Open Access Open Access  Restricted Access Subscription or Fee Access

Data Compression and Hiding using Vector Quantization Techniques

A. Suresh

Abstract


Embedding of useful information in a host signal without any loss of host information is need for copyrights protection. Customer identification can be embedded directly into multimedia files, this leads to a number of specific requirements with respect to robustness, transparency and complexity. In early data hiding can be done by difference expansion, histogram shifting, and Spatial-domain and frequency-domain techniques. Which lead to high PSNR values and more robust imperceptibility, avoid such a kind of issue this paper concentrate on vector quantization technique which can split and compress the data into smaller groups and are embedded into the multimedia pixels. This VQ method enables for effective pixel utilization and retrieves the content without any loss of original pixels. This kind of VQ is based on indices; the data content can be mapped into many to one form.

Keywords


Data Hiding, Stenography, Water Marking, Vector Quantization, Copyright Protections.

Full Text:

PDF

References


R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A Digital watermark", Proceedings of IEEE International Conference on Image Processing, Vol. 1, 1994, pp. 86-90.

K. Matsui and K. Tanaka, ―Video-Steganography: How to Embed a Signature in a Picture‖, in Proceedings of IMA Intellectual Property, Jan. 1994, Vol. 1, No. 1, pp. 187-206.

I. Pitas, "A method for signature casting on digital images", Proceedings of IEEE International Conferenceon Image Processing, Vol. 3, 1996, pp. 215-218.

G. Voyatzis and I. Pitas, "Applications of toral automorphisms in image watermaking", Proceedings of IEEE International Conference on Image Processing, Vol. 2, 1996, pp. 237-240.

O. Bruyndonckx, J.-J. Quisquater, and B. Macq, "Spatial method for copyright labeling of digital images", Proceedings of IEEE Nonlinear Signal Processing Workshop, 1995, pp. 456-459.

J. Smith and B. Comiskey, ―Modulation and information hiding in images", in Proceedings of First International Workshop on Information Hiding, 1997, pp. 207-226.

Martin Kutter, Frederic Jordan and Frank Bossen, "Digital watermarking of color images using amplitude modulation", Journal of Electronic Imaging, Vol. 7, No. 2, April 1998, pp. 326-332.

P. Davern and M. Scott, "Fractal based image staganography", in Proceedings of First InternationalWorkshop on Information Hiding, 1997, pp. 279-294.

J. Ohnishi and K. Matsui, "Embedding a seal into a picture under orthogonal wavelet transform", inProceedings of Multimedia, 1996, pp. 514-521.

Marc Schneider and Shih -Fu Chang, "A robust content based digital signature for image authentication", Proceedings of IEEE International Conference on Image Processing, 1996, pp. 227-230.

J J K. O Ruanaidh, W J. Dowling, and F M. Boland, "Watermaking digital images for copyright protection", IEE Proceedings: Vision, Image & Signal Processing, Vol. 143, No. 4, Aug. 1996, pp. 250-256.

Ingemar J. Cox, Joe Kilian, F Thomson Leighton, and Talal Shamoon, "Secure spread spectrum watermarking for multimedia", IEEE Transactions of Image Processing, Vol. 6 No. 12, Dec. 1997, pp. 1673-1687.

Chiou-Ting Hsu and Ja-Ling Wu, "Hidden signatures in images", in Proceedings of International Conference on Image Processing,1996, pp. 223-226.

Chiou-Ting Hsu, Ja-Ling Wu, "DCT-based watermarking for video", IEEE Transactions on Consumer Electronics, Vol. 44, No. 1, Feb 1998, pp. 206-216.

Adrian G. Bors and Ioannis Pitas, "Image watermarking using DCT domain constraints", Proceedings of IEEE International Conference on Image Processing, Vol. 3, 1996, pp. 231-234.

J.-F. Delaigle, C. De Vleeschouwer and B. Macq, "Psychovisual approach to digital picture watermarking", Journal of Electronic Imaging, Vol. 7, No. 3, July 1998, pp. 628-640.

A. M. Alattar, ―Reversible watermark using the difference expansion of a generalized integer transform,‖ IEEE Trans. Image Process., vol.13, no. 8, pp. 1147–1156, Aug. 2004.

W. Bender, D. Gruhl, N. Morimoto, and A. Lu, ―Techniques for data hiding,‖ IBM Syst. J., vol. 35, no. 3, pp. 313–336, 1996.

J. M. Barton, ―Method and apparatus for embedding authentication information within digital data,‖ U.S. Patent 5 646 997, 1997.

Digital image processing copyright 2009 by tata Mcgraw Hill Education private limited, by Jayaraman.S. Esakkirajan.S, Veerakumar.T.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.