A Decode Technique of MSI for Efficient Reconstruction Process

  • Authors

    • C Narmatha
    • P Manimegalai
    • S Manimurugan
    • Saad Almutairi
    • Majed Aborokbah
    2018-07-04
    https://doi.org/10.14419/ijet.v7i3.6.14951
  • Decimal and binary conversion, decode process, steganography, medical image, cover image, secret image.
  • Abstract

    This paper presents aMSI(Modified Steganography for Image) decode technique for the perfect reconstruction process. Many algorithms are failing in decoding process due to the various reasons. In order to overcome those issues, an efficient decode process of MSI has been proposed in this paper presents. Basically, theMSImethod can be classified into two parts of Encode and Decode. The segregation process for constructing the subbands,8-bit binary conversion process, Inverse substitution process and Decimal conversion process are doing an important role inMSIdecode process. In addition, to measure theMSIdecode performances, the standard parameters are used. This technique is designed mainly for the secret medical image transmission. The secret input image pixels should not be loss while transmitting over the network. In case of loss, it’s very hard to retrieve the original secret image/date during the reconstruction process. This issue has been addressed byMSIdecode process. In result, the original secret image can be restored 100% from this technique, the decode time is minimum than the conventional methods, the replica of the cover or known image can be obtained. However, the main advantages of this technique are easy to handle, more complex and strength than other methods, a perfect reconstruction without any loss and less execution time.

     

     
  • References

    1. [1] Smita A & Manoj K, “Mean value based reversible data hiding in encrypted imagesâ€, Optik, Vol.130, (2017), pp.922–934.

      [2] Karakış R, Güler Ä°, Çapraz Ä° & Bilir E, “A novel fuzzy logic-based image steganography method to ensure medical data securityâ€, Computers in Biology and Medicine, Vol.67, (2015), pp.172–183.

      [3] Hang C, Xiaoping D, Zhengjun L & Chengwei Y, “Optical color image hiding scheme by using Gerchberg–Saxton algorithm in fractional Fourier domainâ€, Optics and Lasers in Engineering, Vol.66, (2015), pp.144–151.

      [4] Chuan Q, Chin CC & Yen CC, “Efficient reversible data hiding for VQ-compressed images based on index mapping mechanismâ€, Signal Processing, Vol.93, (2013), pp.2687–2695.

      [5] Wen CK, Chun CW & Hong CH, “Signed digit data hiding schemeâ€, Information Processing Letters, Vol.116, (2016), pp.183–191.

      [6] Seung WJ, “Adaptive post-filtering of JPEG compressed images considering compressed domain lossless data hidingâ€, Information Sciences, Vol.281, (2014), pp.355–364.

      [7] Chia CL, Xiao LL & Shyan MY, “Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mappingâ€, Information Sciences, Vol.293, (2015), pp.314–326.

      [8] Xiang W, Jing D & Qingqi P, “A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partitionâ€, Information Sciences, Vol.310, (2015), pp.16–35.

      [9] Narmatha C, Manimegalai P & Manimurugan S, “The Secure Lossless Compression Scheme for Grayscale Medical Images Using PBT and Modified Steganographyâ€, Journal of Advanced Research in Dynamical and Control Systems, No.3, (2017), pp.96-103.

      [10] Le W, Shengmei Z, Weiwen C, Longyan G & Hanwu C, “Optical image hiding based on computational ghost imagingâ€, Optics Communications, Vol.366, (2016), pp.314–320.

      [11] Manimurugan S & Saad AM, “A Novel Secret Image Hiding Technique for Secure Transmissionâ€, Journal of Theoretical and Applied Information Technology, Vol.95, No.1, (2017), pp.166-176.

      [12] Saad AM & Manimurugan S, “An Efficient Secret Image Transmission Scheme Using Dho-Encryption Techniqueâ€, International Journal of Computer Science and Information Security, Vol.14, (10), (2016), pp.446-460.

      [13] Biswapati J, “High payload reversible data hiding scheme using weighted matrixâ€, Optik, Vol.127, (2016), pp.3347–3358.

      [14] Chuan Q & Xinpeng Z, “Effective reversible data hiding in encrypted image with privacy protection for image contentâ€, J. Vis. Commun. Image R., Vol.31, (2015), pp.154–164.

      [15] Yuling L, Xinxin Q & Guojiang X, “A ROI-based reversible data hiding scheme in encrypted medical imagesâ€, J. Vis. Commun. Image R., Vol.39, (2016), pp.51–57.

      [16] Shaowei W, Yijun L, Jeng SP & Nian C, “Reversible data hiding based on flexible block-partition and adaptive block-modification strategyâ€, J. Vis. Commun. Image R., Vol.41, (2016), pp.185–199.

      [17] Yang Y, Weiming Z, Dong L & Nenghai Y, “Reversible data hiding in medical images with enhanced contrast in texture areaâ€, Digital Signal Processing, Vol.52, (2016), pp.13–24.

      [18] Thai SN & Chin CC, “A reversible data hiding scheme based on the Sudoku techniqueâ€, Displays, Vol.39, (2015), pp.109–116.

      [19] Chung CW, Ya FC, Chin CC, Jinn KJ & Chia-Chen Lin, “A high capacity data hiding scheme for binary images basedon block patterns, The Journal of Systems and Software, Vol.93, (2014), pp.152–162.

      [20] Tzu CL, Chun YT & Jhih HW, “Asymmetric-histogram based reversible information hiding scheme using edge sensitivity detectionâ€, The Journal of Systems and Software, Vol.116, (2016), pp.2–21.

      [21] Shahbaz B & Noufal P, “Integrated Data Hiding and Compression Scheme Based on SMVQ and FoE In paintingâ€, Procedia Technology, Vol.24, (2016), pp.1008–1015.

      [22] Jian L, Xiaolong L & Bin Y, “Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlationâ€, Signal Processing, Vol.93, (2013), pp.2748–2758.

      [23] Narmatha C, Manimegalai P & Manimurugan S, “A Lossless Compression Scheme for Gray scale Medical Images Using a P2-Bit Short Techniqueâ€, Journal of Medical Imaging and Health Informatics, Vol.7, No.6, (2017), pp.1196–1204.

      [24] Guangyong G, Xiangdong W, Shimao Y, Zongmin C, Caixue Z & Xingming S, “Reversible data hiding with contrast enhancement and tamper localization for medical imagesâ€, Information Sciences, (2017), pp.250–265

      [25] Saad AM & Manimurugan S, “The clandestine image transmission scheme to prevent from the intrudersâ€, International Journal of Advanced and Applied Sciences, Vol.4, No.2, (2107), pp.52-60.

      [26] Hongsheng X, Nong S, Bing Z & Jun S, “Attack on double-random-phase-encoding-based image hiding methodâ€, Optik, Vol.125, (2014), pp.3043–3050.

      [27] Wen CK, Shao HK, Chun CW & Lih CW, “High capacity data hiding scheme based on multi-bit encoding functionâ€, Optik, Vol.127, (2016), pp.1762–1769.

      [28] Manimurugan S & Narmatha C, “Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressionsâ€, International Journal of Digital Crime and Forensics (IJDCF), Vol.7, No.1, (2015), pp.26-50.

      [29] Manimurugan S, Porkumaran K & Narmatha C, “The New Block Pixel Sort Algorithm for TVC Encrypted Medical Imageâ€, Imaging Science Journal, Vol.62, No.8, (2014), pp.403-414.

      [30] Chang YF, “New data hiding scheme using pixel swapping for halftone imagesâ€, The Imaging Science Journal, Vol. 56, (2008), pp.279–290.

      [31] Chen K & Ramabadran TV, “Near-lossless compression of medical images through entropy-coded DPCMâ€, IEEE Trans. Medical Imaging, Vol. 13, (1994), pp.538-548.

      [32] Chen T.H & Tsao KH, “Visual secret sharing by random grids revisitedâ€, Pattern Recognition, Vol. 42 (2009), pp.2203–2217.

  • Downloads

  • How to Cite

    Narmatha, C., Manimegalai, P., Manimurugan, S., Almutairi, S., & Aborokbah, M. (2018). A Decode Technique of MSI for Efficient Reconstruction Process. International Journal of Engineering & Technology, 7(3.6), 110-114. https://doi.org/10.14419/ijet.v7i3.6.14951

    Received date: 2018-07-02

    Accepted date: 2018-07-02

    Published date: 2018-07-04