SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
The International Journal Of Engineering And Science (IJES)
||Volume||3 ||Issue|| 2||Pages|| 16-21||2014||
ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805
www.theijes.com The IJES Page 16
Enhancing the Image Compression Rate Using Steganography
1,
Archana Parkhe ,2,
Nilam Bire , 3,
Anuja Ghodekar , 4,
Tejal Raut ,5,
Tanuja Sali
1,2,3,4,5,
Department of Information Technology, Pimpri Chinchwad College of Engineering, Nigdi, Pune
------------------------------------------------------ABSTRACT-----------------------------------------------------
Image compression is a technique to minimize the size in bytes of a graphics file without degrading the quality
of image to an unacceptable level. On the other hand, steganography deals with embedding secret data in
redundancies of image in invisibility manner. The goal of this study is to improve image compression through
steaganography. Therefore, this paper proposes two schemes one of which combines a steganographic
algorithm with the baseline DCT-based JPEG, and the second one uses this steganographic algorithm with the
DWT-based JPEG. Hence, data compression is performed twice.
KEYWORDS : DCT,DWT,JPEG,LSB coding.
----------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 11 February 2014 Date of Acceptance: 05 March 2014
---------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Image compression addresses the problem of reducing the amount of data required to represent a digital
image. It is a process intended to yield a compact representation of an image, thereby reducing the image
storage/transmission requirements. The main use of our paper is to increase the image compression rate using
steganography and the most effective compression algorithmic program is DWT. For removing the redundant
binary data from the image we use (DWT) separate wavelet transform and (DCT) discrete cosine transform
algorithmic program. We are using this technique for removing the redundant data from the image. The DCT
algorithm removes the data and compresses the image size. The DCT compression technique mostly gives
minimal compression rate as compared to DWT.Compression is incredibly necessary to reduce storage size on
storage device. Digital images compressed by eliminating redundant information present within the image, like
spatial redundancy, spectral the image binary code. We use two techniques co-jointly to compress an image that
is DCT & DWT. The first algorithmic program combines a steganographic algorithm with the baseline DCT-
based JPEG, whereas the second one uses this steganographic algorithm with the DWT-based JPEG. We are
employing mostly DWT only because the image compression rate is maximum as compare to DCT. The
algorithm of DWT removes the amount of bits data from the image.
II. RELATED WORK
Many research works related to data embedding based on compression have been proposed till now. [1]
implemented a technique to improve color image coding. Transforms a given color image into the YIQ color
space where the chrominance information is sub sampled and embedded in the wavelet domain of the luminance
component. [2] proposed image embedding using quantization index modulation. Several authors used the
discrete wavelet transform to split the original image into two parts, the low-pass image (called host image), and
the high-pass image (called the residual image). The residual image is, first, coded using a modified version of
the embedded zero-tree wavelet coder (EZW) and, then embedded into the host image. The embedding process
is based on a linear projection, quantization and perturbation in the DCT domain (bits in each 8 * 8 blocks). [7]
includes an approach for lossless image compression in spatial domain for continues tone images using a novel
concept of image folding.[8] proposes a novel high capacity data hiding method based on JPEG. It employs a
capacity table to estimate the number of bits that can be hidden in each DCT component so that significant
distortions in the stego-image can be avoided. [9] presents an unique theme for image quality assessment, here
introduced an alternative framework for quality assessment based on the degradation of structural information.
However, the above mentioned schemes uses were not clear and the embedding techniques details are not
shown. Therefore, in this paper, we introduce a novel algorithm Stego-JPEG (DWT) as an extension to previous
work Stego-JPEG (DCT) (Jafari, Ziou, &Mammeri, 2011) to apply steganography in DWT domain. Moreover,
we intend to extend our previous framework for color images which provides high compression gain with high
quality.
Enhancing The Image Compression Rate…
www.theijes.com The IJES Page 17
III. METHODOLOGY
The main focus of this approach is to compress image and extend the compression rate. We are using
two methods DCT and DWT. When we divide the input image into set of 8 * 8 pixels, it embeds into 196 this
reduces file size using steganography. Target blocks us going to hide for understanding. It receives bits from
target block (Jafari et al., 2011). To compress target block Bk of image the method is using lossy JPEG. Now
we hide input data in to subsequent block Bk+1,……Bl in to compressed image[6].
DCT based scheme
For color images, each component (Y, Cb, and Cr) will be processed separately. The embedded bits
total number is n = nk+1 + nk+2 +……. + nl, where nk+1 + nk+2 +……. + nl are the embedded. bits on blocks Bk+1, .
. . ,Bl, respectively, and it depends on the number of bits that are coded. If we consider µ the mean number of
bits hidden per block, then the payload size is equal to . Note that we hide the data in DC
component[6].
DCT based encoding
DCT stands for discrete cosine transform (DCT) and it removes the redundant bits from image bits.
DCT it is finite sequence of data points. The terms of a sum of cosine functions oscillating at different
frequencies. For DCT Compression method uses the algorithm given below to compress the data.
Algorithm 1.Stego- JPEG (DCT) Encoding [6]
Input: The quantized coefficients block Bi from image which we provided as input of N*M pixels, where I €
[1,(N*M)/(8*8)].
Output: A compressed JPEG (DCT) image.
The following steps are executed for embedding process:
I. Applying rounding step to block Bk.
II. Compressing Bk block using lossy JPEG method.
Enhancing The Image Compression Rate…
www.theijes.com The IJES Page 18
III. Hide the block Bk current bits of compressed in the n coefficients of the subsequent blocks Bk+1,…..B Where
N=nk+1+nk+2+…….+ nl, ni the number of coefficients that are used in the ith
block such that:
IV. Repeat I-III until k >
DCT based decoding
Encoding and decoding are parallel operation for coding and decoding algorithm. Way extract blocks
from compressed image used embedding process. Decoder having some methods a Huffman decoder and a
coefficient de-quantizer where all coded data flows.
Firstly decompression is performed, embedded blocks are extracted by checking odd and even Ci(i,j)
coefficients from n coefficients of sequential blocks. That quantize to a value with magnitude T or smaller
decoder disregards all coefficients. Then inverse DCT is used. Stego-JPEG (DCT) decoder is repeated for each
of the components Y, Cb, and Cr separately for color images. Decoding speed is increased by using a plurality of
decoding devices in parallel with each decoder having a Huffman decoder and a coefficient de-quantizer
through which all coded data flows.
Algorithm 2.Stego-JPEG (DCT) decoding [6]
Input: A compressed JPEG (DCT) image.
Output: A decompressed image.
The following steps are executed for embedding process:
I. Lossy JPEG decoding by decompressed blocks.
II. Extract the embedded block of Bk+1,…..Bl coefficients |Ci(i,j)| ≥ T from the subsequent blocks such that:
Embedded – bit =
Apply lossy JPEG decoding for embedded block.
Repeat I-III until .
IV. DWT BASED SCHEME
DWT based encoding
Same method is used in DCT which is before embedding process we follow it. Before embedding the
target blocks are compressed using DWT-JPEG, including DWT transformation, quantization, and entropy
coding. Blocks are transformed using DWT and quantized. Depending on the embedded bit (0 or 1), the
receiving blocks is rounded to the nearest odd or even value. If the embedded bit is equal to 0.
Ci(i, j) is rounded to its odd value, otherwise, it will be rounded to the even value.
Note: same conditions applied for steganographic scheme used in DCT-JPEG are applicable integrated within
DWT-JPEG. The embedding process for gray images and for each of the components Y, Cb, and Cr separately
for color images is summarized as follows:
Algorithm3. Stego-JPEG (DWT) encoding
Input: DWT coefficients.
Output: A compressed JPEG(DWT) image.
Steps for embedding process:
I. Group wavelet coefficients into m * m blocks Bk from an image I of pixels.
II. Apply rounding and quantization for block Bk.
III. Compress Bk by using lossy JPEG coding based on DWT.
IV. Current bits embed of compressed block Bk in the n coefficients of the subsequent blocks Bk+1, . . . ,Bl Where
N=nk+1+nk+2+…….+nl,ni the number of coefficients that are used in the ith
block such that:
IV. Repeat I-III until k >
Enhancing The Image Compression Rate…
www.theijes.com The IJES Page 19
DWT based decoding
The same process used for extraction with DCT is used by DWT. The process for images as follows:
Algorithm 4.Stego-JPEG (DWT) decoding [6]
Input: A compressed JPEG (DWT) image.
Output: A decompressed image.
The steps are as follows:
I. JPEG decoding based on DWT by extraction.
II. Extract the embedded block of Bk+1, . . . ,Bl coefficients |Ci(i,j)| ≥ T from the subsequent blocks such that:
Embedded – bit =
III. On embedded block apply JPEG decoding based DWT.
IV. Repeat I-III until .
V. Create DWT image form from extracted and original blocks.
VI. Apply IDWT.
V. RESULTS AND DISCUSSION
We have evaluated two image compression schemes and presented the evaluation methodology used in
this work as well as the simulation parameters. The compression performance of the schemes under
consideration is assessed using both the compression ratio and the quality of compression. Note that the criterion
of image quality comparison is the resemblance between original and reconstructed images. For the comparison
between images, we employed the peak signal-to-noise ratio (PSNR) as the measure of image quality. Our
results show that when T = 1 increasing compression ratio is maximum with acceptable quality for both Stego-
JPEG (DCT) and stego-JPEG (DWT).
Table 1.JPEG comparison PSNR and Compression Ratio
Table 2.BMP comparison PSNR and Compression Ratio
Fig.3.Baboon Original-Stego-JPEG(DCT)
Image
Name
DCT DWT
PSNR Compression ratio PSNR Compression ratio
Lenna 33 3.642 10 51.13
Baboon 18 1.461 20 51.12
Image Name DCT DWT
PSNR Compression ratio PSNR Compression ratio
Lenna 33 4.179 10 51.13
Baboon 18 1.468 20 51.12
Enhancing The Image Compression Rate…
www.theijes.com The IJES Page 20
Fig.4. Baboon Original – Stego-JPEG(DWT)
Fig.5. Lena Original-Stego-JPEG(DCT)
Fig.6. Lena Original-Stego-JPEG (DWT
From the above tables it shows that, As JPEG images are smaller in size than BMP images still JPEG images
achieve a good compression ratio through our proposed approach as compare to the BMP images.
V. CONCLUSION
This paper proposes a novel technique to increase image compression rate using steganography which is the
most effective compression algorithmic program such as DWT. We have also shown here the stenography data
hiding into the image in cryptography the data into binary format. The data is used to secrete message hidden
information to send the secure message to receiver it is used. We described here image compression method that
redundant data is to remove from the image binary code. After we remove the redundant binary data the image
compression rate increased inflated. Digital images compressed by eliminating redundant information present
within the image, like spatial redundancy. There are several techniques for increasing image compression rate
using steganography. However, we tend to compare only DCT & DWT algorithm. We have made use of
maximum DWT only as a result of this algorithm minimizes image size more than DCT. Image conversion by
using DWT it not effects on image however it minimizes very much bits of image size.
REFERENCES
[1] Campisi, P., Kundur, D., Hatzinakos, D., & Neri, A. (2002). Compressive data hiding: An unconventional approach for
improved color image coding. EURASIP Journal on Applied Signal Processing, 2002(2), 152–163.
[2[ Chen, B., & Wornell, G. W. (2001). Quantization index modulation: A class of provably good methods for digital watermarking
and information embedding. IEEE Transaction on Information Theory, 47(4), 1423–1443.
Enhancing The Image Compression Rate…
www.theijes.com The IJES Page 21
[3] Christopoulos, C., Skodras, A., & Ebrahimi, T. (2000). The JPEG2000 still image coding system: an overview. IEEE Transaction
on Consumer Electronics, 46(4).
[4] de Queiroz, R., Choi, C. K., Huh, Y., & Rao, K. R. (1997).Wavelet transforms in a JPEG like image coder.IEEE Transactions on
Circuits and Systems for Video Technology, 7(2), 419–424.
[5] Gonzalez, R. C., & Woods, R. E. (2008). Digital image processing. Prentice Hall. Hore, A., & Ziou, D. (2010). Image
qualitymetric: PSNR vs. SSIM. In20th International conference on pattern recognition (pp.2366–2369).
[6] Jafari, R., Ziou, D., &Mammeri, A. (2011). Increasing compression of JPEG images using steganography. In IEEEInternational
Symposium on Robotic and Sensors Environments (pp. 226–230).Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B. S.,
&Chandrasekaran, S. (2004). Robust image adaptive data hiding based on erasure and error correction. IEEE Transaction on
Image Processing, 13(12), 1627–1639.
[7] Swanson, M., Zhu, B., & Tewfik, A. H. (1997). Image coding by folding.IEEE International Conference on Image Processing 2,
665–668.
[8] Tseng, H., & Chang, C. (2004). High capacity data hiding in JPEG-compressed images.Informatica, 15(1), 127–142.
[9] Wallace, G. K. (1992). The JPEG still picture compression standard. IEEE Transaction on Consumer Electronics, 38(1), 18–35.
[10] Wang, Z., Bovik, A. C., Sheikh, H. R., &Simoncelli, E. P. (2004). Image quality assessments: From error visibility to structural
similarity. IEEE Transaction on Image Processing, 3(4), 600–612.

Weitere ähnliche Inhalte

Was ist angesagt?

Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsComparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsRishab2612
 
Jpeg image compression using discrete cosine transform a survey
Jpeg image compression using discrete cosine transform   a surveyJpeg image compression using discrete cosine transform   a survey
Jpeg image compression using discrete cosine transform a surveyIJCSES Journal
 
Performance Enhancement for Quality Inter-Layer Scalable Video Coding
Performance Enhancement for Quality Inter-Layer Scalable Video CodingPerformance Enhancement for Quality Inter-Layer Scalable Video Coding
Performance Enhancement for Quality Inter-Layer Scalable Video CodingIJCSIS Research Publications
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpegDr. Kapil Gupta
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression IJECEIAES
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standardsMazin Alwaaly
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...inventionjournals
 
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...IOSR Journals
 
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionVartika Sharma
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition IJECEIAES
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...TELKOMNIKA JOURNAL
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICTouradj Ebrahimi
 

Was ist angesagt? (19)

Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standardsComparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
Comparison between JPEG(DCT) and JPEG 2000(DWT) compression standards
 
Jpeg image compression using discrete cosine transform a survey
Jpeg image compression using discrete cosine transform   a surveyJpeg image compression using discrete cosine transform   a survey
Jpeg image compression using discrete cosine transform a survey
 
Performance Enhancement for Quality Inter-Layer Scalable Video Coding
Performance Enhancement for Quality Inter-Layer Scalable Video CodingPerformance Enhancement for Quality Inter-Layer Scalable Video Coding
Performance Enhancement for Quality Inter-Layer Scalable Video Coding
 
Jpeg
JpegJpeg
Jpeg
 
JPEG Image Compression
JPEG Image CompressionJPEG Image Compression
JPEG Image Compression
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
 
Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression Evaluation of graphic effects embedded image compression
Evaluation of graphic effects embedded image compression
 
20120140504016
2012014050401620120140504016
20120140504016
 
Multimedia image compression standards
Multimedia image compression standardsMultimedia image compression standards
Multimedia image compression standards
 
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
Matlab Implementation of Baseline JPEG Image Compression Using Hardware Optim...
 
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
 
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
 
Project004
Project004Project004
Project004
 
JPEG
JPEGJPEG
JPEG
 
Steganography Part 2
Steganography Part 2Steganography Part 2
Steganography Part 2
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition
 
Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...Improved anti-noise attack ability of image encryption algorithm using de-noi...
Improved anti-noise attack ability of image encryption algorithm using de-noi...
 
Next generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AICNext generation image compression standards: JPEG XR and AIC
Next generation image compression standards: JPEG XR and AIC
 
Image Processing Using MATLAB
Image Processing Using MATLABImage Processing Using MATLAB
Image Processing Using MATLAB
 

Ähnlich wie D0325016021

Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490IJRAT
 
Kassem2009
Kassem2009Kassem2009
Kassem2009lazchi
 
Image compression and it’s security1
Image compression and it’s security1Image compression and it’s security1
Image compression and it’s security1Reyad Hossain
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...IRJET Journal
 
A Novel Image Compression Approach Inexact Computing
A Novel Image Compression Approach Inexact ComputingA Novel Image Compression Approach Inexact Computing
A Novel Image Compression Approach Inexact Computingijtsrd
 
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...cscpconf
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...VLSICS Design
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...VLSICS Design
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionDR.P.S.JAGADEESH KUMAR
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...Alexander Decker
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
IRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
IRJET- Handwritten Decimal Image Compression using Deep Stacked AutoencoderIRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
IRJET- Handwritten Decimal Image Compression using Deep Stacked AutoencoderIRJET Journal
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCijsrd.com
 
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Associate Professor in VSB Coimbatore
 
An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...eSAT Journals
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compressionAlexander Decker
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 

Ähnlich wie D0325016021 (20)

Squashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse MatrixSquashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse Matrix
 
Squashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse MatrixSquashed JPEG Image Compression via Sparse Matrix
Squashed JPEG Image Compression via Sparse Matrix
 
Paper id 25201490
Paper id 25201490Paper id 25201490
Paper id 25201490
 
Kassem2009
Kassem2009Kassem2009
Kassem2009
 
Image compression and it’s security1
Image compression and it’s security1Image compression and it’s security1
Image compression and it’s security1
 
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...Digital Image Compression using Hybrid Scheme using DWT  and Quantization wit...
Digital Image Compression using Hybrid Scheme using DWT and Quantization wit...
 
A Novel Image Compression Approach Inexact Computing
A Novel Image Compression Approach Inexact ComputingA Novel Image Compression Approach Inexact Computing
A Novel Image Compression Approach Inexact Computing
 
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
PERFORMANCE EVALUATION OF JPEG IMAGE COMPRESSION USING SYMBOL REDUCTION TECHN...
 
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
Pipelined Architecture of 2D-DCT, Quantization and ZigZag Process for JPEG Im...
 
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
PIPELINED ARCHITECTURE OF 2D-DCT, QUANTIZATION AND ZIGZAG PROCESS FOR JPEG IM...
 
Intelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image CompressionIntelligent Parallel Processing and Compound Image Compression
Intelligent Parallel Processing and Compound Image Compression
 
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
11.0003www.iiste.org call for paper_d_discrete cosine transform for image com...
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
IRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
IRJET- Handwritten Decimal Image Compression using Deep Stacked AutoencoderIRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
IRJET- Handwritten Decimal Image Compression using Deep Stacked Autoencoder
 
Secure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTCSecure High Capacity Data Hiding in Images using EDBTC
Secure High Capacity Data Hiding in Images using EDBTC
 
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
Medical Image Compression using DCT with Entropy Encoding and Huffman on MRI ...
 
An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...An efficient image compression algorithm using dct biorthogonal wavelet trans...
An efficient image compression algorithm using dct biorthogonal wavelet trans...
 
3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression3 d discrete cosine transform for image compression
3 d discrete cosine transform for image compression
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

D0325016021

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume||3 ||Issue|| 2||Pages|| 16-21||2014|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 www.theijes.com The IJES Page 16 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe ,2, Nilam Bire , 3, Anuja Ghodekar , 4, Tejal Raut ,5, Tanuja Sali 1,2,3,4,5, Department of Information Technology, Pimpri Chinchwad College of Engineering, Nigdi, Pune ------------------------------------------------------ABSTRACT----------------------------------------------------- Image compression is a technique to minimize the size in bytes of a graphics file without degrading the quality of image to an unacceptable level. On the other hand, steganography deals with embedding secret data in redundancies of image in invisibility manner. The goal of this study is to improve image compression through steaganography. Therefore, this paper proposes two schemes one of which combines a steganographic algorithm with the baseline DCT-based JPEG, and the second one uses this steganographic algorithm with the DWT-based JPEG. Hence, data compression is performed twice. KEYWORDS : DCT,DWT,JPEG,LSB coding. ---------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 11 February 2014 Date of Acceptance: 05 March 2014 --------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Image compression addresses the problem of reducing the amount of data required to represent a digital image. It is a process intended to yield a compact representation of an image, thereby reducing the image storage/transmission requirements. The main use of our paper is to increase the image compression rate using steganography and the most effective compression algorithmic program is DWT. For removing the redundant binary data from the image we use (DWT) separate wavelet transform and (DCT) discrete cosine transform algorithmic program. We are using this technique for removing the redundant data from the image. The DCT algorithm removes the data and compresses the image size. The DCT compression technique mostly gives minimal compression rate as compared to DWT.Compression is incredibly necessary to reduce storage size on storage device. Digital images compressed by eliminating redundant information present within the image, like spatial redundancy, spectral the image binary code. We use two techniques co-jointly to compress an image that is DCT & DWT. The first algorithmic program combines a steganographic algorithm with the baseline DCT- based JPEG, whereas the second one uses this steganographic algorithm with the DWT-based JPEG. We are employing mostly DWT only because the image compression rate is maximum as compare to DCT. The algorithm of DWT removes the amount of bits data from the image. II. RELATED WORK Many research works related to data embedding based on compression have been proposed till now. [1] implemented a technique to improve color image coding. Transforms a given color image into the YIQ color space where the chrominance information is sub sampled and embedded in the wavelet domain of the luminance component. [2] proposed image embedding using quantization index modulation. Several authors used the discrete wavelet transform to split the original image into two parts, the low-pass image (called host image), and the high-pass image (called the residual image). The residual image is, first, coded using a modified version of the embedded zero-tree wavelet coder (EZW) and, then embedded into the host image. The embedding process is based on a linear projection, quantization and perturbation in the DCT domain (bits in each 8 * 8 blocks). [7] includes an approach for lossless image compression in spatial domain for continues tone images using a novel concept of image folding.[8] proposes a novel high capacity data hiding method based on JPEG. It employs a capacity table to estimate the number of bits that can be hidden in each DCT component so that significant distortions in the stego-image can be avoided. [9] presents an unique theme for image quality assessment, here introduced an alternative framework for quality assessment based on the degradation of structural information. However, the above mentioned schemes uses were not clear and the embedding techniques details are not shown. Therefore, in this paper, we introduce a novel algorithm Stego-JPEG (DWT) as an extension to previous work Stego-JPEG (DCT) (Jafari, Ziou, &Mammeri, 2011) to apply steganography in DWT domain. Moreover, we intend to extend our previous framework for color images which provides high compression gain with high quality.
  • 2. Enhancing The Image Compression Rate… www.theijes.com The IJES Page 17 III. METHODOLOGY The main focus of this approach is to compress image and extend the compression rate. We are using two methods DCT and DWT. When we divide the input image into set of 8 * 8 pixels, it embeds into 196 this reduces file size using steganography. Target blocks us going to hide for understanding. It receives bits from target block (Jafari et al., 2011). To compress target block Bk of image the method is using lossy JPEG. Now we hide input data in to subsequent block Bk+1,……Bl in to compressed image[6]. DCT based scheme For color images, each component (Y, Cb, and Cr) will be processed separately. The embedded bits total number is n = nk+1 + nk+2 +……. + nl, where nk+1 + nk+2 +……. + nl are the embedded. bits on blocks Bk+1, . . . ,Bl, respectively, and it depends on the number of bits that are coded. If we consider µ the mean number of bits hidden per block, then the payload size is equal to . Note that we hide the data in DC component[6]. DCT based encoding DCT stands for discrete cosine transform (DCT) and it removes the redundant bits from image bits. DCT it is finite sequence of data points. The terms of a sum of cosine functions oscillating at different frequencies. For DCT Compression method uses the algorithm given below to compress the data. Algorithm 1.Stego- JPEG (DCT) Encoding [6] Input: The quantized coefficients block Bi from image which we provided as input of N*M pixels, where I € [1,(N*M)/(8*8)]. Output: A compressed JPEG (DCT) image. The following steps are executed for embedding process: I. Applying rounding step to block Bk. II. Compressing Bk block using lossy JPEG method.
  • 3. Enhancing The Image Compression Rate… www.theijes.com The IJES Page 18 III. Hide the block Bk current bits of compressed in the n coefficients of the subsequent blocks Bk+1,…..B Where N=nk+1+nk+2+…….+ nl, ni the number of coefficients that are used in the ith block such that: IV. Repeat I-III until k > DCT based decoding Encoding and decoding are parallel operation for coding and decoding algorithm. Way extract blocks from compressed image used embedding process. Decoder having some methods a Huffman decoder and a coefficient de-quantizer where all coded data flows. Firstly decompression is performed, embedded blocks are extracted by checking odd and even Ci(i,j) coefficients from n coefficients of sequential blocks. That quantize to a value with magnitude T or smaller decoder disregards all coefficients. Then inverse DCT is used. Stego-JPEG (DCT) decoder is repeated for each of the components Y, Cb, and Cr separately for color images. Decoding speed is increased by using a plurality of decoding devices in parallel with each decoder having a Huffman decoder and a coefficient de-quantizer through which all coded data flows. Algorithm 2.Stego-JPEG (DCT) decoding [6] Input: A compressed JPEG (DCT) image. Output: A decompressed image. The following steps are executed for embedding process: I. Lossy JPEG decoding by decompressed blocks. II. Extract the embedded block of Bk+1,…..Bl coefficients |Ci(i,j)| ≥ T from the subsequent blocks such that: Embedded – bit = Apply lossy JPEG decoding for embedded block. Repeat I-III until . IV. DWT BASED SCHEME DWT based encoding Same method is used in DCT which is before embedding process we follow it. Before embedding the target blocks are compressed using DWT-JPEG, including DWT transformation, quantization, and entropy coding. Blocks are transformed using DWT and quantized. Depending on the embedded bit (0 or 1), the receiving blocks is rounded to the nearest odd or even value. If the embedded bit is equal to 0. Ci(i, j) is rounded to its odd value, otherwise, it will be rounded to the even value. Note: same conditions applied for steganographic scheme used in DCT-JPEG are applicable integrated within DWT-JPEG. The embedding process for gray images and for each of the components Y, Cb, and Cr separately for color images is summarized as follows: Algorithm3. Stego-JPEG (DWT) encoding Input: DWT coefficients. Output: A compressed JPEG(DWT) image. Steps for embedding process: I. Group wavelet coefficients into m * m blocks Bk from an image I of pixels. II. Apply rounding and quantization for block Bk. III. Compress Bk by using lossy JPEG coding based on DWT. IV. Current bits embed of compressed block Bk in the n coefficients of the subsequent blocks Bk+1, . . . ,Bl Where N=nk+1+nk+2+…….+nl,ni the number of coefficients that are used in the ith block such that: IV. Repeat I-III until k >
  • 4. Enhancing The Image Compression Rate… www.theijes.com The IJES Page 19 DWT based decoding The same process used for extraction with DCT is used by DWT. The process for images as follows: Algorithm 4.Stego-JPEG (DWT) decoding [6] Input: A compressed JPEG (DWT) image. Output: A decompressed image. The steps are as follows: I. JPEG decoding based on DWT by extraction. II. Extract the embedded block of Bk+1, . . . ,Bl coefficients |Ci(i,j)| ≥ T from the subsequent blocks such that: Embedded – bit = III. On embedded block apply JPEG decoding based DWT. IV. Repeat I-III until . V. Create DWT image form from extracted and original blocks. VI. Apply IDWT. V. RESULTS AND DISCUSSION We have evaluated two image compression schemes and presented the evaluation methodology used in this work as well as the simulation parameters. The compression performance of the schemes under consideration is assessed using both the compression ratio and the quality of compression. Note that the criterion of image quality comparison is the resemblance between original and reconstructed images. For the comparison between images, we employed the peak signal-to-noise ratio (PSNR) as the measure of image quality. Our results show that when T = 1 increasing compression ratio is maximum with acceptable quality for both Stego- JPEG (DCT) and stego-JPEG (DWT). Table 1.JPEG comparison PSNR and Compression Ratio Table 2.BMP comparison PSNR and Compression Ratio Fig.3.Baboon Original-Stego-JPEG(DCT) Image Name DCT DWT PSNR Compression ratio PSNR Compression ratio Lenna 33 3.642 10 51.13 Baboon 18 1.461 20 51.12 Image Name DCT DWT PSNR Compression ratio PSNR Compression ratio Lenna 33 4.179 10 51.13 Baboon 18 1.468 20 51.12
  • 5. Enhancing The Image Compression Rate… www.theijes.com The IJES Page 20 Fig.4. Baboon Original – Stego-JPEG(DWT) Fig.5. Lena Original-Stego-JPEG(DCT) Fig.6. Lena Original-Stego-JPEG (DWT From the above tables it shows that, As JPEG images are smaller in size than BMP images still JPEG images achieve a good compression ratio through our proposed approach as compare to the BMP images. V. CONCLUSION This paper proposes a novel technique to increase image compression rate using steganography which is the most effective compression algorithmic program such as DWT. We have also shown here the stenography data hiding into the image in cryptography the data into binary format. The data is used to secrete message hidden information to send the secure message to receiver it is used. We described here image compression method that redundant data is to remove from the image binary code. After we remove the redundant binary data the image compression rate increased inflated. Digital images compressed by eliminating redundant information present within the image, like spatial redundancy. There are several techniques for increasing image compression rate using steganography. However, we tend to compare only DCT & DWT algorithm. We have made use of maximum DWT only as a result of this algorithm minimizes image size more than DCT. Image conversion by using DWT it not effects on image however it minimizes very much bits of image size. REFERENCES [1] Campisi, P., Kundur, D., Hatzinakos, D., & Neri, A. (2002). Compressive data hiding: An unconventional approach for improved color image coding. EURASIP Journal on Applied Signal Processing, 2002(2), 152–163. [2[ Chen, B., & Wornell, G. W. (2001). Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transaction on Information Theory, 47(4), 1423–1443.
  • 6. Enhancing The Image Compression Rate… www.theijes.com The IJES Page 21 [3] Christopoulos, C., Skodras, A., & Ebrahimi, T. (2000). The JPEG2000 still image coding system: an overview. IEEE Transaction on Consumer Electronics, 46(4). [4] de Queiroz, R., Choi, C. K., Huh, Y., & Rao, K. R. (1997).Wavelet transforms in a JPEG like image coder.IEEE Transactions on Circuits and Systems for Video Technology, 7(2), 419–424. [5] Gonzalez, R. C., & Woods, R. E. (2008). Digital image processing. Prentice Hall. Hore, A., & Ziou, D. (2010). Image qualitymetric: PSNR vs. SSIM. In20th International conference on pattern recognition (pp.2366–2369). [6] Jafari, R., Ziou, D., &Mammeri, A. (2011). Increasing compression of JPEG images using steganography. In IEEEInternational Symposium on Robotic and Sensors Environments (pp. 226–230).Solanki, K., Jacobsen, N., Madhow, U., Manjunath, B. S., &Chandrasekaran, S. (2004). Robust image adaptive data hiding based on erasure and error correction. IEEE Transaction on Image Processing, 13(12), 1627–1639. [7] Swanson, M., Zhu, B., & Tewfik, A. H. (1997). Image coding by folding.IEEE International Conference on Image Processing 2, 665–668. [8] Tseng, H., & Chang, C. (2004). High capacity data hiding in JPEG-compressed images.Informatica, 15(1), 127–142. [9] Wallace, G. K. (1992). The JPEG still picture compression standard. IEEE Transaction on Consumer Electronics, 38(1), 18–35. [10] Wang, Z., Bovik, A. C., Sheikh, H. R., &Simoncelli, E. P. (2004). Image quality assessments: From error visibility to structural similarity. IEEE Transaction on Image Processing, 3(4), 600–612.