IJMTES – ENHANCING THE QUALITY OF A DIGITAL IMAGE BY APPLYING SIDE MATCH VECTOR QUANTIZATION COMPRESSION SCHEME

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : J.A.Jevin

Volume 01 Issue o5  Year 2014  

ISSN no:  2348-3121 

Page no: 142-148

Abstract—Data hiding in our proposal is applied to achieve the goals of  hiding the secret data into a Side-Match Vector Quantization (SMVQ) compressed image and loss less reconstruction of the original image. The secret data is hidden in compressed codes of the cover image during the encoding process of SMVQ such that the interceptors will never capture the secret information. Together the functions of data hiding and image compression can be integrated together into one single module. Complex blocks are used here to control the visual distortion and error diffusion caused by the progressive compression.. It helps provide higher hiding capacity and maintain the size of the encoded image  same as that of the original image. We use the original image captured on comparison with the trusted image in applying the combination of both the global and local features. In our experimental results, the image quality of  color host image with the secret data embedded is better compared with other methods. This scheme has an overall satisfactory performance for hiding capacity, compression ratio and decompression quality.

Keywords—Data Hiding, SMVQ, Image compression, Loss less reconstruction, Complex blocks.

Reference

[1] Bo Sun And Lawrence Osborne, Lama University Yang Xiao, “Intrusion Detection Techniques In Mobile Ad Hoc And Wireless Sensor Networks”, IEEE Wireless Communications October (2007).
[2] David B. Johnson David A. Maltz, “Dynamic Source Routing”, IEEE Transaction on Networks,november/december (1996).
[3] Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang, and Tarek R. Sheltami, Member, IEEE “ EAACK—A Secure Intrusion-Detection System for MANETs”, IEEE Transactions on Industrial Electronics, Vol. 60, No. 3, March (2013).
[4] G. Jayakumar and G. Gopinath, “Ad hoc mobile wireless networks routing protocol-A review,” J. Comput. Sci., vol. 3, no. 8, pp. 574–582,(2007).
[5] K. Kuladinith, A. S. Timm-Giel, and C. Gorg, “Mobile ad-hoc communications in AEC industry,” J. Inf. Technol. Const., vol. 9, pp. 313–323,(2004).
[6] Lidong Zhou and Zygmunt J. Haas, “Securing Ad Hoc Networks”, IEEE Transaction on Networks,november/december (1999).

Full Pdf Paper-Click Here

Scroll Up