A Decode Technique of MSI for Efficient Reconstruction Process

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    This paper presents aMSI(Modified Steganography for Image) decode technique for the perfect reconstruction process. Many algorithms are failing in decoding process due to the various reasons. In order to overcome those issues, an efficient decode process of MSI has been proposed in this paper presents. Basically, theMSImethod can be classified into two parts of Encode and Decode. The segregation process for constructing the subbands,8-bit binary conversion process, Inverse substitution process and Decimal conversion process are doing an important role inMSIdecode process. In addition, to measure theMSIdecode performances, the standard parameters are used. This technique is designed mainly for the secret medical image transmission. The secret input image pixels should not be loss while transmitting over the network. In case of loss, it’s very hard to retrieve the original secret image/date during the reconstruction process. This issue has been addressed byMSIdecode process. In result, the original secret image can be restored 100% from this technique, the decode time is minimum than the conventional methods, the replica of the cover or known image can be obtained. However, the main advantages of this technique are easy to handle, more complex and strength than other methods, a perfect reconstruction without any loss and less execution time.



  • Keywords

    Decimal and binary conversion, decode process, steganography, medical image, cover image, secret image.

  • References

      [1] Smita A & Manoj K, “Mean value based reversible data hiding in encrypted images”, Optik, Vol.130, (2017), pp.922–934.

      [2] Karakış R, Güler İ, Çapraz İ & Bilir E, “A novel fuzzy logic-based image steganography method to ensure medical data security”, Computers in Biology and Medicine, Vol.67, (2015), pp.172–183.

      [3] Hang C, Xiaoping D, Zhengjun L & Chengwei Y, “Optical color image hiding scheme by using Gerchberg–Saxton algorithm in fractional Fourier domain”, Optics and Lasers in Engineering, Vol.66, (2015), pp.144–151.

      [4] Chuan Q, Chin CC & Yen CC, “Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism”, Signal Processing, Vol.93, (2013), pp.2687–2695.

      [5] Wen CK, Chun CW & Hong CH, “Signed digit data hiding scheme”, Information Processing Letters, Vol.116, (2016), pp.183–191.

      [6] Seung WJ, “Adaptive post-filtering of JPEG compressed images considering compressed domain lossless data hiding”, Information Sciences, Vol.281, (2014), pp.355–364.

      [7] Chia CL, Xiao LL & Shyan MY, “Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping”, Information Sciences, Vol.293, (2015), pp.314–326.

      [8] Xiang W, Jing D & Qingqi P, “A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition”, Information Sciences, Vol.310, (2015), pp.16–35.

      [9] Narmatha C, Manimegalai P & Manimurugan S, “The Secure Lossless Compression Scheme for Grayscale Medical Images Using PBT and Modified Steganography”, Journal of Advanced Research in Dynamical and Control Systems, No.3, (2017), pp.96-103.

      [10] Le W, Shengmei Z, Weiwen C, Longyan G & Hanwu C, “Optical image hiding based on computational ghost imaging”, Optics Communications, Vol.366, (2016), pp.314–320.

      [11] Manimurugan S & Saad AM, “A Novel Secret Image Hiding Technique for Secure Transmission”, Journal of Theoretical and Applied Information Technology, Vol.95, No.1, (2017), pp.166-176.

      [12] Saad AM & Manimurugan S, “An Efficient Secret Image Transmission Scheme Using Dho-Encryption Technique”, International Journal of Computer Science and Information Security, Vol.14, (10), (2016), pp.446-460.

      [13] Biswapati J, “High payload reversible data hiding scheme using weighted matrix”, Optik, Vol.127, (2016), pp.3347–3358.

      [14] Chuan Q & Xinpeng Z, “Effective reversible data hiding in encrypted image with privacy protection for image content”, J. Vis. Commun. Image R., Vol.31, (2015), pp.154–164.

      [15] Yuling L, Xinxin Q & Guojiang X, “A ROI-based reversible data hiding scheme in encrypted medical images”, J. Vis. Commun. Image R., Vol.39, (2016), pp.51–57.

      [16] Shaowei W, Yijun L, Jeng SP & Nian C, “Reversible data hiding based on flexible block-partition and adaptive block-modification strategy”, J. Vis. Commun. Image R., Vol.41, (2016), pp.185–199.

      [17] Yang Y, Weiming Z, Dong L & Nenghai Y, “Reversible data hiding in medical images with enhanced contrast in texture area”, Digital Signal Processing, Vol.52, (2016), pp.13–24.

      [18] Thai SN & Chin CC, “A reversible data hiding scheme based on the Sudoku technique”, Displays, Vol.39, (2015), pp.109–116.

      [19] Chung CW, Ya FC, Chin CC, Jinn KJ & Chia-Chen Lin, “A high capacity data hiding scheme for binary images basedon block patterns, The Journal of Systems and Software, Vol.93, (2014), pp.152–162.

      [20] Tzu CL, Chun YT & Jhih HW, “Asymmetric-histogram based reversible information hiding scheme using edge sensitivity detection”, The Journal of Systems and Software, Vol.116, (2016), pp.2–21.

      [21] Shahbaz B & Noufal P, “Integrated Data Hiding and Compression Scheme Based on SMVQ and FoE In painting”, Procedia Technology, Vol.24, (2016), pp.1008–1015.

      [22] Jian L, Xiaolong L & Bin Y, “Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation”, Signal Processing, Vol.93, (2013), pp.2748–2758.

      [23] Narmatha C, Manimegalai P & Manimurugan S, “A Lossless Compression Scheme for Gray scale Medical Images Using a P2-Bit Short Technique”, Journal of Medical Imaging and Health Informatics, Vol.7, No.6, (2017), pp.1196–1204.

      [24] Guangyong G, Xiangdong W, Shimao Y, Zongmin C, Caixue Z & Xingming S, “Reversible data hiding with contrast enhancement and tamper localization for medical images”, Information Sciences, (2017), pp.250–265

      [25] Saad AM & Manimurugan S, “The clandestine image transmission scheme to prevent from the intruders”, International Journal of Advanced and Applied Sciences, Vol.4, No.2, (2107), pp.52-60.

      [26] Hongsheng X, Nong S, Bing Z & Jun S, “Attack on double-random-phase-encoding-based image hiding method”, Optik, Vol.125, (2014), pp.3043–3050.

      [27] Wen CK, Shao HK, Chun CW & Lih CW, “High capacity data hiding scheme based on multi-bit encoding function”, Optik, Vol.127, (2016), pp.1762–1769.

      [28] Manimurugan S & Narmatha C, “Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions”, International Journal of Digital Crime and Forensics (IJDCF), Vol.7, No.1, (2015), pp.26-50.

      [29] Manimurugan S, Porkumaran K & Narmatha C, “The New Block Pixel Sort Algorithm for TVC Encrypted Medical Image”, Imaging Science Journal, Vol.62, No.8, (2014), pp.403-414.

      [30] Chang YF, “New data hiding scheme using pixel swapping for halftone images”, The Imaging Science Journal, Vol. 56, (2008), pp.279–290.

      [31] Chen K & Ramabadran TV, “Near-lossless compression of medical images through entropy-coded DPCM”, IEEE Trans. Medical Imaging, Vol. 13, (1994), pp.538-548.

      [32] Chen T.H & Tsao KH, “Visual secret sharing by random grids revisited”, Pattern Recognition, Vol. 42 (2009), pp.2203–2217.




Article ID: 14951
DOI: 10.14419/ijet.v7i3.6.14951

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.