Type of Material: | Thesis |
Title: | Improved Lossless Compression Technique Based on Reversible Data Hiding with Multiple Level Data Security Established with Encrypted |
Researcher: | Vinoth, V V |
Guide: | Karthik, B |
Department: | Department of Electronics and Communication Engineering |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2021 |
Language: | English |
Subject: | Computer Science | Computer Science Interdisciplinary Applications | Engineering and Technology | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Electronics and Communication Engineering, Bharath University, Chennai, Chennai; 2021; D15EC513 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 455034 | |
003 | IN-AhILN | |
005 | 2024-09-20 16:17:33 | |
008 | __ | 240920t2021||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_455034 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aVinoth, V V|eResearcher |
110 | __ | |aDepartment of Electronics and Communication Engineering|bBharath University, Chennai|dChennai|ein|0U-0446 |
245 | __ | |aImproved Lossless Compression Technique Based on Reversible Data Hiding with Multiple Level Data Security Established with Encrypted |
260 | __ | |aChennai|bBharath University, Chennai|c2021 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Electronics and Communication Engineering, Bharath University, Chennai, Chennai|d2021|oD15EC513 |
520 | __ | |aIn the incredible field of encrypting image techniques, in particular Reversible Data Hiding (RDH) with the application of Distributed Source coding (DSC) plays a major role. The existing indigenous image is encrypted with the support of the state individual using a flow chipper, the compressed data are hided with a series of bits marked on the selected encrypted images which are taken directly and secured to make a channel for those secret data flows. Here we applied the existing slepian-wolf encoded with the Low density parity checker (LDPC) codes, for the marked series of bits. Similarly, the image receiver with the embedding key only can excerpt the secret bits from the receiver aspects, to resolve encryption key the individual can obtain an existing image exactly with the application of photograph estimation algorithm. In such aspects we come to know that, receiver with embedding and encryption keys to useful for the individual to abstract the secret information and grab the indigenous image using Dist |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aComputer Science |
653 | __ | |aComputer Science Interdisciplinary Applications |
653 | __ | |aEngineering and Technology |
700 | __ | |aKarthik, B|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/366249|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.