Title : Improved Lossless Compression Technique Based on Reversible Data Hiding with Multiple Level Data Security Established with Encrypted

Type of Material: Thesis
Title: Improved Lossless Compression Technique Based on Reversible Data Hiding with Multiple Level Data Security Established with Encrypted
Researcher: Vinoth, V V
Guide: Karthik, B
Department: Department of Electronics and Communication Engineering
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2021
Language: English
Subject: Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
Computer Science and Information Technology
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2021; D15EC513
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001455034
003IN-AhILN
0052024-09-20 16:17:33
008__240920t2021||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_455034
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aVinoth, V V|eResearcher
110__|aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aImproved Lossless Compression Technique Based on Reversible Data Hiding with Multiple Level Data Security Established with Encrypted
260__|aChennai|bBharath University, Chennai|c2021
300__|dDVD
502__|bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2021|oD15EC513
520__|aIn the incredible field of encrypting image techniques, in particular Reversible Data Hiding (RDH) with the application of Distributed Source coding (DSC) plays a major role. The existing indigenous image is encrypted with the support of the state individual using a flow chipper, the compressed data are hided with a series of bits marked on the selected encrypted images which are taken directly and secured to make a channel for those secret data flows. Here we applied the existing slepian-wolf encoded with the Low density parity checker (LDPC) codes, for the marked series of bits. Similarly, the image receiver with the embedding key only can excerpt the secret bits from the receiver aspects, to resolve encryption key the individual can obtain an existing image exactly with the application of photograph estimation algorithm. In such aspects we come to know that, receiver with embedding and encryption keys to useful for the individual to abstract the secret information and grab the indigenous image using Dist
650__|aComputer Science and Information Technology|2UGC
650__|aEngineering and Technology|2AIU
653__|aComputer Science
653__|aComputer Science Interdisciplinary Applications
653__|aEngineering and Technology
700__|aKarthik, B|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/366249|yShodhganga
905__|afromsg

User Feedback Comes Under This section.