Currently, an approach involving a coder with a combined structure for compressing images combining several different coders, the system for connecting them to various bit planes, and the control system for these connections have not been studied. Thus, there is a need to develop a structure and study the effectiveness of a combined codec for compressing images of various types without loss in the spatial domain based on arithmetic and (Run-Length Encoding) RLE-coding algorithms. The essence of separate effective coding is to use independent coders of the same type or one coder connected to the planes alternately in order to compress the higher and lower bit planes of the image or their combinations. In this paper, the results of studying the effectiveness of using a combination of arithmetic and RLE coding for several types of images are presented. As a result of developing this structure, the effectiveness of combined coding for compressing the differences in the channels of hyperspectral images (HSI) has been established, as hyperspectral images consist of multi-spectral bands, instead of just the typical three bands (RGB) or (YCbCr) found in regular images. Where, each pixel in a hyperspectral image represents the entire spectrum of light reflected by the object or scene at that particular location.
Technology and digital communications have advanced so that digital photos, videos, or text may be easily manipulated by those not authorized to do so. In addition, the availability of specialized picture editing programs like Photoshop has simplified the process of altering photographs. At first glance, there may seem to be no problem, especially when an image editing method is necessary to delete or add a certain scene that increases the picture's beauty. But what about personal images or images with copyright? Attempts are constantly made to spoof these images using different approaches. Therefore, measures to reduce the likelihood of counterfeiting in digital and printed forms of media are required. The proposed approach aims to detect a counterfeit in images using a unique generator that conceals the data represented by the embedded watermark utilizing modern visual cryptography and hash algorithms. Image extractions may easily be analyzed for signs of forgery. As a result, our approach will detect and validate phony documents and images.