Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Lossless Compression Technique with Forgery Detection


Affiliations
1 Anna University, Coimbatore, India
2 Karunya University, India
     

   Subscribe/Renew Journal


Today images are widely used for the authentication purposes. For example in digital watermarking, visual cryptography etc, we use images for the authentication. Here images are transmitted from sender to receiver through a communication network, where they are processed for ensuring the authentication. While transmitting the images we must ensure that it is compressed effectively without losing the quality of image. Another threat while sending the image through network is that, it can be accessed and modified by a third party easily. This will affect the integrity of the image and it cannot be used for the authentication purposes. For ensuring a better usage of image for authentication purposes our approach uses the JPEG LS compression technique, which provides a better compression rate and good visual quality. For checking the integrity of image here the JPEG Ghost technique is used.

Keywords

Compression, Digital Forgeries, JPEG Compression, JPEG Ghost, JPEG LS.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 229

PDF Views: 3




  • A Lossless Compression Technique with Forgery Detection

Abstract Views: 229  |  PDF Views: 3

Authors

S. Manimurugan
Anna University, Coimbatore, India
Neenu Sebastian
Karunya University, India
Neethu Rajan
Karunya University, India

Abstract


Today images are widely used for the authentication purposes. For example in digital watermarking, visual cryptography etc, we use images for the authentication. Here images are transmitted from sender to receiver through a communication network, where they are processed for ensuring the authentication. While transmitting the images we must ensure that it is compressed effectively without losing the quality of image. Another threat while sending the image through network is that, it can be accessed and modified by a third party easily. This will affect the integrity of the image and it cannot be used for the authentication purposes. For ensuring a better usage of image for authentication purposes our approach uses the JPEG LS compression technique, which provides a better compression rate and good visual quality. For checking the integrity of image here the JPEG Ghost technique is used.

Keywords


Compression, Digital Forgeries, JPEG Compression, JPEG Ghost, JPEG LS.