SlideShare ist ein Scribd-Unternehmen logo
1 von 38
DATA HIDING USING
IMAGE INTERPOLATION
INTRODUCTION
Interpolation is the process of determining the
values of a function at positions lying between
its samples.
 It achieves this process by fitting a continuous
function through the discrete input samples.
 This permits input values to be evaluated at
arbitrary positions in the input, not just those
defined at the sample points.
Image interpolation occurs in all digital photos at
some stage whether this be in bayer
demosaicing or in photo enlargement.
It happens anytime you resize or remap (distort)
your image from one pixel grid to another.
 Image resizing is necessary when you need to
increase or decrease the total number of pixels,
whereas remapping can occur under a wider
variety of scenarios: correcting for lens distortion,
changing perspective, and rotating an image.
CONCEPT
Interpolation works by using known data to
estimate values at unknown points.
 For example: if you wanted to know the
temperature at noon, but only measured it at 11AM
and 1PM, you could estimate its value by
performing a linear interpolation:
If you had an additional measurement at 11:30AM,
you could see that the bulk of the temperature rise
occurred before noon, and could use this
additional data point to perform a quadratic
interpolation:
IMAGE RESIZE EXAMPLE
Original
183%
2d interpolation
before after No
interpolation
Unlike air temperature fluctuations and the ideal
gradient above, pixel values can change far more
abruptly from one location to the next.
 As with the temperature example, the more you
know about the surrounding pixels, the better the
interpolation will become.
IMAGE ROTATION EXAMPLE
Interpolation also occurs each time you rotate or
distort an image.
The previous example was misleading because it is
one which interpolators are particularly good at.
This next example shows how image detail can be
lost quite rapidly:
ORIGINAL
45° rotation
90°
Rotation
(Lossless)
2 X 45°
Rotatio
ns
6 X 15°
Rotations
The 90° rotation is lossless because no pixel ever has
to be repositioned onto the border between two
pixels (and therefore divided).
Note how most of the detail is lost in just the first
rotation, although the image continues to
deteriorate with successive rotations.
 The above results use what is called a "bicubic"
algorithm, and show significant deterioration. .
TYPES OF INTERPOLATION ALGORITHMS
Common interpolation algorithms can be grouped
into two categories:
adaptive and non-adaptive.
Adaptive methods change depending on what
they are interpolating (sharp edges vs. smooth
texture).
 whereas non-adaptive methods treat all pixels
equally.
Non-adaptive algorithms include: nearest neighbor,
bilinear, bicubic, spline, sinc, lanczos and others.
Depending on their complexity, these use
anywhere from 0 to 256 (or more) adjacent pixels
when interpolating.
The more adjacent pixels they include, the more
accurate they can become, but this comes at the
expense of much longer processing time.
Adaptive algorithms include many proprietary
algorithms in licensed software such as:
Qimage, PhotoZoom Pro, Genuine Fractals and
others. Many of these apply a different version of
their algorithm (on a pixel-by-pixel basis).
NEAREST NEIGHBOR INTERPOLATION
Nearest neighbor is the most basic and requires the
least processing time of all the interpolation
algorithms because it only considers one pixel —
the closest one to the interpolated point.
This has the effect of simply making each pixel
bigger. It suffers from aliasing effects on enlarging or
reducing images.
BILINEAR INTERPOLATION
Bilinear interpolation considers the closest 2x2
neighborhood of known pixel values surrounding
the unknown pixel.
 It then takes a weighted average of these 4 pixels
to arrive at its final interpolated value. This results in
much smoother looking images than nearest
neighbor.
But blurr & it requires 3-4 times higher computation.
The above diagram is for a case when all known pixel
distances are equal, so the interpolated value is simply
their sum divided by four.
BICUBIC INTERPOLATION
Bicubic goes one step beyond bilinear by
considering the closest 4x4 neighborhood of known
pixels — for a total of 16 pixels.
 Since these are at various distances from the
unknown pixel, closer pixels are given a higher
weighting in the calculation.
Bicubic produces noticeably sharper images than
the previous two methods, and is perhaps the ideal
combination of processing time and output quality.
For this reason it is a standard in many image
editing programs (including Adobe Photoshop),
printer drivers and in-camera interpolation.
Example bicubic :
NEIGHBOR MEAN INTERPOLATION
Proposed by jung and yoo in 2009.
It uses neighboring pixel values to calculate the
mean and then the calculated mean value is
inserted in to a pixel that has not been allocated
yet.
Complexity is high when number of referenced
pixel is higher.
On the pixel p(i,j) the output pixel p’(i,j) is defined
as:
where p(i,j) denotes the pixel in original image and
m,n=0,1..127 and K is Scaling factor usually assigned
2.












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
The proposed neighbor mean interpolation
46 112
210 90
46 79 112
128 84 101
210 150 90
84)/312879(46(1,1)p'
128210)/2(46(1,0)p'
79112)/246((0,1)p'
46p(0,0)(0,0)p'




interpolation












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
Neighbor Mean Interpolation
the neighbor mean interpolation is similar to bilinear interpolation,
but this method has less blurring and greater image resolution.
DATA HIDING
 Data hiding conceals the existence of secret data
while cryptography protects the contents of message.
 Message may be scattered randomly throughout
cover image or straight inserted.
 Methods : LSB insertion, Masking, Filtering,
Transformations , Reversible data hiding
PROPOSED DATA HIDING METHOD
This method utilizes the resulting images(cover) of
the neighbor mean interpolation method.
The sequence of data hiding can be zig-zag ,left to
right and upper to down direction.
Before Secret data is embedded the host image is
partitioned in to four-pixel, non overlapping,
consecutive blocks by zig–zag scanning as shown
below :
For every four non-overlapping consecutive pixel
values i.e., p(i,j) p(i+1,j) p(i,j+1) and p(i+1,j+1), the
corresponding stego image pixel values are p’(i,j)
p’(i+1,j) p’(i,j+1) and p’(i+1,j+1) respectively.
Here we have embed data in to three pixel except
for p(i,j) pixel.
STEPS INVOLVED IN DATA HIDING :
1. First we get a scaling up image by using neighbor
mean interpolation method.
Then for every four non overlapping consecutive
pixel values a difference value d is calculated as:
 d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
Where 0≤x, y≤127 β, δ value is 0 or 1, respectively.
The number of bits, say n, which can be embedded
in this pixel, is calculated by
N = ln|d|.
A sub stream with n bits in the embedding data is
selected and converted to integer value b. Then, a
stego image pixel p′’(i,j) is computed as follows.
p’’(i,j) = p’(i,j) + b.
DATA EXTRACTION PROCESS :
1. In the extraction process the stego image is also
partitioned in to 2 x 2 non overlapping
consecutive blocks
2. Then b is calculated as follows :
Where x,y=0,1,..127 and k is defined as two .
. After the secret data is extracted we can convert
value of b to be a binary form and concatenate to
the secret bit stream.
Proposed data hiding method :
EXAMPLE :
46 112
210 90
46 79 112
128 84 101
210 150 90
84)/312879(46(1,1)p'
128210)/2(46(1,0)p'
79112)/246((0,1)p'
46p(0,0)(0,0)p'




interpolation












otherwise)/3,)1,('),1('1)-j1,-(p(i
n2j1,m2iifj))/2,,1(ip'j)1,-(i(p'
1n2jm,2iif))/2,1j(i,p'1)-j(i,(p'
n2jm,2iifj),p(i,
j)(i,p'
jipjip
Neighbor Mean Interpolation
EMBEDDING OF SECRET BIT :
46 79 112
128 84 101
210 150 90
46 98 112
150 89 101
210 150 90
 
 
 


















538log
682log
533log
384684
8246128
3346-79
d
2
2
2
n
Embed secret bit
Cover image Stego image









5)00101(
22)010110(
19(10011)
b
2
2
2
89584(1,1)p'
15022128(1,0)p'
981979(0,1)p'



20001011001101011BitsSecret 
d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
 
 
 








2
2
2
)00101(5210)/3112(4689
)010110(22210)/2(46150
)10011(19112)/2(46-98
b
 
 
 


















538log
682log
533log
384684
8246128
3346-79
d
2
2
2
n
46 98 112
150 89 101
210 150 90
46 79 112
128 84 101
210 150 90
Stego image Cover image
Recover
Extract
20001011001101011BitsSecret 
RECOVERY OF SECRET DATA
IMPROVED DATA HIDING METHOD
Proposed in 2011 seventh international conference
on Intelligent information hiding and multimedia
signal processing.
The weakness of jung and yoo’s method is that
pixel extended from the original image have to be
recomputed before extracting the secret data.
The algorithm of the new proposed method is as
follows :
1. Utilize the neighbor mean interpolation to create
a cover image.
2. Divide the cover image from left to right, top to
down, to form 2x2 non-overlapping blocks.
3. In each block, pixels p(i,j), p(i,j+1), p(i+1,j) and
p(i+1,j+1) are renamed as p0, p1, p2, p3, respectively.
Then, we made these four pixels into three groups(p0,
p1), (p0, p2), and (p0, p3).The differences di =pi-p0,
i=1, 2, 3. The capacity ni of the pixel pairs are
computed by eq :
4 Selecting the number of bits from the secret bit
stream and then convert it to decimal form b. the
new difference is computed by
5. The corresponding pixel are
computed by equation :
6.Repeat steps 3-5 in predefined order, top to down
and left to right, until all secret data is embedded or
blocks are exhausted.
EXTRACTING THE DATA :
Apply the hiding algorithm step 2 and 3 to the
stego image we can get new difference and
number of bits embedded with in the
pixel.
Then the secret data can be extracted using the
eq.
According to the number of bits embedded
the extracted secret data b can be translated to
the binary digit which became a part of the secret
data stream.
REFERENCES :
•http://en.wikipedia.org/wiki/Information_hiding
•http://www.sciencedirect.com/science/article/pii/S092548908000846
•http:// http://en.wikipedia.org/wiki/Bicubic_interpolation
•http:// http://en.wikipedia.org/wiki/image_interpolation
•http://en.wikipedia.org/wiki/Image_processing
Data hiding using image interpolation

Weitere ähnliche Inhalte

Was ist angesagt?

「原神」におけるコンソールプラットフォーム開発
「原神」におけるコンソールプラットフォーム開発「原神」におけるコンソールプラットフォーム開発
「原神」におけるコンソールプラットフォーム開発Unity Technologies Japan K.K.
 
영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014
영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014
영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014NDOORS
 
Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_
 Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_ Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_
Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_Unity Technologies Japan K.K.
 
UE4のレイトレで出来ること/出来ないこと
UE4のレイトレで出来ること/出来ないことUE4のレイトレで出来ること/出来ないこと
UE4のレイトレで出来ること/出来ないことSatoshi Kodaira
 
언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술
언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술
언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술Ki Hyunwoo
 
포인트 셰도우
포인트 셰도우포인트 셰도우
포인트 셰도우Sukwoo Lee
 
Taking Killzone Shadow Fall Image Quality Into The Next Generation
Taking Killzone Shadow Fall Image Quality Into The Next GenerationTaking Killzone Shadow Fall Image Quality Into The Next Generation
Taking Killzone Shadow Fall Image Quality Into The Next GenerationGuerrilla
 
OPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYO
OPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYOOPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYO
OPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYOGame Tools & Middleware Forum
 
뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)
뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)
뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)ozlael ozlael
 
임건호 시간의 마녀(2 d)
임건호 시간의 마녀(2 d)임건호 시간의 마녀(2 d)
임건호 시간의 마녀(2 d)임 건호
 
Shadow mapping 정리
Shadow mapping 정리Shadow mapping 정리
Shadow mapping 정리changehee lee
 
ゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYO
ゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYOゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYO
ゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYOGame Tools & Middleware Forum
 
xR Developerなら知っておきたいカメラの基礎知識
xR Developerなら知っておきたいカメラの基礎知識xR Developerなら知っておきたいカメラの基礎知識
xR Developerなら知っておきたいカメラの基礎知識Satoshi Maemoto
 
HoloLensでコンテンツを操作する方法 - Gaze And Dwell -
HoloLensでコンテンツを操作する方法 - Gaze And Dwell -HoloLensでコンテンツを操作する方法 - Gaze And Dwell -
HoloLensでコンテンツを操作する方法 - Gaze And Dwell -Takahiro Miyaura
 
Deferred Rendering in Killzone 2
Deferred Rendering in Killzone 2Deferred Rendering in Killzone 2
Deferred Rendering in Killzone 2Guerrilla
 
UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~
UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~
UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~エピック・ゲームズ・ジャパン Epic Games Japan
 
Unity Game Engine - Basics
Unity Game Engine - BasicsUnity Game Engine - Basics
Unity Game Engine - BasicsFirosK2
 

Was ist angesagt? (20)

「原神」におけるコンソールプラットフォーム開発
「原神」におけるコンソールプラットフォーム開発「原神」におけるコンソールプラットフォーム開発
「原神」におけるコンソールプラットフォーム開発
 
영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014
영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014
영웅의 군단의 테크니컬 아트 - 황재철, 유나이트 코리아 2014
 
Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_
 Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_ Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_
Unity道場京都スペシャル トゥーンシェーディングとノンフォトリアリスティック風絵づくり入門_
 
UE4のレイトレで出来ること/出来ないこと
UE4のレイトレで出来ること/出来ないことUE4のレイトレで出来ること/出来ないこと
UE4のレイトレで出来ること/出来ないこと
 
언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술
언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술
언리얼 서밋 2016 프로젝트 A1의 구형 월드 라이팅 기술
 
MRTK3を調べてみた
MRTK3を調べてみたMRTK3を調べてみた
MRTK3を調べてみた
 
포인트 셰도우
포인트 셰도우포인트 셰도우
포인트 셰도우
 
20181125 pybullet
20181125 pybullet20181125 pybullet
20181125 pybullet
 
Taking Killzone Shadow Fall Image Quality Into The Next Generation
Taking Killzone Shadow Fall Image Quality Into The Next GenerationTaking Killzone Shadow Fall Image Quality Into The Next Generation
Taking Killzone Shadow Fall Image Quality Into The Next Generation
 
OPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYO
OPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYOOPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYO
OPTPiX SpriteStudioと他社ツール比較(真)資料1 - 株式会社ウェブテクノロジ - GTMF 2018 OSAKA / TOKYO
 
뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)
뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)
뭣이 중헌디? 성능 프로파일링도 모름서 - 유니티 성능 프로파일링 가이드 (IGC16)
 
임건호 시간의 마녀(2 d)
임건호 시간의 마녀(2 d)임건호 시간의 마녀(2 d)
임건호 시간의 마녀(2 d)
 
Shadow mapping 정리
Shadow mapping 정리Shadow mapping 정리
Shadow mapping 정리
 
ゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYO
ゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYOゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYO
ゲームデータの圧縮・解凍ツール Oodle 最新情報 - RAD ゲームツールズ - GTMF 2018 TOKYO
 
Background subtraction
Background subtractionBackground subtraction
Background subtraction
 
xR Developerなら知っておきたいカメラの基礎知識
xR Developerなら知っておきたいカメラの基礎知識xR Developerなら知っておきたいカメラの基礎知識
xR Developerなら知っておきたいカメラの基礎知識
 
HoloLensでコンテンツを操作する方法 - Gaze And Dwell -
HoloLensでコンテンツを操作する方法 - Gaze And Dwell -HoloLensでコンテンツを操作する方法 - Gaze And Dwell -
HoloLensでコンテンツを操作する方法 - Gaze And Dwell -
 
Deferred Rendering in Killzone 2
Deferred Rendering in Killzone 2Deferred Rendering in Killzone 2
Deferred Rendering in Killzone 2
 
UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~
UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~
UE4のライティング解体新書~効果的なNPRのためにライティングの仕組みを理解しよう~
 
Unity Game Engine - Basics
Unity Game Engine - BasicsUnity Game Engine - Basics
Unity Game Engine - Basics
 

Andere mochten auch

Image Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom ConceptsImage Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom Conceptsmmjalbiaty
 
Image interpolation
Image interpolationImage interpolation
Image interpolationKokuiSai
 
Interpolation and extrapolation
Interpolation and extrapolationInterpolation and extrapolation
Interpolation and extrapolationAswin Pv
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...mmjalbiaty
 
Effective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionEffective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionIOSR Journals
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...Editor IJCATR
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...Shalu Singh
 
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...Tecnick.com LTD
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image WatermarkingPralin Pavithran
 
Interpolation 2013
Interpolation 2013Interpolation 2013
Interpolation 2013Atiqa khan
 
Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Shashank
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionPapitha Velumani
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
Interpolation
InterpolationInterpolation
Interpolationmbhuiya6
 
Binary to grey code conversion
Binary to grey code conversionBinary to grey code conversion
Binary to grey code conversionSunny
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesPrashant Singh
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentalsA B Shinde
 

Andere mochten auch (20)

Image Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom ConceptsImage Interpolation Techniques with Optical and Digital Zoom Concepts
Image Interpolation Techniques with Optical and Digital Zoom Concepts
 
Image interpolation
Image interpolationImage interpolation
Image interpolation
 
Image Interpolation
Image InterpolationImage Interpolation
Image Interpolation
 
Interpolation and extrapolation
Interpolation and extrapolationInterpolation and extrapolation
Interpolation and extrapolation
 
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
 
Effective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super ResolutionEffective Pixel Interpolation for Image Super Resolution
Effective Pixel Interpolation for Image Super Resolution
 
A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...A Survey on Video Watermarking Technologies based on Copyright Protection and...
A Survey on Video Watermarking Technologies based on Copyright Protection and...
 
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
A Robust Deinterlacing Multiple Image Watermarking Technique in Discrete Wave...
 
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
iNEDI - Accuracy Improvements and Artifacts Removal in Edge Based Image Inter...
 
Digital Image Watermarking
Digital Image WatermarkingDigital Image Watermarking
Digital Image Watermarking
 
Interpolation 2013
Interpolation 2013Interpolation 2013
Interpolation 2013
 
Digital Image Fundamentals - II
Digital Image Fundamentals - IIDigital Image Fundamentals - II
Digital Image Fundamentals - II
 
Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...Report medical image processing image slice interpolation and noise removal i...
Report medical image processing image slice interpolation and noise removal i...
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Reversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryptionReversible data hiding in encrypted images by reserving room before encryption
Reversible data hiding in encrypted images by reserving room before encryption
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Interpolation
InterpolationInterpolation
Interpolation
 
Binary to grey code conversion
Binary to grey code conversionBinary to grey code conversion
Binary to grey code conversion
 
Digital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) ImagesDigital Watermarking Of Medical(DICOM) Images
Digital Watermarking Of Medical(DICOM) Images
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentals
 

Ähnlich wie Data hiding using image interpolation

Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detectionAB Rizvi
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...sipij
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementredpel dot com
 
ee8220_project_W2013_v5
ee8220_project_W2013_v5ee8220_project_W2013_v5
ee8220_project_W2013_v5Farhad Gholami
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsCSCJournals
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement ijsc
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...IRJET Journal
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
SinGAN for Image Denoising
SinGAN for Image DenoisingSinGAN for Image Denoising
SinGAN for Image DenoisingKhalilBergaoui
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm IJECEIAES
 
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABJim Jimenez
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGIRJET Journal
 
Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...sipij
 
Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...CSCJournals
 

Ähnlich wie Data hiding using image interpolation (20)

Digital image forgery detection
Digital image forgery detectionDigital image forgery detection
Digital image forgery detection
 
Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...Performance analysis of high resolution images using interpolation techniques...
Performance analysis of high resolution images using interpolation techniques...
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancement
 
Digital.cc
Digital.ccDigital.cc
Digital.cc
 
ee8220_project_W2013_v5
ee8220_project_W2013_v5ee8220_project_W2013_v5
ee8220_project_W2013_v5
 
Denoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped WindowsDenoising Process Based on Arbitrarily Shaped Windows
Denoising Process Based on Arbitrarily Shaped Windows
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Ijetcas14 372
Ijetcas14 372Ijetcas14 372
Ijetcas14 372
 
Segmentation
SegmentationSegmentation
Segmentation
 
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
Translation Invariance (TI) based Novel Approach for better De-noising of Dig...
 
Log polar coordinates
Log polar coordinatesLog polar coordinates
Log polar coordinates
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
SinGAN for Image Denoising
SinGAN for Image DenoisingSinGAN for Image Denoising
SinGAN for Image Denoising
 
Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm Image Denoising by using Modified SGHP Algorithm
Image Denoising by using Modified SGHP Algorithm
 
B070306010
B070306010B070306010
B070306010
 
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLABANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
ANALYSIS OF IMAGE ENHANCEMENT TECHNIQUES USING MATLAB
 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
 
Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...Contrast enhancement using various statistical operations and neighborhood pr...
Contrast enhancement using various statistical operations and neighborhood pr...
 
Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...Interpolation Technique using Non Linear Partial Differential Equation with E...
Interpolation Technique using Non Linear Partial Differential Equation with E...
 

Mehr von Vikrant Arya

Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginnerVariable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginnerVikrant Arya
 
Hello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swiftHello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swiftVikrant Arya
 
Resume Building By Sudhir Agarwal
Resume Building By Sudhir AgarwalResume Building By Sudhir Agarwal
Resume Building By Sudhir AgarwalVikrant Arya
 
Recommendation system
Recommendation system Recommendation system
Recommendation system Vikrant Arya
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionVikrant Arya
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Vikrant Arya
 

Mehr von Vikrant Arya (6)

Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginnerVariable , Array , Dictionary of swift -IOS Development - a hub for beginner
Variable , Array , Dictionary of swift -IOS Development - a hub for beginner
 
Hello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swiftHello World Program in xcode ,IOS Development using swift
Hello World Program in xcode ,IOS Development using swift
 
Resume Building By Sudhir Agarwal
Resume Building By Sudhir AgarwalResume Building By Sudhir Agarwal
Resume Building By Sudhir Agarwal
 
Recommendation system
Recommendation system Recommendation system
Recommendation system
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Fast and secure protocol (fasp)
Fast and secure protocol (fasp)Fast and secure protocol (fasp)
Fast and secure protocol (fasp)
 

Kürzlich hochgeladen

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 

Kürzlich hochgeladen (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 

Data hiding using image interpolation

  • 1. DATA HIDING USING IMAGE INTERPOLATION
  • 2. INTRODUCTION Interpolation is the process of determining the values of a function at positions lying between its samples.  It achieves this process by fitting a continuous function through the discrete input samples.  This permits input values to be evaluated at arbitrary positions in the input, not just those defined at the sample points.
  • 3. Image interpolation occurs in all digital photos at some stage whether this be in bayer demosaicing or in photo enlargement. It happens anytime you resize or remap (distort) your image from one pixel grid to another.  Image resizing is necessary when you need to increase or decrease the total number of pixels, whereas remapping can occur under a wider variety of scenarios: correcting for lens distortion, changing perspective, and rotating an image.
  • 4. CONCEPT Interpolation works by using known data to estimate values at unknown points.  For example: if you wanted to know the temperature at noon, but only measured it at 11AM and 1PM, you could estimate its value by performing a linear interpolation:
  • 5. If you had an additional measurement at 11:30AM, you could see that the bulk of the temperature rise occurred before noon, and could use this additional data point to perform a quadratic interpolation:
  • 6. IMAGE RESIZE EXAMPLE Original 183% 2d interpolation before after No interpolation
  • 7. Unlike air temperature fluctuations and the ideal gradient above, pixel values can change far more abruptly from one location to the next.  As with the temperature example, the more you know about the surrounding pixels, the better the interpolation will become.
  • 8. IMAGE ROTATION EXAMPLE Interpolation also occurs each time you rotate or distort an image. The previous example was misleading because it is one which interpolators are particularly good at. This next example shows how image detail can be lost quite rapidly: ORIGINAL 45° rotation 90° Rotation (Lossless) 2 X 45° Rotatio ns 6 X 15° Rotations
  • 9. The 90° rotation is lossless because no pixel ever has to be repositioned onto the border between two pixels (and therefore divided). Note how most of the detail is lost in just the first rotation, although the image continues to deteriorate with successive rotations.  The above results use what is called a "bicubic" algorithm, and show significant deterioration. .
  • 10. TYPES OF INTERPOLATION ALGORITHMS Common interpolation algorithms can be grouped into two categories: adaptive and non-adaptive. Adaptive methods change depending on what they are interpolating (sharp edges vs. smooth texture).  whereas non-adaptive methods treat all pixels equally.
  • 11. Non-adaptive algorithms include: nearest neighbor, bilinear, bicubic, spline, sinc, lanczos and others. Depending on their complexity, these use anywhere from 0 to 256 (or more) adjacent pixels when interpolating. The more adjacent pixels they include, the more accurate they can become, but this comes at the expense of much longer processing time.
  • 12. Adaptive algorithms include many proprietary algorithms in licensed software such as: Qimage, PhotoZoom Pro, Genuine Fractals and others. Many of these apply a different version of their algorithm (on a pixel-by-pixel basis).
  • 13. NEAREST NEIGHBOR INTERPOLATION Nearest neighbor is the most basic and requires the least processing time of all the interpolation algorithms because it only considers one pixel — the closest one to the interpolated point. This has the effect of simply making each pixel bigger. It suffers from aliasing effects on enlarging or reducing images.
  • 14. BILINEAR INTERPOLATION Bilinear interpolation considers the closest 2x2 neighborhood of known pixel values surrounding the unknown pixel.  It then takes a weighted average of these 4 pixels to arrive at its final interpolated value. This results in much smoother looking images than nearest neighbor. But blurr & it requires 3-4 times higher computation.
  • 15. The above diagram is for a case when all known pixel distances are equal, so the interpolated value is simply their sum divided by four.
  • 16. BICUBIC INTERPOLATION Bicubic goes one step beyond bilinear by considering the closest 4x4 neighborhood of known pixels — for a total of 16 pixels.  Since these are at various distances from the unknown pixel, closer pixels are given a higher weighting in the calculation. Bicubic produces noticeably sharper images than the previous two methods, and is perhaps the ideal combination of processing time and output quality. For this reason it is a standard in many image editing programs (including Adobe Photoshop), printer drivers and in-camera interpolation.
  • 18. NEIGHBOR MEAN INTERPOLATION Proposed by jung and yoo in 2009. It uses neighboring pixel values to calculate the mean and then the calculated mean value is inserted in to a pixel that has not been allocated yet. Complexity is high when number of referenced pixel is higher.
  • 19. On the pixel p(i,j) the output pixel p’(i,j) is defined as: where p(i,j) denotes the pixel in original image and m,n=0,1..127 and K is Scaling factor usually assigned 2.             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip
  • 20. The proposed neighbor mean interpolation
  • 21. 46 112 210 90 46 79 112 128 84 101 210 150 90 84)/312879(46(1,1)p' 128210)/2(46(1,0)p' 79112)/246((0,1)p' 46p(0,0)(0,0)p'     interpolation             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip Neighbor Mean Interpolation
  • 22. the neighbor mean interpolation is similar to bilinear interpolation, but this method has less blurring and greater image resolution. DATA HIDING  Data hiding conceals the existence of secret data while cryptography protects the contents of message.  Message may be scattered randomly throughout cover image or straight inserted.  Methods : LSB insertion, Masking, Filtering, Transformations , Reversible data hiding
  • 23. PROPOSED DATA HIDING METHOD This method utilizes the resulting images(cover) of the neighbor mean interpolation method. The sequence of data hiding can be zig-zag ,left to right and upper to down direction.
  • 24. Before Secret data is embedded the host image is partitioned in to four-pixel, non overlapping, consecutive blocks by zig–zag scanning as shown below :
  • 25. For every four non-overlapping consecutive pixel values i.e., p(i,j) p(i+1,j) p(i,j+1) and p(i+1,j+1), the corresponding stego image pixel values are p’(i,j) p’(i+1,j) p’(i,j+1) and p’(i+1,j+1) respectively. Here we have embed data in to three pixel except for p(i,j) pixel. STEPS INVOLVED IN DATA HIDING : 1. First we get a scaling up image by using neighbor mean interpolation method.
  • 26. Then for every four non overlapping consecutive pixel values a difference value d is calculated as:  d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y) Where 0≤x, y≤127 β, δ value is 0 or 1, respectively. The number of bits, say n, which can be embedded in this pixel, is calculated by N = ln|d|.
  • 27. A sub stream with n bits in the embedding data is selected and converted to integer value b. Then, a stego image pixel p′’(i,j) is computed as follows. p’’(i,j) = p’(i,j) + b.
  • 28. DATA EXTRACTION PROCESS : 1. In the extraction process the stego image is also partitioned in to 2 x 2 non overlapping consecutive blocks 2. Then b is calculated as follows : Where x,y=0,1,..127 and k is defined as two .
  • 29. . After the secret data is extracted we can convert value of b to be a binary form and concatenate to the secret bit stream. Proposed data hiding method :
  • 30. EXAMPLE : 46 112 210 90 46 79 112 128 84 101 210 150 90 84)/312879(46(1,1)p' 128210)/2(46(1,0)p' 79112)/246((0,1)p' 46p(0,0)(0,0)p'     interpolation             otherwise)/3,)1,('),1('1)-j1,-(p(i n2j1,m2iifj))/2,,1(ip'j)1,-(i(p' 1n2jm,2iif))/2,1j(i,p'1)-j(i,(p' n2jm,2iifj),p(i, j)(i,p' jipjip Neighbor Mean Interpolation
  • 31. EMBEDDING OF SECRET BIT : 46 79 112 128 84 101 210 150 90 46 98 112 150 89 101 210 150 90                         538log 682log 533log 384684 8246128 3346-79 d 2 2 2 n Embed secret bit Cover image Stego image          5)00101( 22)010110( 19(10011) b 2 2 2 89584(1,1)p' 15022128(1,0)p' 981979(0,1)p'    20001011001101011BitsSecret  d = p’(K . x +β, K .y +δ ) − p’(K .x , K .y)
  • 32.               2 2 2 )00101(5210)/3112(4689 )010110(22210)/2(46150 )10011(19112)/2(46-98 b                         538log 682log 533log 384684 8246128 3346-79 d 2 2 2 n 46 98 112 150 89 101 210 150 90 46 79 112 128 84 101 210 150 90 Stego image Cover image Recover Extract 20001011001101011BitsSecret  RECOVERY OF SECRET DATA
  • 33. IMPROVED DATA HIDING METHOD Proposed in 2011 seventh international conference on Intelligent information hiding and multimedia signal processing. The weakness of jung and yoo’s method is that pixel extended from the original image have to be recomputed before extracting the secret data. The algorithm of the new proposed method is as follows : 1. Utilize the neighbor mean interpolation to create a cover image. 2. Divide the cover image from left to right, top to down, to form 2x2 non-overlapping blocks.
  • 34. 3. In each block, pixels p(i,j), p(i,j+1), p(i+1,j) and p(i+1,j+1) are renamed as p0, p1, p2, p3, respectively. Then, we made these four pixels into three groups(p0, p1), (p0, p2), and (p0, p3).The differences di =pi-p0, i=1, 2, 3. The capacity ni of the pixel pairs are computed by eq : 4 Selecting the number of bits from the secret bit stream and then convert it to decimal form b. the new difference is computed by
  • 35. 5. The corresponding pixel are computed by equation : 6.Repeat steps 3-5 in predefined order, top to down and left to right, until all secret data is embedded or blocks are exhausted.
  • 36. EXTRACTING THE DATA : Apply the hiding algorithm step 2 and 3 to the stego image we can get new difference and number of bits embedded with in the pixel. Then the secret data can be extracted using the eq. According to the number of bits embedded the extracted secret data b can be translated to the binary digit which became a part of the secret data stream.