A REVIEW PAPER ON SECURE IMAGE TRANSMISSION THROUGH DATA HIDING METHOD

  • Kuldeep Sharma

Abstract

This paper introduces a new framework that combines the regulation of quality access and the monitoring of the unlawful sharing of digital images on a single platform. The objective is accomplished by (1) modulating some of the useful compressed data coefficients of the Discrete Cosine Transform (DCT) followed by (2) adding a binary watermark (fingerprint) as tracking information using Quantization Index Modulation (QIM). The method of data modulation serves the function of access control in order to prevent an unauthorized user from enjoying the correct visual quality. The embedded watermark, on the other hand, monitors illegal distribution. The modulated coefficients are selected pseudo-randomly using a hidden key (K). The watermark is encoded prior to embedding by applying convolution coding that recognizes colluder(s) involved in time-varying (intelligent) collusion activity reliably. The results of the simulation showed that the above statements were correct without affecting compatibility with the standard JPEG coding scheme.

Published
2019-12-30