Document Type : Research Paper

Authors

University of Mosul- Computer & mathematics college

10.37652/juaps.2012.63368

Abstract

The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research the contourlet transformation coefficients were studied to decide which of them are suitable to embed data on it a lot of parameters of the contourlet coefficients can be discussed one of them is the coefficient energy.The research covered most of the suggested events which could be met during the embedding state, one of them the size of the cover in addition to the size of the information were studied. Applying the suggested idea on different type of image with different size (cover image and the message image) shows that the coefficients with low level of energy are suitable to embedded the information, and the retrieved cover and message are so closed to the original one.

Keywords

Main Subjects

 [1] R. Yadav. (2011). “Study of Information Hiding Techniques and their Counterattacks: A Review Article”.  IJCSCN, Vo. 1, pp. 142-164.
 [2]  C. Lee, and K. Chen. (2011). “Reversible Data Hiding by Reduplicated Exploiting Modification Direction Method”. IIH-MSP, pp. 256-259.
 [3]   X. Yan, S. Guan, and X . Niu. (2008). “Research on the Capacity of Error-Correcting Codes-Based Information Hiding”. IIH-MSP. pp. 1158-1161.
 [4]  S. Jan et al., (2011). “An Improved Data Hiding Method Using Image Interpolation”. IIH-MSP.  pp. 185-188.
[5]    M. Ramkumar, A. N. Akansu, and A. Alatan. (1999). “A ROBUST DATA HIDING SCHEME FOR IMAGES USING DFT”. ICIP. vol. 2 ,pp. 211-215. 
[6]    F. Arnia. (2003). “Perceptual improvement of robust DCT-domain watermarking through wavelets based image fusion”. Communications, Vol. 2. pp. 505-509.
[7]    N. Sasaki, R. Nishimura, and Y. Suzuki. (2006).  “A nce on Signal Processing. vol. 4.
[8]  T. Hien et al.. (2007) “Digital watermarking based on curvelet transform Its Applications. pp. 1-4.
[9]    T. Tsui, X. Zhang, and D. Androutsos. (2008). “Color Image Watermarking Using multidimensional Fourier Transforms”. IEEE Transactions on Information Forensics and Security. vol. 3.  pp. 16-28.
[10] S. Radharani, and M. L. Valarmathi. (2011). “Multiple Watermarking Scheme for Image Authentication and Copyright Protection using Wavelet based Texture Properties and Visual Cryptography”.  International Journal of Computer Applications. vol. 23. pp. 29-36.
[11] M. M. Sathik, and S. S. Sujatha. (2010).  “An Improved Invisible Watermarking Technique for Image Authentication”. International Journal of Advanced Science and echnology. Vol. 24. pp. 61-74.
 [12] J. Xuehua. (2010). “Digital Watermarking and its Application in Image Copyright Protection”. International Conference on Intelligent Computation Technology and Automation  vol. 2. pp. 114-117.
[13] M. A. Akhaee et al.. (2010). “Contourlet-Based Image onment ”. IEEE Transactions on Image Processing . vol. 19. pp. 967-980.
[14] P. S. Hiremath, P. T. Akkasaligar, and S. Badiger. (2011). “Performance Comparison of Wavelet Transform and Contourlet Transform based methods for Despeckling Medical Ultrasound Images”. International Journal of Computer Applications . vol. 26 . pp. 34-41.
[15] S. Esakkirajan et al.. (2006). “IMAGE COMPRESSION USING CONTOURLET TRANSFORM AND MULTISTAGE VECTOR QUANTIZATION”. GVIP Journal. Vol. 6. pp. 19-28.
[16] S. Khalighi et al. .(2009). “A new robust non-blind digital watermarking scheme in contourlet domain ”. ISSPIT .pp. 20-25.
[17] Q. Huynh-Thu, and M. Ghanbari. (2008). “Scope of validity of PSNR in image/video quality assessment ”. Electronics Letters.  vol. 44. pp. 800-801.
[20] A. Mallahzadeh, H. Dehghani, and I. Elyasi. (2008). “Multiscale Blind Image Restoration with a New Method”. International Journal of Computer Science and Engineering . Vol. 2. pp. 19-22.
[22] V. R. Vijaykumar et al.. (2008). “High Density Impulse Noise Removal Using Robust Estimation Based Filter”. IAENG International Journal of Computer Science. vol. 35. pp. 259-266.