Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

Blue Channel Replacement Technique for DCT-Compressed Image

Mukta Gupta, Prem Shanker Yadav, Anubhav Bewerwal Published in Image Processing

International Journal of Applied Information Systems
Year of Publication: 2012
© 2012 by IJAIS Journal
10.5120/ijais12-450796
Download full text
  1. Mukta Gupta, Prem Shanker Yadav and Anubhav Bewerwal. Article: Blue Channel Replacement Technique for DCT-Compressed Image. International Journal of Applied Information Systems 4(10):20-23, December 2012. BibTeX

    @article{key:article,
    	author = "Mukta Gupta and Prem Shanker Yadav and Anubhav Bewerwal",
    	title = "Article: Blue Channel Replacement Technique for DCT-Compressed Image",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 10,
    	pages = "20-23",
    	month = "December",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

In this paper, a new methodology is used to preserve confidential information (for e. g. If we like to preserve an information which is in image form i. e. confidential image) which is a blue channel replacement technique, in order to hide maximum amount of data in an image without degrading its quality. In the proposed technique, the emphasis is placed on maximizing the embedding capacity and imperceptibility. Finally, the performance of the scheme is evaluated by using performance metrics such as Peak Signal to Noise Ratio (PSNR), Root Mean Square Error (RMSE). Several experiments have been performed and have been compared and it has been observed that the RMSE is inversely proportional to PSNR from the results obtained with the already existing schemes.

Reference

  1. D. Salomon, "Data Compression, the Complete Reference", 2nd Edition Springer-Verlag1998.
  2. N. R. Thota and S. K. Devireddy, "Image Compression Using Discrete Cosine Transform", Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2008|No. 3 (17).
  3. Sonal and D. Kumar, "A Study of Various Image Compression Techniques".
  4. "Reference guide: Graphics Technical Options and Decisions", http://www. devx. com/projectcool/Article/1997
  5. W. N. Lie and L. C. Chang. Data hiding in images with adaptive number of least significant bits based on the human visual system. Proc. ICIP '99, 1:286–290, 1999
  6. C. C. Chang, C. L. Chiang, and J. Y. Hsiao, "A DCT-domain System for Hiding Fractal Compressed Images", International Conference on Advanced Information Networking and Applications, 2005 IEEE.
  7. E. Hecht, Optics, 2nd Ed, Addison Wesley, 1987.
  8. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information Hiding – A survey", Proceedings of the IEEE, 87:07, July 1999.
  9. C. C. Chang and C. S. Chan, "A Watermarking Scheme Based on Principal Component Analysis Technique", Informatica, vol. 14, no. 4, pp. 431-444, 2003.
  10. Chin-Chen Changand Wen-Chuan Wu," Reversible Quantization-Index Modulation Using Neighboring Correlation"
  11. W. N. Lie and L. C. Chang. Data hiding in images with adaptive number of least significant bits based on the human visual system. Proc. ICIP '99, 1:286–290, 1999
  12. J. L. Mannos and D. J. Sakrison. The effects of a visual fidelity criterion on the encoding of images. IEEE Trans. On Information Theory, pages 525–536, 1974.

Keywords

Peak signal to noise ratio, Blue channel replacement technique, RMSE, Confidential image, Host image