Vous êtes sur la page 1sur 6

IJSTE - International Journal of Science Technology & Engineering | Volume 1 | Issue 12 | June 2015

ISSN (online): 2349-784X

A Novel Joint Data Hiding and Compression


Scheme Based on SMVQ and Image Inpainting
Pooja M. Patil
PG Scholar
Department of Electronics and Communication Engineering
Gogte Institute of Technology, Belgaum, India

Dr. V. R.Udupi
Professor
Department of Electronics and Communication Engineering
Gogte Institute of Technology, Belgaum, India

Prof. Subrahmanya
Professor
Department of Electronics and Communication Engineering
Gogte Institute of Technology, Belgaum, India

Abstract
In this paper, we propose a joint data-hiding and compression scheme for the images using the compression method that is side
match vector quantization (SMVQ) and image in painting. Here we are going to use two functions as data hiding and image
compression can be integrated into one module. Then on the sender side, except for the blocks which are in the leftmost and
topmost of image, and then by raster scanning each residual block is being embedded with the compress simultaneously by the
SMVQ and in painting image and according to current bit. And the VQ that is vector quantization is done only for the complex
block that it controls the distortion and diffusion error which causes by compression. Then at receiver side, after segmenting the
image which was having compressed codes into the section of series by bits of indicator, so at the receiver it achieves the
decompression and extraction the secret bits successful that is by the process of index value used in section of segmentation. The
results will demonstrate the propose scheme.
Keywords: Image Compression, Side Match Vector Quantization (SMVQ), Data Hiding, Image In Painting
________________________________________________________________________________________________________

I. INTRODUCTION
The rapid development of Internet technology that in development, people can transmit the data and share digital (images, video)
content with each other conveniently and it is rapidly used. In order to guarantee communication (that is internet) efficiency and
save the network bandwidth, efficiency, compression techniques can be implemented in digital components to reduce
redundancy, noise and the quality of the decompressed should also be preserved. Most digital content, digital images and videos,
are converted into the compressed form of transmission. Another important issue in a network environment is how to transmit
the secret or private data securely through the internet.
In the traditional cryptographic methods, the encryption process is used to convert the plaintext into cipher text using the
encryption algorithm; the meaningless random data of the ciphertext may also arouse the suspicion from the attacker. On the
other side decryption process are used to convert the Ciphertext into plain text. Ciphertext implies meaningless random data.
Even though cryptographic methods are providing better security, there may be a chance of finding a plain text by the attacker.
To solve this problem in steganography technique is developed in both academia, industry and more. The goal of cryptography is
to make text/information unreadable by a third party or attacker, whereas the goal of steganography is to hide the data from a
third party or attacker. Due to the rapid use of digital images on the Internet, how to compress the images and hide the secret data
into the compressed form of images efficiently deserves in depth study.
There many data hiding schemes for compressed codes that it is applied to hide the data ,i.e stenography etc. which apply to
various different compression techniques of images, that may be JPEG200, JPEG, vector quantization (VQ). But digital images
are most popular because of their usage on the internet. Different application uses different Steganography techniques on their
requirements
Lossy data compression techniques that create smaller image by discarding excess image pixel from the original image. VQ is
used due to its simplicity and cost effectiveness for digital image compression. The Euclidean distance is taken to evaluate the
similarity between the codewords in the codebook and image block for the VQ compression process. The block is represented,
that is recorded which is having the index of the codeword with smallest distance. The index values containing in the table for all
blocks are generated as code of VQ compression. And only index values are stored instead of pixel values. And through lookup
table for each received index, that is a VQ decompression process.
The side match vector quantization (SMVQ) is an improved version of VQ. Both the subcodebooks and codebook are used to
generate index value.

All rights reserved by www.ijste.org

51

A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting
(IJSTE/ Volume 1 / Issue 12 / 011)

II. JOINT DATA HIDING AND COMPRESSION SCHEME


The JDHC scheme not only focuses on the high hiding capacity and recovery quality, it also integrates the image compression
and data hiding into a single module. The JDHC scheme is based on SMVQ and the image in the painting. The Side match
vector quantization (SMVQ) was implemented as an advanced version of VQ in which subcode books are used to data hiding
and compression [Fig 1.2].
Codebook refers to leftmost column and topmost row and leftmost column blocks. Sub Codebook refers to blocks excluding
the topmost row and leftmost column. To increase the embedding rate in SMVQ Weighted Square Euclidean Distance is used.
Additionally, in decompression process, the receiver can obtain the hidden data/image bits at any time if he or she preserves the
compressed codes.

Fig. 1.1
Fig. 1.2
Fig. 1.1: Original Image, Fig. 1.2: output image gotsby JDHC Scheme. The Output is formation on combined VQ+SMVQ+Image in
painting.

A. Image Compression and Secret Data Embedding:


As from VQ, SMVQ was developed the block of decompressed image and it increases the compression ratio. The indices of the
sub codebooks are store and the correlation of neighbouring block is considered. It can be achieved by using the better
decompression quality by using the standard algorithm that is of SMVQ, and it gets suitable form of embed secret bits.

Fig. 1.3: Flowchart of compression and secret data embedding (Compression + Data Hiding).

As in this technique we will be having a codebook that is at sender and receiver will have same codebook. As the original
image I is divided into blocks as in figure 1.3 then the process is that it is divided such that there is no remainder and then
divided blocks got. As the block in the leftmost and the top of image is encode with the process of VQ and to embed secret bits it
is not being used. After that smallest MSE is being selected that is denoted by Er. If the Er is greater than the threshold value it

All rights reserved by www.ijste.org

52

A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting
(IJSTE/ Volume 1 / Issue 12 / 011)

then locates the complex blocks and are used and gets the lower correlation with neighbor blocks, so to achieve better
decompression the with the separate codebook is used with independent VQ, then it used for the compression but no bits are
embed in to it. And if Er is less than the threshold value then shows the smooth region, and it has higher correlation so the
condition used is SMVQ or image inapinting to compress the block with the these of method and accordingly the secret bits are
being added to it and which then shows the result in embedding the secret bits.
And if Er is less than the threshold T and it having the secret bit with 0 for the embedding, then the process used is SMVQ
method for the compression process. And otherwise the secret bit is having the value as 1 with Er less than the threshold T, then
the technique used is inapinting image for the compression process.
The technique of inpainting is basically used for the purpose of repairing the artworks in ancient they were repairing manually.
And then for images that this method was used for repairing the photograph, if unwanted part in photo to remove it, wiping
watermarks. It can generate or create the image which are available in that photo or etc. There exits three class of inapinting
image, based on PDE, interpolation metgod and patch base method. Byt the Pde based it is mostly used to propogate the gray
values automatic from the surrounding into part or region to do the inpaint.and there are physics model that usesa PDE method
for inpainting that is heat transfer model and also the fluid dynamics. And for the different models it contains the different
methods for information propogation. Inpainting can be used for image that to recover thestructural information, it is applied
only when it is not to large.
The fluid mechanics is used using the PDE base inpainting image. Image inpainting. The region which is used for the
compression purpose and contains the inpainting part is done once again for the purpose to get the original form of image. The
block is repeated until it is taken under the condition satisfies and process continues. The process of compression and secret data
embedding is described and it finishes the residual block are processed. After that the compressed code all block are then
concatenated and then it is transmitted to receiver side.
B. Image Decompression and Secret Data Extraction:
After receiving the compress code, then at receiver it conducts the process of decompression that obtains the image of decode
and which is much similar to the original uncompressed image and the secret bits can be extracted before or during the
decompression method and it contains the process of decompression and extraction process. We will see how that all process
takes place as shown below diagram.

Fig. 1.4: Flowchart of decompression and secret data extraction. (Decompression + Data Extraction).
The blocks in the leftmost and top most must use for the decompression process for each residual block, they must be
decompressed by the VQ indices of compress image code. By using the raster scanning order for each residual block are
processed. As shown in figure 1.4 it shows the decompression and extraction of secret data flow chart. According to indicator
bits, the compression codes are segmented into series of sections that conducts the decompression and secret bit extraction. If the
current indicator bit of compress code is zero. This means that session corresponds to VQ compress block which doesnt have

All rights reserved by www.ijste.org

53

A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting
(IJSTE/ Volume 1 / Issue 12 / 011)

secret bit embed. The decimal value of last bits of decimal used to recover the block. If the bit of the indicator is 1, then it is
segmented as a session which corresponds to SMVQ or image inpainting of compress block. If decimal value of last bit in the
session, which corresponds to residual block was compress by inpainting and secret bit was 1. Otherwise it implies the session
corresponds to SMVQ and secret bit embed is zero.
If the segmented session corresponds to inpainting then it is recover with inpainting technique with compression techniques,
otherwise corresponds to SMVQ block, index value of SMVQ is used to recover this block. The codeword with the smallest
MSE are chosen to generate a sub codebook to recover the block.
After the segment section compress code complete the above described procedure, the secret bit embed that can be extracted
correctly and decompress image can be obtain. Because of use of decoding for the compress code, decompress image doesnt
contain the secret bits embed.

III. RESULTS
A. Transmitter Side:

Figure 1 shows the Original image.

Figure 2 shows the secret image.

Figure 3 shows the Encrypted corrupted image.

All rights reserved by www.ijste.org

54

A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting
(IJSTE/ Volume 1 / Issue 12 / 011)

Figure 4 shows the inpainted embedded image.

Figure 5 shows the threshold value T

B. Receiver Side:

Figure 6 shows the decrypted corrupted image.

Figure 7 shows the inpainted decrypted image.

Figure 8 shows the secret image which is extracted.

All rights reserved by www.ijste.org

55

A Novel Joint Data Hiding and Compression Scheme Based on SMVQ and Image Inpainting
(IJSTE/ Volume 1 / Issue 12 / 011)

Figure 9 shows the plot for threshold and hiding capacity.

Its shows the value of PSNR and Compression ratio.

IV. CONCLUSION
In this work, we propose a joint data hiding and compress scheme by the method of SMVQ and image inpainting. And the block
with left part and top most part of image are used for the secret bits embed and compression at single time, the compression
switches between the SMVQ and image inpainting method that is according to bits. And also VQ is use for the complex block
that control visul distortion and error diffusion. At receiver side the segmented compress code into serie of section by its,and then
the secret bits are extracted to index value in segment section, decompression is achieved by the method of SMVQ, VQ and
image inpainting. Futher more that is propose scheme has 2 function of data hiding and compression into one module.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]

W. B. Pennebaker and J. L. Mitchell, The JPEG Still Image Data Compression Standard. New York: Reinhold, 1993.
D. S. Taubman and M. W. Marcellin, JPEG2000: Image Compression Fundamentals, Standards and Practice. Norwell, MA: Kluwer, 2002.
A. Gersho and R. M. Gray, Vector Quantization and Signal Compression.Norwell, MA: Kluwer, 1992
N. M. Nasrabadi and R. King, Image Coding Using Vector Quantization:A Review, IEEE Transactions on Communications, vol. 36, no. 8, 1988.
National Institute of Standards & Technology, Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards
Publication, vol. 197, no. l, 2001.
R. L. Rivest, A. Shamir and L. Adleman, A Method for Obtaining DigitalSignatures and Public-Key Cryptosystems, Communications of the ACM,vol.
21, no. 2, pp. 120-126, 1978.
F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information Hiding A Survey, Proceedings of the IEEE, vol. 87, no. 7, 1999.
C. D. Vleeschouwer, J. F. Delaigle and B Macq, Invisibility and Application Functionalities in Perceptual Watermarking: An Overview,Proceedings of
the IEEE, vol. 90, no. 1, 2002.
C. C. Chang, T. S. Chen and L. Z. Chung, A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, vol.
141, no. 1, 2002.
H. W. Tseng and C. C. Chang, High Capacity Data Hiding inJPEG-Compressed Images, Informatica, vol. 15, no. 1, 2004.
P. C. Su and C. C. Kuo, Steganography in JPEG2000 Compressed Images, IEEE Transactions on Consumer Electronics, vol. 49, no. 4, 2003.
W. J. Wang, C. T. Huang and S. J. Wang, VQ Applications inSteganographic Data Hiding Upon Multimedia Images, IEEE Systems Journal, vol. 5, no. 4,
2011.
Y. C. Hu, High-Capacity Image Hiding Scheme Based on Vector Quantization, Pattern Recognition, vol. 39, no. 9, 2006.
C. C. Chang and W. C. Wu, Hiding Secret Data Adaptively in VectorQuantisation Index Tables, IEE Proceedings - Vision, Image and Signal Processing,
vol. 153, no. 5, 2006.
C. C. Lin, S. C. Chen and N. L. Hsueh, Adaptive Embedding Techniques for VQ-Compressed Images, Information Sciences, vol. 179, no. 3, 2009.

All rights reserved by www.ijste.org

56

Vous aimerez peut-être aussi