SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 7, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1411
Abstract— The current still image compression technique
lacks the required level of standardization and still have
something can be improve according to compression rate,
computation, and so on. This paper employs the technique
of H.264/MPEG-4 Advanced Video Coding to improve still
image compression. The H.264/MPEG-4 standard promises
much higher compression and quality compared to other
existing standard, such as MPEG-4 and H.263. This paper
utilizes the intra prediction approach of H.264/AVC and
Huffman coding to improve the compression rate. Each 4x4
block is predicted by choosing the best mode out of the 9
different modes. The best prediction mode is selected by
SAE (Sum of Absolute Error) method.
Also this paper deals with an image hiding algorithm based
on singular value decomposition algorithm. This paper
propose a data hiding algorithm, applying on encoded bit-
stream. Before embedding the secret image into cover
image, the residue of the cover image is first calculated and
encoded using Huffman coding. At the decoder side the
secret image is extracted and the cover image is
reconstructed with sufficient peak signal to noise ratio.
Keywords: Intra Prediction, Image Compression, Huffman
Coding, Singular Value Decomposition, Peak Signal to
Noise Ratio.
INTRODUCTIONI.
In recent years, compressed images have become the most
popular on the internet, primarily because they take less
space than other raw images [3]. H.264/AVC is the video
coding standard of the ITU-T Video Coding Experts Group
and the ISO/IEC Moving Picture Experts Group. The main
goals of the H.264/AVC have been enhanced compression
performance and provision of a network friendly video
representation.H.264/AVC has achieved significant
improvement in rate-distortion efficiency relative to existing
standards [14].
Image compression is a well-studied topic that codes the
pictures into fewer amounts of data. There are two kinds of
image compression approaches: lossless and lossy. Lossless
image compression techniques are error-free coding
methods. A lossless-compressed image can be
decompressed to be one which is identical to the original
image. Since lossless compression methods keep detailed
information in the image, the sizes of the compressed results
are not reduced so much. Lossy image compression
techniques instead produce results with smaller sizes and the
image obtained from decompressing is not identical to the
original one [21].
Most of the previous work on compressed-domain image
watermarking focused on embedding the watermark into the
JPEG bit stream. Here intra prediction of H.264
compression standard [13] is adopted. The residual blocks in
the H.264 standard are compressed using the DCT
transform, quantized, reordered, run level coded, and then
entropy encoding is applied. This paper adopts the technique
of intra prediction approach of H264/AVC is used to
improve image compression. Intra prediction is an effective
method for reducing the redundancy of an image. So the
extra data in an image is reduced. Then perform entropy
decoding as in H264 standard, but instead of using the
variable length coding Huffman coding [16] is used
.Huffman coding is a lossless data hiding algorithm and can
reproduce at the receiver side without much degradation.
The aim of a lossy compression technique is to getting
higher similarity to the original image and maintaining
higher compression rates. Lossy compression as the name
implies results in loss of some information, that compresses
data by discarding (losing) some of it. Lossy image
compression is useful in applications such as broadcast
television, videoconferencing, and facsimile transmission, in
which a certain amount of error is an acceptable trade-off
for increased compression performance.
Nowadays, only few solutions are proposed for both access
to the cover image and secret image with sufficient quality.
The Current methods for the embedding of data into the
cover image fall into two categories: spatial based schemes
and transform based schemes. Spatial based schemes embed
the data into the pixels of the cover image directly with no
visual changes, while transform-based schemes embed the
data into the cover image by modifying the coefficients in a
transform domain, such as the Discrete-Cosine Transform
(DCT) and wavelet transforms. In the proposed method the
residue of cover image is encoded first and then the secret
image is embedded. Spatial domain algorithms have the
advantage in steganography capacity, but the disadvantage
is weak robustness. Transform domain algorithm is
embedding the secret information in the transform space.
This kind of algorithms has the advantage of good stability,
but the disadvantage of small capacity [2].The secret data is
embedded into the quantized coefficients before entropy
encoding [15]. This paper focuses upon data hiding after
entropy encoding. For image embedding SVD (Singular
Value Decomposition) algorithm is used.
This paper is organized as follows: In Section II the Intra
prediction based image compression technique is
introduced. Section III presents the proposed approach of
data hiding method. Section IV describes the system model.
Section V and gives experimental results and section VI
describes discussions and future work. Finally, the paper is
concluded in Section VII.
INTRA PREDICTION BASED IMAGEII.
COMPRESSION AND DECOMPRESSION TECHNIQUE
The intra prediction based compression method suggested
Image Compression Using Intra Prediction of H.264/AVC and
Implement of Hiding Secret Image into an Encoded Bitstream
Jisha P.R.1
1
M. Tech, Communication Engineering
1
KMEA engineering college
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream
(IJSRD/Vol. 1/Issue 7/2013/0010)
All rights reserved by www.ijsrd.com 1412
for H.264/AVC video coding standard by ITU-T Video
Coding Experts Group and the ISO/IEC Moving Picture
Experts Group [6]. In the proposed approach, the intra
prediction approach of H.264/AVC and Huffman coding
adopted for image coding to improve the compression rate.
Figure 1 show the Image compression method.
Fig 1: Block Diagram of Image Compression
The objective of intra prediction in image compression is to
reduce spatial redundancies between adjacent pixels so
better compression ratio can be achieved. The intra predictor
is used before DCT block. Intra prediction is an effective
method for reducing the redundancy of an image or an intra-
frame. For encoding a block or macro block in Intra-coded
mode, a prediction block is formed based on previously
reconstructed blocks. In H.264/AVC, the prediction block
may be formed for each 4 x 4 sub block, each 8 x 8 block, or
for a 16 x 16 macro block[11] . For a 4 x 4 sub block, nine
intra prediction modes are defined. i.e. there are nine
different directional ways of performing the prediction, and
each of them is shown in table 1.
Number Intra 4x4 prediction mode
0 Vertical
1 Horizontal
2 DC
3 Diagonal-down-left
4 Diagonal-down-right
5 Vertical-Right
6 Horizontal-down
7 Vertical-left
8 Horizontal-up
Table 1: INTRA 4X4 PREDICTION MODES
The nine intra prediction modes labeled 0, 1, 3, 4, 5, 6, 7,
and 8. The arrows in Figure 2 indicate the direction of
prediction in each mode. Mode 2 is „DC- prediction‟. The
other modes represent directions of predictions as indicated
in Figure 2.
Fig. 2: Intra Prediction Directions
The encoder selects the prediction mode for each block that
minimizes the residual between P and the block to be
encoded. The 9 prediction modes (0-8) are calculated for the
4x4 block .The Sum of Absolute Errors (SAE) for each
prediction indicates the magnitude of the prediction error.
The best match to the actual current block is detected
according to the smallest SAE (Sum of Absolute Error) [6,
11, and 14].
The residual of the prediction, which is the difference
between the original and the predicted block, is transformed.
The transform coefficients are scaled and quantized. The
quantized transform coefficients are entropy coded and
transmitted. Here residue image is encoded using Huffman
coding. Thus these values are converted into binary codes
using Huffman coding. This encoding method produces an
efficient, compact binary representation of the information.
The encoded bit stream can then be stored. Huffman coding
enhances the security by means of encoding. Huffman
encoded bit stream cannot reveal anything. To extract
meaning, the Huffman table is required to decode. It
provides one type of authentication, as any single bit
change in the Huffman coded bit stream, Huffman table is
unable to decode.
Fig. 3: Block Diagram of Image Decompression
Figure 3 shows block diagram of image decompression. The
decoder decodes each of the syntax elements and extracts
the information described above, i.e. quantized transform
coefficients, prediction information etc. This information is
then used to reverse the coding process and recreate the
images. The final reconstructed image is reconstructed by
adding intra predicted image.
PROPOSED APPROACH OF IMAGE HIDING ANDIII.
EXTRACTION METHOD
This section introduces the hiding and extraction method.
The hiding data is embedded in the bit stream of the host
image. The host image is a gray scale image and the secret
image is the color image. Almost all stenography techniques
are applied directly to the cover images. The cover image is
encoded and forms the bit-stream. The image hiding is
based on the SVD (Singular Value Decomposition
Algorithm) [20].
A. The Embedding Procedure
The concept of the proposed image hiding method is
illustrated in figure 4. A very simple embedding algorithm is
used, that modifies the encoded bit stream. The algorithm
embeds the secret image by modifying diagonal elements of
the host image. This method generates an embedded image.
Fig. 4: Embedding Secret Image in a Compressed Image
The steps of embedding the secret image can be summarized
as follows:
Step1:- Select secret image.
0
1
43
57
8
6
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream
(IJSRD/Vol. 1/Issue 7/2013/0010)
All rights reserved by www.ijsrd.com 1413
Step2:-Perform level 1 DWT (Discrete Wavelet Transform)
on secret image.
Step3:-Perform SVD and select the bits to be embedded.
Step4:-Select the encoded bit stream and resize the bit
stream to generate a host image.
Step5:-Perform level 1 DWT (Discrete Wavelet Transform)
on host image.
Step6:- Perform SVD on LH, HL and HH bands of the host
image.
SVD (Singular Value Decomposition Algorithm), then host
image decomposes into 3 matrices.
Host image=U[mxr] * S [rxr] * VT
[rxn]
Where the U matrix consists of a set of 'left' orthonormal
bases, S matrix is a diagonal matrix and the V matrix
consists of set of 'right' orthonormal bases. Select the S
matrix and embed one bit in the S matrix according to the
equation 1.
Si
1
= Si + k x b (1)
Where Si- Original Coefficients
Si
1
- Marked Coefficients
b-The Bit to be embedded
K-Watermark Strength
After embedding the watermarked image is obtained by the
equation 2.
Embedded Image = U * S1
* VT
(2)
Step7:- Perform IDWT (Inverse Discrete Wavelet
Transform) and forms the embedded image.
B. Extraction Procedure
The data extraction procedures are similar to that of the
embedding procedures. Figure 5 shows the block diagram of
extracting secret image from the embedded image.
Fig. 5: Extracting Secret Image from the Embedded Image
The extracting algorithm can be more precisely described by
the steps.
Step1:-Select the embedded image.
Step2:-Perform SVD to get the Marked Coefficients.
Step3:-By doing reverse operation, original values are
obtained. Then get the secret image by the equation 3.
b =Si
1
-Si/k (3)
SYSTEM MODELIV.
This section describes how this codec performs. The
extraction of the hidden image and reconstruction of the
cover image can be done in a different way. The first one
consists to reconstruct the message from the coded bit
stream during the decompression stage. The second one
consists to retrieve the hidden message from the embedded
image. In this paper, the transmission stage is performed
after checking secret key by the system encoder.
A. Image Compression and Embedding
Fig. 6: Image Encoding and Embedding Block Diagram
In order to obtain the compressed image, intra prediction
based image compression is used. For image embedding
SVD (Singular Value Decomposition Algorithm) is used.
Thus there are two important components, cover image and
hiding data. Thus there are two different kinds of blocks
marked and unmarked blocks. Figure 6 shows the image
encoding and embedding block diagram.
Before encoding, the secret key is generated by the encoder
to confirm the security. This secret key is a one-time private
key. The one-time private key is to be used only once, and
immediately discarded. Each user will always generate a
new Private Key. Once the Private Key is used or when it is
expired with the session, the Private Key is erased and
discarded.
Fig. 7: Flow Diagram of Image Transmitter
Encoder first seeks the security code, before transmitting
any data to the decoder. i.e., the proposed encoding process
examines the decoder key to determine the transmission
code. If the key is perfectly matching to the decoder key, the
transmission code is the embedded image. So only the
indented user can apply the extracting algorithm to retrieve
the secret image. In the other case, if the decoder key is not
matching to the encoder key, the transmission code is the
compressed image. The decoding algorithm is performed to
reconstruct the cover image.
Fig 8: Image Decoding and Extracting Block Diagram
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream
(IJSRD/Vol. 1/Issue 7/2013/0010)
All rights reserved by www.ijsrd.com 1414
EXPERIMENTAL RESULTSV.
In this section, some experiments are carried out to prove
the efficiency of the proposed scheme. The proposed
method has been simulated using the MATLAB 7.7 program
on Windows 7 platform. A set of 8- bit grayscale images of
size 512 × 512 are used as the cover-image. The colour
images of different dimensions are hiding on these grey
images.
Fig. 9: Cover images used in experiments
For this experiment, 8 cover images are used, these are
shown in Figure 5, each with size 512x512, were used. A
lossless compression was applied to the cover images.
The color images of different dimensions are hiding on these
grey images. The parameters considered for evaluation are
as follows:
1. Compression Ratio: The compression is to reduce
the number of bits the image is represented by.
Image compression is measured by the means of an
index called Compression Ratio:
CR= n1/n2 (1)
Where, n1 is the number of bits in the original
image. While n2 is the number of bits obtained
after the compression. There are two types of
compression: lossy and lossless compression
[19].In lossy compression the information is
preserving but has low compression ratios. Lossy
compression provides high level of data reduction,
where loss can be tolerated.
2. PSNR: PSNR stands for Peak Signal to Noise Ratio
and it is calculated using the following equation:
PSNR=10 log 10 2552
/ MSE (2)
Fig. 10: Secret images used in experiments
The Mean Square Error (MSE) is the measurement of
average of square of errors and the cumulative squared error
between noisy and original image. A higher value of PSNR
is good because of the superiority of the signal to that of the
noise [12].
A. Compression Performances
According to the experimental results, the proposed method
has better effects based on the compression ratio while
maintaining good PSNR ratio when reconstructed. Figure 7
shows the reconstructed cover images.
Fig. 11: Reconstructed Cover images
Table II show the Compression Ratio, Relative Data
Redundancy, PSNR (Peak Signal to Noise Ratio) of various
test images.
Test Images
Image
Dimension
Compression
Ratio
PSNR
Baboon 512x512 12.69 32.62
Barbara 512x512 27.79 34.39
Gold hill 512x512 59.65 31.99
Lena 512x512 53.23 30.59
Pepper 512x512 6.76 30.43
Boat 512x512 55.10 33.76
Couple 512x512 38.47 32.61
Man 512x512 40.75 31.09
Table. 2: Result Of Intra prediction Based Image
Compression
Test
Images
JPEG H.264
Proposed
Method
Baboon 9.065 9.011 12.698
Barbara 8.961 8.132 27.793
Gold hill 8.198 9.292 59.647
Lena 9.301 8.831 53.229
Pepper 9.077 9.107 6.7560
Boat 8.917 8.955 55.101
Couple 9.006 9.007 38.465
Man 9.068 9.061 40.749
Table. 3: Comparison of Compression Ratio
Test
Images
JPEG H.264
Proposed
Method
Baboon 28.232 32.18 32.62
Barbara 32.896 34.58 34.39
Gold hill 33.588 34.51 31.99
Lena 35.808 36.40 30.59
Pepper 34.827 36.22 30.43
Boat 33.502 34.59 33.76
Couple 33.418 34.60 32.61
Man 33.372 34.87 31.09
Table. 4: Comparison Of PSNR Of Original Vs.
Reconstructed Image
While considering the measurement values from the table III
and table IV, it is obviously clear that the compression ratio
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream
(IJSRD/Vol. 1/Issue 7/2013/0010)
All rights reserved by www.ijsrd.com 1415
produced by the proposed method was larger than that of the
JPEG and H.264 compression standards. Thus the proposed
method is able to achieve good compression ratio without
noticeable degradation in PSNR (Peak Signal to Noise
Ratio). Experimental results show that the proposed
algorithm can improve the compression rate up to 31%
averagely comparing to the JPEG and H.264 compression
standards.
B. Embedding Performances
Fig. 12: Extracted secret images
Figure 10 shows the extracted secret images. It shows that
the secret image can be reproduced without much distortion.
The table V shows PSNR of secret image vs. extracted
secret image. From the table V it is evident that the
proposed method has best result for extracted true secret
images.
Test Images Image
Dimension
PSNR
Baboon 512X512 29.27
Flower 264x191 30.60
Lena 512x512 29.33
Pepper 512x512 30.84
House 256x256 28.92
F-16 512x512 27.88
Table. 5: PSNR of Secret Image Vs. Extracted Secret Image
DISCUSSIONS AND FUTURE WORKVI.
This paper presents a very simple embedding algorithm that
modifies the encoded bit stream. The proposed technique
has negligible effect on the quality of the cover image while
reconstructed. The use one-time private key is the strength
of the technique. The strength of the technique is that uses a
one-time private key. This secret key determines which code
is to be transmitted. The future work aim at making more
sophisticated stenographic technique for hiding secret image
without recognizable change in the cover image, so as to
make embedding detection is impossible.
CONCLUSIONVII.
Generally, image stenography method does not provide
much attention on the compression ratio. In this paper, the
cover image is compressed and form a bit stream and after
that the secret image is hiding on this bit stream. By
improving an existing encoding method, the security of the
embedded image can be improved while keeping the same
robustness of the original method. The one time secret key
determines which code is to be transmitted. So this
operation provides sufficient secrecy. According to the
experimental results, the proposed method has higher
compression ratio at a cost of slight change in PSNR ratio
compared to JPEG and H.264 compression standards.
REFERENCES
[1] Mahmud Hasan, Kamruddin Md. Nur, Tanzeem Bin
Noor,” A Novel Compressed Domain Technique of
Reversible Steganography”., International Journal of
Advanced Research in Computer Science and
Software Engineering., Volume 2, Issue 3, March
2012.
[2] Mohanbaabu G and P. Renuga,” Still Image
Compression Using Texture and Non Texture
Prediction Model”, American Journal of Applied
Sciences 9 (4): 519-525, 2012 ISSN 1546-9239 ©
2012 Science Publications.
[3] Ammar Abdul, Ame-Ammar Abdul ,Saddam Kamil
Alwane” Secret Technique to Hiding Image after
Compression In Cover Image”, Eng. & Tech. Journal,
Vol. 29, No.10, 2011
[4] Ali Al-Ataby and Fawzi Al-Naima, “A Modified
High Capacity Image Steganography Technique
Based on Wavelet Transform”, The International
Arab Journal of Information Technology, Vol.7, No.
4, October 2010
[5] R. A. Ghazy, M. M. Hadhoud, M. I. Dessouky, N. A.
El-Fishawy, F. E. Abd El-Samie, “Performance
Evaluation Of Block Based Svd Image
Watermarking”, Department of Electronics and
Electrical Communications ,Faculty of Electronic
Engineering,Menoufia University,32952, Menouf,
Egypt
[6] Iain Richardson, Vcodex,“H.264/ AVC Intra
Prediction”. www.vcodex.com,2010
[7] K B Shiva Kumar, K B Raja,R K Chhotaray,
Sabyasachi Pattanaik,” Bit Length Replacement
Steganography based on DCT Coefficients”,
International Journal of Engineering Science and
Technology Vol. 2(8), 2010, 3561-3570.
[8] Sang-Gyu Cho, Zoran Bojkovi´c, Dragorad
Milovanovi´c, Jungsik Lee, and Jae-Jeong Hwang
“Image Quality Evaluation: JPEG 2000 Versus Intra-
only H.264/AVC High Profile”, FACTA
UNIVERSITATIS (NIS) SER.: ELEC. ENERG. vol.
20, no. 1, April 2007, 71-83
[9] Po-Yueh Chen and Hung-Ju Lin, “A DWT Based
Approach for Image Steganography”, International
Journal of Applied Science and Engineering 2006. 4,
3: 275-290
[10] Pankaj Topiwala“Comparative Study of JPEG 2000
and H.264/AVC FRExt I– Frame Coding on High-
Definition Video Sequences”, FastVDO LLC, 7150
Riverwood Dr., Columbia, Maryland, 21046-1245
USA,2005
[11] Chen Chen and Ping-Hao Wu, Homer Chen,
”Transform-Domain Intra Prediction for H.264”,
National Science Council,0-7803-8834-8/05/$20.00
©2005 IEEE.
[12] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P.
Simoncelli,. “Image quality assessment:From error
Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream
(IJSRD/Vol. 1/Issue 7/2013/0010)
All rights reserved by www.ijsrd.com 1416
visibility to structural similarity,” IEEE Trans. Image
Process., vol. 13,no.4,pp. 600-612,April 2004.
[13] Hsien-Wen Tseng, Chin-Chen Chang,” High
Capacity Data Hiding in JPEG-CompressedImages”,
Informatica, Institute of Mathematics and
Informatics, Vilnius 2004, Vol. 15, No. 1, 127–142
2004
[14] Thomas Wiegand, Gary J. Sullivan, Senior Member,
IEEE, Gisle Bjøntegaard, and Ajay Luthra, Senior
Member, IEEE,” Overview of the H.264/AVC Video
Coding Standard ”, IEEE Transactions On Circuits
And Systems For Video Technology., Vol. 13, No. 7,
July 2003
[15] Hsien-Wen Tseng, Chin-Chen Chang,” High
Capacity Data Hiding in JPEG-Compressed Images”,
NFORMATICA, 2004, Vol. 15, No. 1, Institute of
Mathematics and Informatics, Vilnius, 2003 .
[16] Majid Rabbani, Rajan Joshi “An overview of the
JPEG2000 still image compression standard”, Signal
Processing: Image Communication 17 (2002) 3–48.
[17] “H.264 video compression standard”, White paper,
Axis communications,2002.
[18] Charilaos Christopoulos, Touradj Ebrahimi,” The
JPEG2000 Still Image Coding System: An
Overview”, IEEE Transactions on Consumer
Electronics. Vol. 46, No. 4, pp. 1103-1127,
November 2000.
[19] N. F. Johnson and S. Katzenbeisser,” .A survey of
steganographic techniques”, in S. Katzenbeisser and
F. Peticolas (Eds.): Information Hiding, pp.43-78.
Artech House, Norwood, MA, 2000.
[20] Andrews, H. Patterson, C., “Singular Value
Decomposition (SVD) Image Coding”, Acoustics,
Speech and Signal Processing, IEEE Transactions on
Image Processing. Volume: 24 , Issue: 1,1976.
[21] Da-Chun Wu' and Wen-Hsiang Tsai,” Data Hiding
In Images Via Multiple-Based Er Conversion And
Lossy Compression”, IEEE Transactions on
Consumer Electronics, Vol. 44, No. 4, November
1998

Mais conteúdo relacionado

Mais procurados

AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...IAEME Publication
 
AVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeAVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeDR.P.S.JAGADEESH KUMAR
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
Scanned document compression using block based hybrid video codec
Scanned document compression using block based hybrid video codecScanned document compression using block based hybrid video codec
Scanned document compression using block based hybrid video codecMuthu Samy
 
Different Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A StudyDifferent Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A StudyEditor IJCATR
 
Kassem2009
Kassem2009Kassem2009
Kassem2009lazchi
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachIAEME Publication
 
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXSQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXijcsit
 
An improved image compression algorithm based on daubechies wavelets with ar...
An improved image compression algorithm based on daubechies  wavelets with ar...An improved image compression algorithm based on daubechies  wavelets with ar...
An improved image compression algorithm based on daubechies wavelets with ar...Alexander Decker
 
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERHARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERcscpconf
 
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...IRJET Journal
 
Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches ijsc
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Mais procurados (18)

Medical image compression
Medical image compressionMedical image compression
Medical image compression
 
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
AN OPTIMIZED BLOCK ESTIMATION BASED IMAGE COMPRESSION AND DECOMPRESSION ALGOR...
 
AVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeAVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification Scheme
 
Secured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic SchemeSecured Data Transmission Using Video Steganographic Scheme
Secured Data Transmission Using Video Steganographic Scheme
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Scanned document compression using block based hybrid video codec
Scanned document compression using block based hybrid video codecScanned document compression using block based hybrid video codec
Scanned document compression using block based hybrid video codec
 
Different Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A StudyDifferent Approach of VIDEO Compression Technique: A Study
Different Approach of VIDEO Compression Technique: A Study
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 
Reversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approachReversible encrypted data concealment in images by reserving room approach
Reversible encrypted data concealment in images by reserving room approach
 
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIXSQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
SQUASHED JPEG IMAGE COMPRESSION VIA SPARSE MATRIX
 
An improved image compression algorithm based on daubechies wavelets with ar...
An improved image compression algorithm based on daubechies  wavelets with ar...An improved image compression algorithm based on daubechies  wavelets with ar...
An improved image compression algorithm based on daubechies wavelets with ar...
 
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERHARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODER
 
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
 
Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches Video Compression Algorithm Based on Frame Difference Approaches
Video Compression Algorithm Based on Frame Difference Approaches
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
M1803016973
M1803016973M1803016973
M1803016973
 
B070306010
B070306010B070306010
B070306010
 
337
337337
337
 

Destaque

Analysis of Residue Number System based PN sequence in AWGN channel
Analysis of Residue Number System based PN sequence in AWGN channelAnalysis of Residue Number System based PN sequence in AWGN channel
Analysis of Residue Number System based PN sequence in AWGN channelijsrd.com
 
Rough Set based Natural Image Segmentation under Game Theory Framework
Rough Set based Natural Image Segmentation under Game Theory FrameworkRough Set based Natural Image Segmentation under Game Theory Framework
Rough Set based Natural Image Segmentation under Game Theory Frameworkijsrd.com
 
Model Development for Estimation of Failure Loads: A Case Study of Composite ...
Model Development for Estimation of Failure Loads: A Case Study of Composite ...Model Development for Estimation of Failure Loads: A Case Study of Composite ...
Model Development for Estimation of Failure Loads: A Case Study of Composite ...ijsrd.com
 
AHP technique a way to show preferences amongst alternatives
AHP technique a way to show preferences amongst alternativesAHP technique a way to show preferences amongst alternatives
AHP technique a way to show preferences amongst alternativesijsrd.com
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmijsrd.com
 
FE Analysis for Investment Casting and Computer Simulation: A Review
FE Analysis for Investment Casting and Computer Simulation: A ReviewFE Analysis for Investment Casting and Computer Simulation: A Review
FE Analysis for Investment Casting and Computer Simulation: A Reviewijsrd.com
 
Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con...
 Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con... Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con...
Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con...ijsrd.com
 
Compact Quad-band Antenna for WiMax Application
Compact Quad-band Antenna for WiMax ApplicationCompact Quad-band Antenna for WiMax Application
Compact Quad-band Antenna for WiMax Applicationijsrd.com
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODVijsrd.com
 
Image segmentation Based on Chan-Vese Active Contours using Finite Difference...
Image segmentation Based on Chan-Vese Active Contours using Finite Difference...Image segmentation Based on Chan-Vese Active Contours using Finite Difference...
Image segmentation Based on Chan-Vese Active Contours using Finite Difference...ijsrd.com
 
Analyzing and Comparing opinions on the Web mining Consumer Reviews
Analyzing and Comparing opinions on the Web mining Consumer ReviewsAnalyzing and Comparing opinions on the Web mining Consumer Reviews
Analyzing and Comparing opinions on the Web mining Consumer Reviewsijsrd.com
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approachijsrd.com
 
Catalytic Converter Made of Non-noble Material for an Automobile
Catalytic Converter Made of Non-noble Material for an AutomobileCatalytic Converter Made of Non-noble Material for an Automobile
Catalytic Converter Made of Non-noble Material for an Automobileijsrd.com
 
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul... Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...ijsrd.com
 
Digital standard cell library Design flow
Digital standard cell library Design flowDigital standard cell library Design flow
Digital standard cell library Design flowijsrd.com
 

Destaque (16)

Analysis of Residue Number System based PN sequence in AWGN channel
Analysis of Residue Number System based PN sequence in AWGN channelAnalysis of Residue Number System based PN sequence in AWGN channel
Analysis of Residue Number System based PN sequence in AWGN channel
 
Rough Set based Natural Image Segmentation under Game Theory Framework
Rough Set based Natural Image Segmentation under Game Theory FrameworkRough Set based Natural Image Segmentation under Game Theory Framework
Rough Set based Natural Image Segmentation under Game Theory Framework
 
Model Development for Estimation of Failure Loads: A Case Study of Composite ...
Model Development for Estimation of Failure Loads: A Case Study of Composite ...Model Development for Estimation of Failure Loads: A Case Study of Composite ...
Model Development for Estimation of Failure Loads: A Case Study of Composite ...
 
AHP technique a way to show preferences amongst alternatives
AHP technique a way to show preferences amongst alternativesAHP technique a way to show preferences amongst alternatives
AHP technique a way to show preferences amongst alternatives
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Flexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithmFlexible channel allocation using best Secondary user detection algorithm
Flexible channel allocation using best Secondary user detection algorithm
 
FE Analysis for Investment Casting and Computer Simulation: A Review
FE Analysis for Investment Casting and Computer Simulation: A ReviewFE Analysis for Investment Casting and Computer Simulation: A Review
FE Analysis for Investment Casting and Computer Simulation: A Review
 
Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con...
 Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con... Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con...
Position Control of Satellite In Geo-Stationary Orbit Using Sliding Mode Con...
 
Compact Quad-band Antenna for WiMax Application
Compact Quad-band Antenna for WiMax ApplicationCompact Quad-band Antenna for WiMax Application
Compact Quad-band Antenna for WiMax Application
 
Review on variants of Power Aware AODV
Review on variants of Power Aware AODVReview on variants of Power Aware AODV
Review on variants of Power Aware AODV
 
Image segmentation Based on Chan-Vese Active Contours using Finite Difference...
Image segmentation Based on Chan-Vese Active Contours using Finite Difference...Image segmentation Based on Chan-Vese Active Contours using Finite Difference...
Image segmentation Based on Chan-Vese Active Contours using Finite Difference...
 
Analyzing and Comparing opinions on the Web mining Consumer Reviews
Analyzing and Comparing opinions on the Web mining Consumer ReviewsAnalyzing and Comparing opinions on the Web mining Consumer Reviews
Analyzing and Comparing opinions on the Web mining Consumer Reviews
 
Speaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization ApproachSpeaker Recognition System using MFCC and Vector Quantization Approach
Speaker Recognition System using MFCC and Vector Quantization Approach
 
Catalytic Converter Made of Non-noble Material for an Automobile
Catalytic Converter Made of Non-noble Material for an AutomobileCatalytic Converter Made of Non-noble Material for an Automobile
Catalytic Converter Made of Non-noble Material for an Automobile
 
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul... Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 
Digital standard cell library Design flow
Digital standard cell library Design flowDigital standard cell library Design flow
Digital standard cell library Design flow
 

Semelhante a Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream

Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...DR.P.S.JAGADEESH KUMAR
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compressionPradip Kumar
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABIJEEE
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsIJRES Journal
 
Comparison of ezw and h.264 2
Comparison of ezw and h.264 2Comparison of ezw and h.264 2
Comparison of ezw and h.264 2IAEME Publication
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression MethodsIOSR Journals
 
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...csandit
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyIRJET Journal
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612NITC
 
Efficient video compression using EZWT
Efficient video compression using EZWTEfficient video compression using EZWT
Efficient video compression using EZWTIJERA Editor
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490IJRAT
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGijma
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosCSCJournals
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
 

Semelhante a Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream (20)

Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
Performance Evaluation of H.264 AVC Using CABAC Entropy Coding For Compound I...
 
Seminar Report on image compression
Seminar Report on image compressionSeminar Report on image compression
Seminar Report on image compression
 
Design of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLABDesign of Image Compression Algorithm using MATLAB
Design of Image Compression Algorithm using MATLAB
 
A0540106
A0540106A0540106
A0540106
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
Enhanced Image Compression Using Wavelets
Enhanced Image Compression Using WaveletsEnhanced Image Compression Using Wavelets
Enhanced Image Compression Using Wavelets
 
Comparison of ezw and h.264 2
Comparison of ezw and h.264 2Comparison of ezw and h.264 2
Comparison of ezw and h.264 2
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression Methods
 
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
A REAL-TIME H.264/AVC ENCODER&DECODER WITH VERTICAL MODE FOR INTRA FRAME AND ...
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
Image Compression Techniques: A Survey
Image Compression Techniques: A SurveyImage Compression Techniques: A Survey
Image Compression Techniques: A Survey
 
Lossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative StudyLossless Image Compression Techniques Comparative Study
Lossless Image Compression Techniques Comparative Study
 
10.1.1.184.6612
10.1.1.184.661210.1.1.184.6612
10.1.1.184.6612
 
Efficient video compression using EZWT
Efficient video compression using EZWTEfficient video compression using EZWT
Efficient video compression using EZWT
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
 
ANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKINGANALYSING JPEG CODING WITH MASKING
ANALYSING JPEG CODING WITH MASKING
 
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosSecured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...A secured data transmission system by reversible data hiding with scalable co...
A secured data transmission system by reversible data hiding with scalable co...
 

Mais de ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

Mais de ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Último

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 

Último (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 

Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 7, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1411 Abstract— The current still image compression technique lacks the required level of standardization and still have something can be improve according to compression rate, computation, and so on. This paper employs the technique of H.264/MPEG-4 Advanced Video Coding to improve still image compression. The H.264/MPEG-4 standard promises much higher compression and quality compared to other existing standard, such as MPEG-4 and H.263. This paper utilizes the intra prediction approach of H.264/AVC and Huffman coding to improve the compression rate. Each 4x4 block is predicted by choosing the best mode out of the 9 different modes. The best prediction mode is selected by SAE (Sum of Absolute Error) method. Also this paper deals with an image hiding algorithm based on singular value decomposition algorithm. This paper propose a data hiding algorithm, applying on encoded bit- stream. Before embedding the secret image into cover image, the residue of the cover image is first calculated and encoded using Huffman coding. At the decoder side the secret image is extracted and the cover image is reconstructed with sufficient peak signal to noise ratio. Keywords: Intra Prediction, Image Compression, Huffman Coding, Singular Value Decomposition, Peak Signal to Noise Ratio. INTRODUCTIONI. In recent years, compressed images have become the most popular on the internet, primarily because they take less space than other raw images [3]. H.264/AVC is the video coding standard of the ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The main goals of the H.264/AVC have been enhanced compression performance and provision of a network friendly video representation.H.264/AVC has achieved significant improvement in rate-distortion efficiency relative to existing standards [14]. Image compression is a well-studied topic that codes the pictures into fewer amounts of data. There are two kinds of image compression approaches: lossless and lossy. Lossless image compression techniques are error-free coding methods. A lossless-compressed image can be decompressed to be one which is identical to the original image. Since lossless compression methods keep detailed information in the image, the sizes of the compressed results are not reduced so much. Lossy image compression techniques instead produce results with smaller sizes and the image obtained from decompressing is not identical to the original one [21]. Most of the previous work on compressed-domain image watermarking focused on embedding the watermark into the JPEG bit stream. Here intra prediction of H.264 compression standard [13] is adopted. The residual blocks in the H.264 standard are compressed using the DCT transform, quantized, reordered, run level coded, and then entropy encoding is applied. This paper adopts the technique of intra prediction approach of H264/AVC is used to improve image compression. Intra prediction is an effective method for reducing the redundancy of an image. So the extra data in an image is reduced. Then perform entropy decoding as in H264 standard, but instead of using the variable length coding Huffman coding [16] is used .Huffman coding is a lossless data hiding algorithm and can reproduce at the receiver side without much degradation. The aim of a lossy compression technique is to getting higher similarity to the original image and maintaining higher compression rates. Lossy compression as the name implies results in loss of some information, that compresses data by discarding (losing) some of it. Lossy image compression is useful in applications such as broadcast television, videoconferencing, and facsimile transmission, in which a certain amount of error is an acceptable trade-off for increased compression performance. Nowadays, only few solutions are proposed for both access to the cover image and secret image with sufficient quality. The Current methods for the embedding of data into the cover image fall into two categories: spatial based schemes and transform based schemes. Spatial based schemes embed the data into the pixels of the cover image directly with no visual changes, while transform-based schemes embed the data into the cover image by modifying the coefficients in a transform domain, such as the Discrete-Cosine Transform (DCT) and wavelet transforms. In the proposed method the residue of cover image is encoded first and then the secret image is embedded. Spatial domain algorithms have the advantage in steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity [2].The secret data is embedded into the quantized coefficients before entropy encoding [15]. This paper focuses upon data hiding after entropy encoding. For image embedding SVD (Singular Value Decomposition) algorithm is used. This paper is organized as follows: In Section II the Intra prediction based image compression technique is introduced. Section III presents the proposed approach of data hiding method. Section IV describes the system model. Section V and gives experimental results and section VI describes discussions and future work. Finally, the paper is concluded in Section VII. INTRA PREDICTION BASED IMAGEII. COMPRESSION AND DECOMPRESSION TECHNIQUE The intra prediction based compression method suggested Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream Jisha P.R.1 1 M. Tech, Communication Engineering 1 KMEA engineering college
  • 2. Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream (IJSRD/Vol. 1/Issue 7/2013/0010) All rights reserved by www.ijsrd.com 1412 for H.264/AVC video coding standard by ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group [6]. In the proposed approach, the intra prediction approach of H.264/AVC and Huffman coding adopted for image coding to improve the compression rate. Figure 1 show the Image compression method. Fig 1: Block Diagram of Image Compression The objective of intra prediction in image compression is to reduce spatial redundancies between adjacent pixels so better compression ratio can be achieved. The intra predictor is used before DCT block. Intra prediction is an effective method for reducing the redundancy of an image or an intra- frame. For encoding a block or macro block in Intra-coded mode, a prediction block is formed based on previously reconstructed blocks. In H.264/AVC, the prediction block may be formed for each 4 x 4 sub block, each 8 x 8 block, or for a 16 x 16 macro block[11] . For a 4 x 4 sub block, nine intra prediction modes are defined. i.e. there are nine different directional ways of performing the prediction, and each of them is shown in table 1. Number Intra 4x4 prediction mode 0 Vertical 1 Horizontal 2 DC 3 Diagonal-down-left 4 Diagonal-down-right 5 Vertical-Right 6 Horizontal-down 7 Vertical-left 8 Horizontal-up Table 1: INTRA 4X4 PREDICTION MODES The nine intra prediction modes labeled 0, 1, 3, 4, 5, 6, 7, and 8. The arrows in Figure 2 indicate the direction of prediction in each mode. Mode 2 is „DC- prediction‟. The other modes represent directions of predictions as indicated in Figure 2. Fig. 2: Intra Prediction Directions The encoder selects the prediction mode for each block that minimizes the residual between P and the block to be encoded. The 9 prediction modes (0-8) are calculated for the 4x4 block .The Sum of Absolute Errors (SAE) for each prediction indicates the magnitude of the prediction error. The best match to the actual current block is detected according to the smallest SAE (Sum of Absolute Error) [6, 11, and 14]. The residual of the prediction, which is the difference between the original and the predicted block, is transformed. The transform coefficients are scaled and quantized. The quantized transform coefficients are entropy coded and transmitted. Here residue image is encoded using Huffman coding. Thus these values are converted into binary codes using Huffman coding. This encoding method produces an efficient, compact binary representation of the information. The encoded bit stream can then be stored. Huffman coding enhances the security by means of encoding. Huffman encoded bit stream cannot reveal anything. To extract meaning, the Huffman table is required to decode. It provides one type of authentication, as any single bit change in the Huffman coded bit stream, Huffman table is unable to decode. Fig. 3: Block Diagram of Image Decompression Figure 3 shows block diagram of image decompression. The decoder decodes each of the syntax elements and extracts the information described above, i.e. quantized transform coefficients, prediction information etc. This information is then used to reverse the coding process and recreate the images. The final reconstructed image is reconstructed by adding intra predicted image. PROPOSED APPROACH OF IMAGE HIDING ANDIII. EXTRACTION METHOD This section introduces the hiding and extraction method. The hiding data is embedded in the bit stream of the host image. The host image is a gray scale image and the secret image is the color image. Almost all stenography techniques are applied directly to the cover images. The cover image is encoded and forms the bit-stream. The image hiding is based on the SVD (Singular Value Decomposition Algorithm) [20]. A. The Embedding Procedure The concept of the proposed image hiding method is illustrated in figure 4. A very simple embedding algorithm is used, that modifies the encoded bit stream. The algorithm embeds the secret image by modifying diagonal elements of the host image. This method generates an embedded image. Fig. 4: Embedding Secret Image in a Compressed Image The steps of embedding the secret image can be summarized as follows: Step1:- Select secret image. 0 1 43 57 8 6
  • 3. Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream (IJSRD/Vol. 1/Issue 7/2013/0010) All rights reserved by www.ijsrd.com 1413 Step2:-Perform level 1 DWT (Discrete Wavelet Transform) on secret image. Step3:-Perform SVD and select the bits to be embedded. Step4:-Select the encoded bit stream and resize the bit stream to generate a host image. Step5:-Perform level 1 DWT (Discrete Wavelet Transform) on host image. Step6:- Perform SVD on LH, HL and HH bands of the host image. SVD (Singular Value Decomposition Algorithm), then host image decomposes into 3 matrices. Host image=U[mxr] * S [rxr] * VT [rxn] Where the U matrix consists of a set of 'left' orthonormal bases, S matrix is a diagonal matrix and the V matrix consists of set of 'right' orthonormal bases. Select the S matrix and embed one bit in the S matrix according to the equation 1. Si 1 = Si + k x b (1) Where Si- Original Coefficients Si 1 - Marked Coefficients b-The Bit to be embedded K-Watermark Strength After embedding the watermarked image is obtained by the equation 2. Embedded Image = U * S1 * VT (2) Step7:- Perform IDWT (Inverse Discrete Wavelet Transform) and forms the embedded image. B. Extraction Procedure The data extraction procedures are similar to that of the embedding procedures. Figure 5 shows the block diagram of extracting secret image from the embedded image. Fig. 5: Extracting Secret Image from the Embedded Image The extracting algorithm can be more precisely described by the steps. Step1:-Select the embedded image. Step2:-Perform SVD to get the Marked Coefficients. Step3:-By doing reverse operation, original values are obtained. Then get the secret image by the equation 3. b =Si 1 -Si/k (3) SYSTEM MODELIV. This section describes how this codec performs. The extraction of the hidden image and reconstruction of the cover image can be done in a different way. The first one consists to reconstruct the message from the coded bit stream during the decompression stage. The second one consists to retrieve the hidden message from the embedded image. In this paper, the transmission stage is performed after checking secret key by the system encoder. A. Image Compression and Embedding Fig. 6: Image Encoding and Embedding Block Diagram In order to obtain the compressed image, intra prediction based image compression is used. For image embedding SVD (Singular Value Decomposition Algorithm) is used. Thus there are two important components, cover image and hiding data. Thus there are two different kinds of blocks marked and unmarked blocks. Figure 6 shows the image encoding and embedding block diagram. Before encoding, the secret key is generated by the encoder to confirm the security. This secret key is a one-time private key. The one-time private key is to be used only once, and immediately discarded. Each user will always generate a new Private Key. Once the Private Key is used or when it is expired with the session, the Private Key is erased and discarded. Fig. 7: Flow Diagram of Image Transmitter Encoder first seeks the security code, before transmitting any data to the decoder. i.e., the proposed encoding process examines the decoder key to determine the transmission code. If the key is perfectly matching to the decoder key, the transmission code is the embedded image. So only the indented user can apply the extracting algorithm to retrieve the secret image. In the other case, if the decoder key is not matching to the encoder key, the transmission code is the compressed image. The decoding algorithm is performed to reconstruct the cover image. Fig 8: Image Decoding and Extracting Block Diagram
  • 4. Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream (IJSRD/Vol. 1/Issue 7/2013/0010) All rights reserved by www.ijsrd.com 1414 EXPERIMENTAL RESULTSV. In this section, some experiments are carried out to prove the efficiency of the proposed scheme. The proposed method has been simulated using the MATLAB 7.7 program on Windows 7 platform. A set of 8- bit grayscale images of size 512 × 512 are used as the cover-image. The colour images of different dimensions are hiding on these grey images. Fig. 9: Cover images used in experiments For this experiment, 8 cover images are used, these are shown in Figure 5, each with size 512x512, were used. A lossless compression was applied to the cover images. The color images of different dimensions are hiding on these grey images. The parameters considered for evaluation are as follows: 1. Compression Ratio: The compression is to reduce the number of bits the image is represented by. Image compression is measured by the means of an index called Compression Ratio: CR= n1/n2 (1) Where, n1 is the number of bits in the original image. While n2 is the number of bits obtained after the compression. There are two types of compression: lossy and lossless compression [19].In lossy compression the information is preserving but has low compression ratios. Lossy compression provides high level of data reduction, where loss can be tolerated. 2. PSNR: PSNR stands for Peak Signal to Noise Ratio and it is calculated using the following equation: PSNR=10 log 10 2552 / MSE (2) Fig. 10: Secret images used in experiments The Mean Square Error (MSE) is the measurement of average of square of errors and the cumulative squared error between noisy and original image. A higher value of PSNR is good because of the superiority of the signal to that of the noise [12]. A. Compression Performances According to the experimental results, the proposed method has better effects based on the compression ratio while maintaining good PSNR ratio when reconstructed. Figure 7 shows the reconstructed cover images. Fig. 11: Reconstructed Cover images Table II show the Compression Ratio, Relative Data Redundancy, PSNR (Peak Signal to Noise Ratio) of various test images. Test Images Image Dimension Compression Ratio PSNR Baboon 512x512 12.69 32.62 Barbara 512x512 27.79 34.39 Gold hill 512x512 59.65 31.99 Lena 512x512 53.23 30.59 Pepper 512x512 6.76 30.43 Boat 512x512 55.10 33.76 Couple 512x512 38.47 32.61 Man 512x512 40.75 31.09 Table. 2: Result Of Intra prediction Based Image Compression Test Images JPEG H.264 Proposed Method Baboon 9.065 9.011 12.698 Barbara 8.961 8.132 27.793 Gold hill 8.198 9.292 59.647 Lena 9.301 8.831 53.229 Pepper 9.077 9.107 6.7560 Boat 8.917 8.955 55.101 Couple 9.006 9.007 38.465 Man 9.068 9.061 40.749 Table. 3: Comparison of Compression Ratio Test Images JPEG H.264 Proposed Method Baboon 28.232 32.18 32.62 Barbara 32.896 34.58 34.39 Gold hill 33.588 34.51 31.99 Lena 35.808 36.40 30.59 Pepper 34.827 36.22 30.43 Boat 33.502 34.59 33.76 Couple 33.418 34.60 32.61 Man 33.372 34.87 31.09 Table. 4: Comparison Of PSNR Of Original Vs. Reconstructed Image While considering the measurement values from the table III and table IV, it is obviously clear that the compression ratio
  • 5. Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream (IJSRD/Vol. 1/Issue 7/2013/0010) All rights reserved by www.ijsrd.com 1415 produced by the proposed method was larger than that of the JPEG and H.264 compression standards. Thus the proposed method is able to achieve good compression ratio without noticeable degradation in PSNR (Peak Signal to Noise Ratio). Experimental results show that the proposed algorithm can improve the compression rate up to 31% averagely comparing to the JPEG and H.264 compression standards. B. Embedding Performances Fig. 12: Extracted secret images Figure 10 shows the extracted secret images. It shows that the secret image can be reproduced without much distortion. The table V shows PSNR of secret image vs. extracted secret image. From the table V it is evident that the proposed method has best result for extracted true secret images. Test Images Image Dimension PSNR Baboon 512X512 29.27 Flower 264x191 30.60 Lena 512x512 29.33 Pepper 512x512 30.84 House 256x256 28.92 F-16 512x512 27.88 Table. 5: PSNR of Secret Image Vs. Extracted Secret Image DISCUSSIONS AND FUTURE WORKVI. This paper presents a very simple embedding algorithm that modifies the encoded bit stream. The proposed technique has negligible effect on the quality of the cover image while reconstructed. The use one-time private key is the strength of the technique. The strength of the technique is that uses a one-time private key. This secret key determines which code is to be transmitted. The future work aim at making more sophisticated stenographic technique for hiding secret image without recognizable change in the cover image, so as to make embedding detection is impossible. CONCLUSIONVII. Generally, image stenography method does not provide much attention on the compression ratio. In this paper, the cover image is compressed and form a bit stream and after that the secret image is hiding on this bit stream. By improving an existing encoding method, the security of the embedded image can be improved while keeping the same robustness of the original method. The one time secret key determines which code is to be transmitted. So this operation provides sufficient secrecy. According to the experimental results, the proposed method has higher compression ratio at a cost of slight change in PSNR ratio compared to JPEG and H.264 compression standards. REFERENCES [1] Mahmud Hasan, Kamruddin Md. Nur, Tanzeem Bin Noor,” A Novel Compressed Domain Technique of Reversible Steganography”., International Journal of Advanced Research in Computer Science and Software Engineering., Volume 2, Issue 3, March 2012. [2] Mohanbaabu G and P. Renuga,” Still Image Compression Using Texture and Non Texture Prediction Model”, American Journal of Applied Sciences 9 (4): 519-525, 2012 ISSN 1546-9239 © 2012 Science Publications. [3] Ammar Abdul, Ame-Ammar Abdul ,Saddam Kamil Alwane” Secret Technique to Hiding Image after Compression In Cover Image”, Eng. & Tech. Journal, Vol. 29, No.10, 2011 [4] Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform”, The International Arab Journal of Information Technology, Vol.7, No. 4, October 2010 [5] R. A. Ghazy, M. M. Hadhoud, M. I. Dessouky, N. A. El-Fishawy, F. E. Abd El-Samie, “Performance Evaluation Of Block Based Svd Image Watermarking”, Department of Electronics and Electrical Communications ,Faculty of Electronic Engineering,Menoufia University,32952, Menouf, Egypt [6] Iain Richardson, Vcodex,“H.264/ AVC Intra Prediction”. www.vcodex.com,2010 [7] K B Shiva Kumar, K B Raja,R K Chhotaray, Sabyasachi Pattanaik,” Bit Length Replacement Steganography based on DCT Coefficients”, International Journal of Engineering Science and Technology Vol. 2(8), 2010, 3561-3570. [8] Sang-Gyu Cho, Zoran Bojkovi´c, Dragorad Milovanovi´c, Jungsik Lee, and Jae-Jeong Hwang “Image Quality Evaluation: JPEG 2000 Versus Intra- only H.264/AVC High Profile”, FACTA UNIVERSITATIS (NIS) SER.: ELEC. ENERG. vol. 20, no. 1, April 2007, 71-83 [9] Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 2006. 4, 3: 275-290 [10] Pankaj Topiwala“Comparative Study of JPEG 2000 and H.264/AVC FRExt I– Frame Coding on High- Definition Video Sequences”, FastVDO LLC, 7150 Riverwood Dr., Columbia, Maryland, 21046-1245 USA,2005 [11] Chen Chen and Ping-Hao Wu, Homer Chen, ”Transform-Domain Intra Prediction for H.264”, National Science Council,0-7803-8834-8/05/$20.00 ©2005 IEEE. [12] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli,. “Image quality assessment:From error
  • 6. Image Compression Using Intra Prediction of H.264/AVC and Implement of Hiding Secret Image into an Encoded Bitstream (IJSRD/Vol. 1/Issue 7/2013/0010) All rights reserved by www.ijsrd.com 1416 visibility to structural similarity,” IEEE Trans. Image Process., vol. 13,no.4,pp. 600-612,April 2004. [13] Hsien-Wen Tseng, Chin-Chen Chang,” High Capacity Data Hiding in JPEG-CompressedImages”, Informatica, Institute of Mathematics and Informatics, Vilnius 2004, Vol. 15, No. 1, 127–142 2004 [14] Thomas Wiegand, Gary J. Sullivan, Senior Member, IEEE, Gisle Bjøntegaard, and Ajay Luthra, Senior Member, IEEE,” Overview of the H.264/AVC Video Coding Standard ”, IEEE Transactions On Circuits And Systems For Video Technology., Vol. 13, No. 7, July 2003 [15] Hsien-Wen Tseng, Chin-Chen Chang,” High Capacity Data Hiding in JPEG-Compressed Images”, NFORMATICA, 2004, Vol. 15, No. 1, Institute of Mathematics and Informatics, Vilnius, 2003 . [16] Majid Rabbani, Rajan Joshi “An overview of the JPEG2000 still image compression standard”, Signal Processing: Image Communication 17 (2002) 3–48. [17] “H.264 video compression standard”, White paper, Axis communications,2002. [18] Charilaos Christopoulos, Touradj Ebrahimi,” The JPEG2000 Still Image Coding System: An Overview”, IEEE Transactions on Consumer Electronics. Vol. 46, No. 4, pp. 1103-1127, November 2000. [19] N. F. Johnson and S. Katzenbeisser,” .A survey of steganographic techniques”, in S. Katzenbeisser and F. Peticolas (Eds.): Information Hiding, pp.43-78. Artech House, Norwood, MA, 2000. [20] Andrews, H. Patterson, C., “Singular Value Decomposition (SVD) Image Coding”, Acoustics, Speech and Signal Processing, IEEE Transactions on Image Processing. Volume: 24 , Issue: 1,1976. [21] Da-Chun Wu' and Wen-Hsiang Tsai,” Data Hiding In Images Via Multiple-Based Er Conversion And Lossy Compression”, IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, November 1998