International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 103 | Views: 292

Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.7 / 10


     

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh


Abstract: In reversible data hiding techniques, the values of hostdata square measure changed in step with some specific rules and therefore the original host content may be dead rehabilitated when extraction of the hidden information on receiver aspect. This paper, the ideal standard of quality change underneath a payload-bending measure is found by utilizing a tedious method, and a sensible reversible data movement plan is arranged. The key data, likewise on the grounds that the assistant information utilized for substance recuperation, square measure conveyed by the varieties between the first pixel-values and in this way the comparing qualities reckonable from the neighbors. Here, the estimation mistakes square measure changed by ideal worth exchange standard. Additionally, the host picture is part into mixture of constituent subsets and thusly the assistant data of a set is typically implanted into the estimation blunders in the following set. A collector will with achievement separate the implanted mystery data and recoup the first substance inside the subsets with a backwards request. Along these lines, a legit reversible data action execution is accomplished.


Keywords: Distortion, payload, encrypted image, image recovery, reversible data hiding


Edition: Volume 4 Issue 3, March 2015


Pages: 2137 - 2140



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
P Siddharthan, C Mahesh, "Protection Figures Hitting by Refining Depiction Fragment Torrent", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 2137-2140, URL: https://www.ijsr.net/getabstract.php?paperid=SUB152608, DOI: https://www.doi.org/10.21275/SUB152608



Downloads: 357 | Views: 1003

Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir


Downloads: 301 | Views: 562

Information Technology, India, Volume 8 Issue 1, January 2019

Pages: 456 - 460

Analysis of Blockchain and its Working Principle

S. Banupriya, G. Renuka Devi


Downloads: 266 | Views: 411

Information Technology, China, Volume 9 Issue 1, January 2020

Pages: 107 - 112

Network Optimization using Multi-Agent Genetic Algorithm

Sikandar Hanif


Downloads: 260 | Views: 473

Information Technology, Malaysia, Volume 8 Issue 1, January 2019

Pages: 64 - 70

University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR

Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan


Downloads: 254 | Views: 422

Information Technology, India, Volume 9 Issue 1, January 2020

Pages: 477 - 479

IoT Based Smart Street Light for Energy Efficiency and Safety

Tanmay Patil, Arjun Ramendra


Top