Downloads: 103 | Views: 292
Research Paper | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.7 / 10
Protection Figures Hitting by Refining Depiction Fragment Torrent
P Siddharthan, C Mahesh
Abstract: In reversible data hiding techniques, the values of hostdata square measure changed in step with some specific rules and therefore the original host content may be dead rehabilitated when extraction of the hidden information on receiver aspect. This paper, the ideal standard of quality change underneath a payload-bending measure is found by utilizing a tedious method, and a sensible reversible data movement plan is arranged. The key data, likewise on the grounds that the assistant information utilized for substance recuperation, square measure conveyed by the varieties between the first pixel-values and in this way the comparing qualities reckonable from the neighbors. Here, the estimation mistakes square measure changed by ideal worth exchange standard. Additionally, the host picture is part into mixture of constituent subsets and thusly the assistant data of a set is typically implanted into the estimation blunders in the following set. A collector will with achievement separate the implanted mystery data and recoup the first substance inside the subsets with a backwards request. Along these lines, a legit reversible data action execution is accomplished.
Keywords: Distortion, payload, encrypted image, image recovery, reversible data hiding
Edition: Volume 4 Issue 3, March 2015
Pages: 2137 - 2140
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 357 | Views: 1003
Information Technology, Ghana, Volume 8 Issue 6, June 2019
Pages: 64 - 69The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana
Abu Sulemana, Yahuza Abdul-Kadir
Downloads: 301 | Views: 562
Information Technology, India, Volume 8 Issue 1, January 2019
Pages: 456 - 460Analysis of Blockchain and its Working Principle
S. Banupriya, G. Renuka Devi
Downloads: 266 | Views: 411
Information Technology, China, Volume 9 Issue 1, January 2020
Pages: 107 - 112Network Optimization using Multi-Agent Genetic Algorithm
Sikandar Hanif
Downloads: 260 | Views: 473
Information Technology, Malaysia, Volume 8 Issue 1, January 2019
Pages: 64 - 70University of the Future (UotF): Redesign Business Model for Local University in Malaysia through Humanising Education and 4IR
Nor Zaiasron Bin Yahaya, Abdul Rahman Bin Ahmad Dahlan
Downloads: 254 | Views: 422
Information Technology, India, Volume 9 Issue 1, January 2020
Pages: 477 - 479IoT Based Smart Street Light for Energy Efficiency and Safety
Tanmay Patil, Arjun Ramendra