Double Compression Of JPEG Image Using DWT Over RDWT
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 11
Abstract
Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the camera at the time of captured. This is possible by predicting the bits that were not provided by the sensor device. The forensics and for reconstructing the image the following process is applied. Selecting the quantization in a structural way is performed. The selection of only first quantization is because the second quantization produces a low level of pixels when compared to the first level bits. The quantization matrix will help in obtaining the range extension and can reduce the long estimations; this will help in detecting the error when the system is compressed. To improve the results, quantization step estimation is proposed for this a filtration approach has to be applied. The existing technique Discrete Cosine Transformation is improved by implementing the DWT and RDWT. Hence these proposed techniques DWT and RDWT are to be implemented and the experimental results are to be compared in a programmatic way (i.e., MATLAB Software). This shows the effectiveness of the proposed models.
Authors and Affiliations
Pamarthi Naga Basaveswara Swamy, Gottipati. Srinivas Babu
Data Access Scheme to Probabilistically Coordinate Multiple Caching Nodes
The propose of caching strategy in wireless ad hoc networks benefits from the supposition of existing endto-end paths in the midst of mobile nodes, and the path from a supplicant to the data source remnants unchanged...
Enhanced Intrusion Detection System with Mobile Agent
This electronic The widespread proliferation of Internet connections has made current computer networks more vulnerable to intrusions than before. In network intrusions, there may be multiple computing nodes that are...
Episodic Reinforcement- Clustering technique (ERCT) based POPTVR and Modified POPTVRFNN for pattern classification
In general, a Fuzzy Neural Network (FNN) is characterized by its learning algorithm and its linguistic knowledge representation. However, it does not necessarily interact with its environment when the training data i...
A Unified System to Ensure Data Security In Cloud Computing
Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapi...
Effective Mining Scheme for Large Streams Personalized Data Using Sparse Data
Reference methods are extremely significant in the fields of E-commerce and other Web-based services. One of the major complexities is dynamically providing high-quality suggestion on sparse data. In this paper a wor...