International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 103 | Views: 122

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015


Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan | C Mahesh [2]


Abstract: In reversible data hiding techniques, the values of hostdata square measure changed in step with some specific rules and therefore the original host content may be dead rehabilitated when extraction of the hidden information on receiver aspect. This paper, the ideal standard of quality change underneath a payload-bending measure is found by utilizing a tedious method, and a sensible reversible data movement plan is arranged. The key data, likewise on the grounds that the assistant information utilized for substance recuperation, square measure conveyed by the varieties between the first pixel-values and in this way the comparing qualities reckonable from the neighbors. Here, the estimation mistakes square measure changed by ideal worth exchange standard. Additionally, the host picture is part into mixture of constituent subsets and thusly the assistant data of a set is typically implanted into the estimation blunders in the following set. A collector will with achievement separate the implanted mystery data and recoup the first substance inside the subsets with a backwards request. Along these lines, a legit reversible data action execution is accomplished.


Keywords: Distortion, payload, encrypted image, image recovery, reversible data hiding


Edition: Volume 4 Issue 3, March 2015,


Pages: 2137 - 2140


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

P Siddharthan, C Mahesh, "Protection Figures Hitting by Refining Depiction Fragment Torrent", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 2137-2140, https://www.ijsr.net/get_abstract.php?paper_id=SUB152608



Similar Articles with Keyword 'Distortion'

Downloads: 110

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve [2] | H. A. Hingoliwala [11]

Share this Article

Downloads: 112

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2430 - 2432

Highly Secured Lossless Image Cryptography Algorithm Based on Haar Wavelet Transform

Rishi Kumar Gupta [8] | G. Sujatha [4]

Share this Article



Top