Tuhin Paul - Academia.edu (original) (raw)

Papers by Tuhin Paul

Research paper thumbnail of Invisible Digital Watermarking Through Encryption

International Journal of Computer Applications, 2010

Technique for hiding the data of images has been proposed in this paper. At the source, hidden (t... more Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view.

Research paper thumbnail of A Novel Steganographic Technique Based on 3D-DCT Approach

In this paper, a new technique for hiding the data of images has been proposed. This method uses ... more In this paper, a new technique for hiding the data of images has been proposed. This method uses 3-dimentional discrete cosine transformation scheme, along with 2-dimentional discrete cosine transformation. The method proposed in this paper hides two target images behind one cover image thereby increasing the data hiding capacity greatly. For the cause of security only the final stego-image is sent over the network. This approach is also free from the constraint of size.

Research paper thumbnail of Image Compression using Approximate Matching and Run Length

International Journal of Advanced Computer Science and Applications, 2011

Image compression is currently a prominent topic for both military and commercial researchers. Du... more Image compression is currently a prominent topic for both military and commercial researchers. Due to rapid growth of digital media and the subsequent need for reduced storage and to transmit the image in an effective manner Image compression is needed. Image compression attempts to reduce the number of bits required to digitally represent an image while maintaining its perceived visual quality. This study concentrates on the lossless compression of image using approximate matching technique and run length encoding. The performance of this method is compared with the available jpeg compression technique over a wide number of images, showing good agreements.

Research paper thumbnail of An Encryption Based Technique for Invisible Digital Watermarking

International Journal of Computer Applications, 2010

In this paper, a technique for hiding the data of images has been proposed. The proposed method i... more In this paper, a technique for hiding the data of images has been proposed. The proposed method is used to hide an image file entirely with in another image file keeping two considerations in mind, which are Size and Degree of Security. At the source, the image that is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size, which will be adjusted by our resize function thereby, removing the size constraint. Secondly, for the security of transmission over network, only the final encrypted image i.e. cover image and target image is sent over the network. This image is easily decoded at the receiver end. Results are encouraging from practical point of view.

Research paper thumbnail of A Palette Based Approach for Invisible Digital Watermarking Using the Concept of Run-Length

In this paper, a technique for hiding the data of images using palette based approach with the co... more In this paper, a technique for hiding the data of images using palette based approach with the concept of run length has been proposed. At the source, the image which is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size which will be adjusted by our resize function thereby removing the size constraint. The final encrypted image (cover and target) image is sent over the network. This image is decoded at the receiver end. This approach is a palette based approach since both the image is initially quantized using the palette. The encoding of the target image at the sender end is done using the concept of run-length.

Research paper thumbnail of Invisible Digital Watermarking Through Encryption

Technique for hiding the data of images has been proposed in this paper. At the source, hidden (t... more Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view.

Research paper thumbnail of Invisible Digital Watermarking Through Encryption

International Journal of Computer Applications, 2010

Technique for hiding the data of images has been proposed in this paper. At the source, hidden (t... more Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view.

Research paper thumbnail of A Novel Steganographic Technique Based on 3D-DCT Approach

In this paper, a new technique for hiding the data of images has been proposed. This method uses ... more In this paper, a new technique for hiding the data of images has been proposed. This method uses 3-dimentional discrete cosine transformation scheme, along with 2-dimentional discrete cosine transformation. The method proposed in this paper hides two target images behind one cover image thereby increasing the data hiding capacity greatly. For the cause of security only the final stego-image is sent over the network. This approach is also free from the constraint of size.

Research paper thumbnail of Image Compression using Approximate Matching and Run Length

International Journal of Advanced Computer Science and Applications, 2011

Image compression is currently a prominent topic for both military and commercial researchers. Du... more Image compression is currently a prominent topic for both military and commercial researchers. Due to rapid growth of digital media and the subsequent need for reduced storage and to transmit the image in an effective manner Image compression is needed. Image compression attempts to reduce the number of bits required to digitally represent an image while maintaining its perceived visual quality. This study concentrates on the lossless compression of image using approximate matching technique and run length encoding. The performance of this method is compared with the available jpeg compression technique over a wide number of images, showing good agreements.

Research paper thumbnail of An Encryption Based Technique for Invisible Digital Watermarking

International Journal of Computer Applications, 2010

In this paper, a technique for hiding the data of images has been proposed. The proposed method i... more In this paper, a technique for hiding the data of images has been proposed. The proposed method is used to hide an image file entirely with in another image file keeping two considerations in mind, which are Size and Degree of Security. At the source, the image that is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size, which will be adjusted by our resize function thereby, removing the size constraint. Secondly, for the security of transmission over network, only the final encrypted image i.e. cover image and target image is sent over the network. This image is easily decoded at the receiver end. Results are encouraging from practical point of view.

Research paper thumbnail of A Palette Based Approach for Invisible Digital Watermarking Using the Concept of Run-Length

In this paper, a technique for hiding the data of images using palette based approach with the co... more In this paper, a technique for hiding the data of images using palette based approach with the concept of run length has been proposed. At the source, the image which is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size which will be adjusted by our resize function thereby removing the size constraint. The final encrypted image (cover and target) image is sent over the network. This image is decoded at the receiver end. This approach is a palette based approach since both the image is initially quantized using the palette. The encoding of the target image at the sender end is done using the concept of run-length.

Research paper thumbnail of Invisible Digital Watermarking Through Encryption

Technique for hiding the data of images has been proposed in this paper. At the source, hidden (t... more Technique for hiding the data of images has been proposed in this paper. At the source, hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be adjusted by resize function. Secondly, only the final encrypted image i.e. cover image and target image is sent over the network. This image is finally decoded at the receiver end. Received results are encouraging from practical point of view.