography is

    to make text/information unreadable by a third party or attacker, whereas the goal of steganography is to hide the data from a

    third party or attacker. Due to the rapid use of digital images on the Internet, how to compress the images and hide the secret data

    into the compressed form of images efficiently deserves in depth study.

    There many data hiding schemes for compressed codes that it is applied to hide the data ,i.e stenography etc. which apply to

    various different compression techniques of images, that may be JPEG200, JPEG, vector quantization (VQ). But digital images

    are most popular because of their usage on the internet. Different application uses different Steganography techniques on their

    requirements

    Lossy data compression techniques that create smaller image by discarding excess image pixel from the original image. VQ is

    used due to its simplicity and cost effectiveness for digital image compression. The Euclidean distance is taken to evaluate the

    similarity between the codewords in the codebook and image block for the VQ compression process. The block is represented,

    that is recorded which is having the index of the codeword with smallest distance. The index values containing in the table for all

    blocks are generated as code of VQ compression. And only index values are stored instead of pixel values. And through lookup

    table for each received index, that is a VQ decompression process.

    The side match vector quantization (SMVQ) is an improved version of VQ. Both the subcodebooks and codebook are used to

    generate index value.

  • A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting (IJSTE/ Volume 1 / Issue 12 / 011)

    All rights reserved by www.ijste.org

    52

    II. JOINT DATA HIDING AND COMPRESSION SCHEME

    The JDHC scheme not only focuses on the high hiding capacity and recovery quality, it also integrates the image compression

    and data hiding into a single module. The JDHC scheme is based on SMVQ and the image in the painting. The Side match

    vector quantization (SMVQ) was implemented as an advanced version of VQ in which subcode books are used to data hiding

    and compression [Fig 1.2].

    Codebook refers to leftmost column and topmost row and leftmost column blocks. Sub Codebook refers to blocks excluding

    the topmost row and leftmost column. To increase the embedding rate in SMVQ Weighted Square Euclidean Distance is used.

    Additionally, in decompression process, the receiver can obtain the hidden data/image bits at any time if he or she preserves the

    compressed codes.

    Fig. 1.1 Fig. 1.2

    Fig. 1.1: Original Image, Fig. 1.2: output image gotsby JDHC Scheme. The Output is formation on combined VQ+SMVQ+Image in

    painting.

    Image Compression and Secret Data Embedding: A.

    As from VQ, SMVQ was developed the block of decompressed image and it increases the compression ratio. The indices of the

    sub codebooks are store and the correlation of neighbouring block is considered. It can be achieved by using the better

    decompression quality by using the standard algorithm that is of SMVQ, and it gets suitable form of embed secret bits.

    Fig. 1.3: Flowchart of compression and secret data embedding (Compression + Data Hiding).

    As in this technique we will be having a codebook that is at sender and receiver will have same codebook. As the original

    image I is divided into blocks as in figure 1.3 then the process is that it is divided such that there is no remainder and then

    divided blocks got. As the block in the leftmost and the top of image is encode with the process of VQ and to embed secret bits it

    is not being used. After that smallest MSE is being selected that is denoted by Er. If the Er is greater than the threshold value it

  • A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting (IJSTE/ Volume 1 / Issue 12 / 011)

    All rights reserved by www.ijste.org

    53

    then locates the complex blocks and are used and gets the lower correlation with neighbor blocks, so to achieve better

    decompression the with the separate codebook is used with independent VQ, then it used for the compression but no bits are

    embed in to it. And if Er is less than the threshold value then shows the smooth region, and it has higher correlation so the

    condition used is SMVQ or image inapinting to compress the block with the these of method and accordingly the secret bits are

    being added to it and which then shows the result in embedding the secret bits.

    And if Er is less than the threshold T and it having the secret bit with 0 for the embedding, then the process used is SMVQ

    method for the compression process. And otherwise the secret bit is having the value as 1 with Er less than the threshold T, then

    the technique used is inapinting image for the compression process.

    The technique of inpainting is basically used for the purpose of repairing the artworks in ancient they were repairing manually.

    And then for images that this method was used for repairing the photograph, if unwanted part in photo to remove it, wiping

    watermarks. It can generate or create the image which are available in that photo or etc. There exits three class of inapinting

    image, based on PDE, interpolation metgod and patch base method. Byt the Pde based it is mostly used to propogate the gray

    values automatic from the surrounding into part or region to do the inpaint.and there are physics model that usesa PDE method

    for inpainting that is heat transfer model and also the fluid dynamics. And for the different models it contains the different

    methods for information propogation. Inpainting can be used for image that to recover thestructural information, it is applied

    only when it is not to large.

    The fluid mechanics is used using the PDE base inpainting image. Image inpainting. The region which is used for the

    compression purpose and contains the inpainting part is done once again for the purpose to get the original form of image. The

    block is repeated until it is taken under the condition satisfies and process continues. The process of compression and secret data

    embedding is described and it finishes the residual block are processed. After that the compressed code all block are then

    concatenated and then it is transmitted to receiver side.

    Image Decompression and Secret Data Extraction: B.

    After receiving the compress code, then at receiver it conducts the process of decompression that obtains the image of decode

    and which is much similar to the original uncompressed image and the secret bits can be extracted before or during the

    decompression method and it contains the process of decompression and extraction process. We will see how that all process

    takes place as shown below diagram.

    Fig. 1.4: Flowchart of decompression and secret data extraction. (Decompression + Data Extraction).

    The blocks in the leftmost and top most must use for the decompression process for each residual block, they must be

    decompressed by the VQ indices of compress image code. By using the raster scanning order for each residual block are

    processed. As shown in figure 1.4 it shows the decompression and extraction of secret data flow chart. According to indicator

    bits, the compression codes are segmented into series of sections that conducts the decompression and secret bit extraction. If the

    current indicator bit of compress code is zero. This means that session corresponds to VQ compress block which doesnt have

  • A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting (IJSTE/ Volume 1 / Issue 12 / 011)

    All rights reserved by www.ijste.org

    54

    secret bit embed. The decimal value of last bits of decimal used to recover the block. If the bit of the indicator is 1, then it is

    segmented as a session which corresponds to SMVQ or image inpainting of compress block. If decimal value of last bit in the

    session, which corresponds to residual block was compress by inpainting and secret bit was 1. Otherwise it implies the session

    corresponds to SMVQ and secret bit embed is zero.

    If the segmented session corresponds to inpainting then it is recover with inpainting technique with compression techniques,

    otherwise corresponds to SMVQ block, index value of SMVQ is used to recover this block. The codeword with the smallest

    MSE are chosen to generate a sub codebook to recover the block.

    After the segment section compress code complete the above described procedure, the secret bit embed that can be extracted

    correctly and decompress image can be obtain. Because of use of decoding for the compress code, decompress image doesnt contain the secret bits embed.

    III. RESULTS

    Transmitter Side: A.

    Figure 1 shows the Original image.

    Figure 2 shows the secret image.

    Figure 3 shows the Encrypted corrupted image.

  • A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting (IJSTE/ Volume 1 / Issue 12 / 011)

    All rights reserved by www.ijste.org

    55

    Figure 4 shows the inpainted embedded image.

    Figure 5 shows the threshold value T

    Receiver Side: B.

    Figure 6 shows the decrypted corrupted image.

    Figure 7 shows the inpainted decrypted image.

    Figure 8 shows the secret image which is extracted.

  • A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting (IJSTE/ Volume 1 / Issue 12 / 011)

    All rights reserved by www.ijste.org

    56

    Figure 9 shows the plot for threshold and hiding capacity.

    Its shows the value of PSNR and Compression ratio.

    IV. CONCLUSION

    In this work, we propose a joint data hiding and compress scheme by the method of SMVQ and image inpainting. And the block

    with left part and top most part of image are used for the secret bits embed and compression at single time, the compression

    switches between the SMVQ and image inpainting method that is according to bits. And also VQ is use for the complex block

    that control visul distortion and error diffusion. At receiver side the segmented compress code into serie of section by its,and then

    the secret bits are extracted to index value in segment section, decompression is achieved by the method of SMVQ, VQ and

    image inpainting. Futher more that is propose scheme has 2 function of data hiding and compression into one module.

    REFERENCES

    [1] W. B. Pennebaker and J. L. Mitchell, The JPEG Still Image Data Compression Standard. New York: Reinhold, 1993. [2] D. S. Taubman and M. W. Marcellin, JPEG2000: Image Compression Fundamentals, Standards and Practice. Norwell, MA: Kluwer, 2002. [3] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression.Norwell, MA: Kluwer, 1992 [4] N. M. Nasrabadi and R. King, Image Coding Using Vector Quantization:A Review, IEEE Transactions on Communications, vol. 36, no. 8, 1988. [5] National Institute of Standards & Technology, Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards

    Publication, vol. 197, no. l, 2001.

    [6] R. L. Rivest, A. Shamir and L. Adleman, A Method for Obtaining DigitalSignatures and Public-Key Cryptosystems, Communications of the ACM,vol. 21, no. 2, pp. 120-126, 1978.

    [7] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information Hiding A Survey, Proceedings of the IEEE, vol. 87, no. 7, 1999. [8] C. D. Vleeschouwer, J. F. Delaigle and B Macq, Invisibility and Application Functionalities in Perceptual Watermarking: An Overview,Proceedings of

    the IEEE, vol. 90, no. 1, 2002.

    [9] C. C. Chang, T. S. Chen and L. Z. Chung, A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, vol. 141, no. 1, 2002.

    [10] H. W. Tseng and C. C. Chang, High Capacity Data Hiding inJPEG-Compressed Images, Informatica, vol. 15, no. 1, 2004. [11] P. C. Su and C. C. Kuo, Steganography in JPEG2000 Compressed Images, IEEE Transactions on Consumer Electronics, vol. 49, no. 4, 2003. [12] W. J. Wang, C. T. Huang and S. J. Wang, VQ Applications inSteganographic Data Hiding Upon Multimedia Images, IEEE Systems Journal, vol. 5, no. 4,

    2011.

    [13] Y. C. Hu, High-Capacity Image Hiding Scheme Based on Vector Quantization, Pattern Recognition, vol. 39, no. 9, 2006. [14] C. C. Chang and W. C. Wu, Hiding Secret Data Adaptively in VectorQuantisation Index Tables, IEE Proceedings - Vision, Image and Signal Processing,

    vol. 153, no. 5, 2006.

    [15] C. C. Lin, S. C. Chen and N. L. Hsueh, Adaptive Embedding Techniques for VQ-Compressed Images, Information Sciences, vol. 179, no. 3, 2009.