Reversible Steganography and Authentication via Transform Encoding by Jyotsna Kumar Mandal

Reversible Steganography and Authentication via Transform Encoding by Jyotsna Kumar Mandal

Author:Jyotsna Kumar Mandal
Language: eng
Format: epub
ISBN: 9789811543975
Publisher: Springer Singapore


Step 2: Processing (↓): Compute average and difference as per formula given in the previous section in column wise manner.

So, the intermediate output of the second round is as given in Fig. 6.26.

Fig. 6.26Output after column wise computations (Processing (↓))

The values in Fig. 6.26 constitute the Haar wavelet transformed matrix.

6.2.2 Inverse Transform

Consider the transformed matrix obtained through forward transformation as given in Fig. 6.27.

Fig. 6.27Transformed coefficient matrix taken as input for inverse transformation computation



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.