SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1536
Machine Learning Application for Data Security
Ms. Priyanka M Ninganure1, Asst.Prof. V K Shende2
1MTech(DCN) Student, Dept. of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India
2 Asst.Professor, Dept. of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - The security of informationormessagehasbecome
one of the principle challenges of the resource sharing with
data communication over computer network. by using
internet, secrete messages or information can be transferred
in a fast and easy way in various sectors such as government
offices, private sector, military, medical areas and defense
areas. Most of the times, confidentiality of the transferred
information needs to be maintained. To make sure that the
information is transferred securely and safely over the
computer network, a suitable method is needed. To improve
the security of information or data, stegnography must have
the ability to resist detection by machine learning algorithms.
This presents an efficient algorithm for information hiding in
an image based on machine learning. Proposed method uses
blocks of the cover image and then embedding message bits
are hides in to the cover image pixels. The machine learning
based model is designed to have 5 convolutionlayerswith feed
forward neural network. The SVM is a most common
algorithm of machine learning, which is been used to
smoothen the distorted image and to provide double fold to
security VGG19 model of DNN is been building. Since by using
these model it is possible to retrieve the data which is missed
during transmission.
Key Words: Cryptography, Steganography, Secret
message, Cover image, encryption, decryption, SVM and
DNN Model.
1. INTRODUCTION
Initially, there are two techniques for shielding information
from interlopers while exchanging over an open channel.
ThoseareCryptographyand Steganography.Cryptographyis
a technique to encode information and steganography is a
craftsmanship and investigation of concealing mystery data
in a spread picture. Maximum number of charactersthat can
be hidden in an image is equal to the product of width and
height of the image. Data in computers is transmitted and
stored as a series of zeros and ones (alsoitsknownas Binary
values). To store an image on a computer, the image is
broken down in to tiny blocks. This proposedsimplemethod
is to hide information in the encrypted image then send the
encrypted image to the receiver over the network. Here we
are not taking a single word or single sentence instead we
are taking a text file which contains the secrete information,
its size can be in Kb's or MB's. When we take text file which
is to be hidden in to an image, that image is called as cover
image which is of 256*256 pixel size. There are many
encryption and decryption methods are present, security of
the data can be handled by the stenography but the problem
occurs when we are transferring a large amount of data or
large text file it may be of any size. Once we finish the
encryption part and appending the information in to an
image the encrypted image will be distorted because of the
misplacing of pixels or we can say bits. Soduetothatwe may
lose the important message which is present in the file, So
machine learning algorithm can be used to retrieve that lost
message and here SVM is been used for smoothening of
distorted image. The most popular medium used is image
files because of their high capacity and easy availabilityover
the internet. The image used for embedding the secret
message at the sender side is called cover image, and
message is that the secret information which needs to be
protected by intruder or hacker. This model proposes a new
filtering method based on SVM. In this is been demonstrated
that a relationship between the noise vector and secrete
information size.
2. Designing of Proposed Model Stages of proposed
system.
1) Secret Text on to an image using only steganography.
2) Image to image steganography using machine learning.
Picture Selection to Disguise Cryptography Select a picture
that can without much of a stretch mix with its
encompassing when it is adjusted. For examplea picture that
has a high level of relationship with its environment, this
procedure proposing to embed content. We don't expect to
choose an exceedingly particular picture supposing that we
alter such a picture the progressionswouldbeunmistakable.
Since we are wanting to adjust picture in the spatial space
choosing an appropriate picture is significant procedure. To
embed the mystery message on the chose picture, we have
two essential presumptions in this progression: initially,the
sender and the recipient realize which picture is being
transmitted and also, the territory in the picture that is
utilized for concealing mystery information. Werecommend
utilizing a zone that has a high level of clamor or highlevel of
connection with its environment. Choosing a legitimate
picture is a basic advance since we will change the pixels in
the spatial space. In the wake of choosing an appropriate
part in a picture the content can be embedded. Content can
be written from numerous points of view. The picture chose
for this object is known as the spread picture andthepicture
acquired after steganography is known as the stego-picture.
A picture is spoken to as a N*M (in the event of greyscale
pictures) or N*M*3 (if there should be an occurrence of
shading pictures) lattice in memory, with every passage
speaking to the power estimation of a pixel. In picture
steganography, a message is inserted into a picture by
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1537
modifying the estimations of certain pixels,whicharepicked
by an encryption calculation. The beneficiary of the picture
must know about a similar calculation so as to known which
pixels the person in question must choose to extricate the
message.
2.1 Pixel idea and shading models
As of now referenced, pixels are the littlest individual
component of a picture. Thus, every pixel is an example of a
uniquepictureoranimage.Thatistosay,theoriginalcanhave
progressively exact portrays by using more samples. The
strength of every pixel in an image is variable. Frameworks in
colourimaging,a colourisordinarilyindicatesbythreeorfour
segment powers, for example, red, green, and blue, or cyan,
red, yellow, and dark. Here, will work with the RGB shading
model. As you can envision, the RGB shading model has 3
channels,red,green andblue.Inthisway,everypixel fromthe
pictureismadeoutof3esteems(red,green,blue)whichare8-
bitesteems(therangeis0– 255).foreverypixel wehavethree
qualities, which can be spoken to in paired code (the PC
language).When working with twofold codes, we have
increasinglycritical bitsandlessnoteworthybits.Forinstance,
on the off chance that we change the furthest left piece from 1
to 0 it will change the decimal incentive from 255 to 127. On
theotherhand,thefurthestrightpieceisthelesshugepiece.In
the event that we change the furthest right piece it will have
lesseffectonthelastesteem.Forinstance,intheeventthatwe
change the furthest left piece from 1 to 0 it will change the
decimalincentivefrom255to254.Notethatthefurthestright
piece will change just 1 of every scope of 256 (it speaks to
under 1%).
3. Architecture of Proposed Model
Fig1: Flow of proposed model using DNN
The above block diagram shows the flow ofproposedmodel.
Which consists of two stages. Secrete Textappendedonto an
image using only Stegnography and in secondstageimage to
image stegnography using DNN.
 Secrete message and cover image: Where secrete
message is a file which consists of text, it can be of
any size. Within cover media steganography hides
the secrete message, where we can use the cover
media as audio, video, text or an image The each
pixel of the cover image merged with the each bits
of characters. This resultant image is called as
stegno image1 which consists of encrypted
message.
 Cover image2 and stegno image2: Here cover
image2 is similar to cover image1 but it is different
image. Which gets appended with the stegno image
and gives the resultant image which we can call
stegno image2.To provide still more stronger
security this step is been performed. Here it is
possible to perform stegno image to cover image
appending and smoothening process in parallel by
using DNN.
 Decryption of stegno images 1 &2: Decryption is
the process of transforming encrypted information
so that it is intelligible again. Will get non-readable
messages to readable messages.

 Network Model: The network model is built by using
SVM(Support vector machine) and DNN(Deep Neural
Network) Since SVM is classification algorithm we can use
this in removing noise from message. The support vectors
are created during the training time. These support vectors
are required for the formation of the optimal hyperplane.
3.1 EXPERIMENTAL RESULTS
Table1: Results Comparing Before Smoothening and
after Smoothening of stegno images.
Description: By looking at above table we can justify that, if
the text file size increases then the amount of noise will be
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1538
increased accordingly. And that noise is been removed by
smoothing process.
GRAPH1: Variation in the size of the images in each of
the stage.
This graph shows the variation in the size of the images
when the text file is varied from small size to large size.
Where Input text file is indicated by blue, Stegno image is
indicated by red and Smoothened stegno image is been
indicated by green which contains the encrypted
information. Where six different sizes of text files are taken
and performed the proposed technique fordata security.We
can observe the reduction in noise at the final stage.
(a) and (b) : For ex 170kb input text file is been considered,
this information is encoded and appended with original
image1. which gives us Stegno image1 which contained
secrete information along with that natural noise is added.
(c) and (d): Stegno image1 is again appended with one more
cover image2 just to provide strong security.
(e): We will get one more stegno image2 and which is fed to
network as an input to smoothen it. In this process we
smoothen the image2 first then image1 secondly to remove
noise from this image also we can retrieve the lost
information during transmission. Then we go for decoding
data to get desired text file.
Fig2: performed demo when text file is130000Kb
Note: Here you can observe that, file size is 130000Kb and
stegno image which contained secrete information is 28Kb
then after smoothening image size will become 20kb. So we
can say that around 8kb of noise is been removed from an
image.
Fig 3: Output when File size is 40000kb
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1539
4. CONCLUSION and FUTURE SCOPE
This project presents the Information hiding and which
prevents the information loss which occurs during the
transmission on a particular path. It is the right technique to
exchange secret information over the internet. Proposed
model uses VGG19 model of DNN to remove the noise from
stegno images.
REFERENCES
[1] Donghui Hu, Liang Wang, Wenjie Jiang, Shuli Zheng, Bin
Li" A Novel Image Steganography Method via Deep
Convolutional Generative Adversarial Networks"
[2] Kamaldeep Joshi, Swati Gill, and Rajkumar Yadav" ANew
Method of Image Steganography Using 7th Bit of a Pixel as
Indicator by Introducing the Successive Temporary Pixel in
the Gray Scale Image "
[3] Saleh Delbarpour Ahmadi. "Image Steganography with
Artificial Immune System "Faculty of Computer and
Information Technology.
Engineering, Qazvin Branch,Islamic AzadUniversity,Qazvin,
Iran Saleh.delbarpour@yahoo.com
[4] Dong-Hyun kim "Deep learning based steganalysis
against spatial domain steganography" dept.of software
engineering kumaho national institute of technology,Gumy,
gyeonbuk republic of korea.
[5] Kumar Nannapaneni Manoj, Kumar M. Praveen, Rao M.
Srinivasa,"Data Hiding Using Image Steganography
"International Journal of Advance Research and
Development.
[6] https://www.researchgate.net/publication/304066315
Ako Muhammad Abdullah and Roza Hikmat Hama Aziz "
New Approaches to Encrypt andDecryptData inImageusing
Cryptography and Steganography Algorithm "
[7] Fuzhou Gong and Zigeng Xia Academy of Mathematics
and Systems Science, Chinese Academy of
Sciences2University of Chinese Academy of Sciences. "
[8] Álvaro Ramiro Hernández Millán, Larry Mauricio
Portocarrero López, Miguel Mendoza-Moreno, Alexander
Castro-Romero. Facultad de Ingeniería, Escuela de Ing.
Sistemas y Computación Universidad Pedagógica y
Tecnológica de Colombia, U.P.T.C. Tunja, Colombia alvaro.
[9] Subhajit Chaudhury, Sakyasingha Dasgupta, Asim
Munawar, Md. A. Salam Khan, Ryuki Tachibana. 2017 IEEE
INTERNATIONALWORKSHOPON MACHINELEARNINGFOR
SIGNAL PROCESSING, SEPT. 25–28, 2017, TOKYO,
JAPAN"TEXT TO IMAGE GENERATIVE MODEL USING
CONSTRAINED EMBEDDING SPACE MAPPING".
[10] Rupesh Gupta Dr.Tanu Preet Singh. Computer Science
and Engineering DepartmentACETAmritsar,PTUJalandhar,
Indi ACET Amritsar, PTU Jalandhar, India
gupta_rupesh_mani@yahoo.co.in
[11] G.Prashanti Information Technology Vignan’s Lara
ammulu1310@gmail.com."Data Confidentiality Using
Steganography and Cryptographic Techniques".
[12] Ammad Ul Islam1, Faiza Khalid2, Mohsin Shah2 "An
Improved Image Steganography Technique based on MSB
using Bit Differencing".
[13] Lisa M. Marvel and Charles T. Retter U.S.ArmyResearch
Laboratory "Hiding Information in Images".
[14] Garima Gupta (M.Tech Student) Department of
Computer Science Engineering Department, Poornima
College of Engineering, Jaipur(Rajasthan),India"HidingText
Data in Image through Image Watermarking using DCT &
DWT".
[15] MENG Yan-yan, GAO Bao-jian, Qiang Yuan,Yu Fu-
gen,Wang Cui-fang " A Novel Steganalysis of Data Hiding in
Binary Text Images"
[16] Amarjit Roy, Rabul HussainLaskarECEDepartmentNIT
Silchar Silchar, India" Impulse noise removal based on SVM
classification "

More Related Content

What's hot

IRJET- Fire Detector using Deep Neural Network
IRJET-  	  Fire Detector using Deep Neural NetworkIRJET-  	  Fire Detector using Deep Neural Network
IRJET- Fire Detector using Deep Neural NetworkIRJET Journal
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013ijcsbi
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
B03208016
B03208016B03208016
B03208016inventy
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

What's hot (20)

IRJET- Fire Detector using Deep Neural Network
IRJET-  	  Fire Detector using Deep Neural NetworkIRJET-  	  Fire Detector using Deep Neural Network
IRJET- Fire Detector using Deep Neural Network
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013
 
C010511420
C010511420C010511420
C010511420
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
N043020970100
N043020970100N043020970100
N043020970100
 
B03208016
B03208016B03208016
B03208016
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
G0210032039
G0210032039G0210032039
G0210032039
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
D0341829
D0341829D0341829
D0341829
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Steganography
SteganographySteganography
Steganography
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 

Similar to IRJET- Machine Learning Application for Data Security

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyMonica Turner
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesIJERA Editor
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Publishing House
 

Similar to IRJET- Machine Learning Application for Data Security (20)

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Bi34381384
Bi34381384Bi34381384
Bi34381384
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
G017444651
G017444651G017444651
G017444651
 
O017429398
O017429398O017429398
O017429398
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

IRJET- Machine Learning Application for Data Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1536 Machine Learning Application for Data Security Ms. Priyanka M Ninganure1, Asst.Prof. V K Shende2 1MTech(DCN) Student, Dept. of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India 2 Asst.Professor, Dept. of ECE, Gogte Institute of Technology, Belagavi, Karnataka, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - The security of informationormessagehasbecome one of the principle challenges of the resource sharing with data communication over computer network. by using internet, secrete messages or information can be transferred in a fast and easy way in various sectors such as government offices, private sector, military, medical areas and defense areas. Most of the times, confidentiality of the transferred information needs to be maintained. To make sure that the information is transferred securely and safely over the computer network, a suitable method is needed. To improve the security of information or data, stegnography must have the ability to resist detection by machine learning algorithms. This presents an efficient algorithm for information hiding in an image based on machine learning. Proposed method uses blocks of the cover image and then embedding message bits are hides in to the cover image pixels. The machine learning based model is designed to have 5 convolutionlayerswith feed forward neural network. The SVM is a most common algorithm of machine learning, which is been used to smoothen the distorted image and to provide double fold to security VGG19 model of DNN is been building. Since by using these model it is possible to retrieve the data which is missed during transmission. Key Words: Cryptography, Steganography, Secret message, Cover image, encryption, decryption, SVM and DNN Model. 1. INTRODUCTION Initially, there are two techniques for shielding information from interlopers while exchanging over an open channel. ThoseareCryptographyand Steganography.Cryptographyis a technique to encode information and steganography is a craftsmanship and investigation of concealing mystery data in a spread picture. Maximum number of charactersthat can be hidden in an image is equal to the product of width and height of the image. Data in computers is transmitted and stored as a series of zeros and ones (alsoitsknownas Binary values). To store an image on a computer, the image is broken down in to tiny blocks. This proposedsimplemethod is to hide information in the encrypted image then send the encrypted image to the receiver over the network. Here we are not taking a single word or single sentence instead we are taking a text file which contains the secrete information, its size can be in Kb's or MB's. When we take text file which is to be hidden in to an image, that image is called as cover image which is of 256*256 pixel size. There are many encryption and decryption methods are present, security of the data can be handled by the stenography but the problem occurs when we are transferring a large amount of data or large text file it may be of any size. Once we finish the encryption part and appending the information in to an image the encrypted image will be distorted because of the misplacing of pixels or we can say bits. Soduetothatwe may lose the important message which is present in the file, So machine learning algorithm can be used to retrieve that lost message and here SVM is been used for smoothening of distorted image. The most popular medium used is image files because of their high capacity and easy availabilityover the internet. The image used for embedding the secret message at the sender side is called cover image, and message is that the secret information which needs to be protected by intruder or hacker. This model proposes a new filtering method based on SVM. In this is been demonstrated that a relationship between the noise vector and secrete information size. 2. Designing of Proposed Model Stages of proposed system. 1) Secret Text on to an image using only steganography. 2) Image to image steganography using machine learning. Picture Selection to Disguise Cryptography Select a picture that can without much of a stretch mix with its encompassing when it is adjusted. For examplea picture that has a high level of relationship with its environment, this procedure proposing to embed content. We don't expect to choose an exceedingly particular picture supposing that we alter such a picture the progressionswouldbeunmistakable. Since we are wanting to adjust picture in the spatial space choosing an appropriate picture is significant procedure. To embed the mystery message on the chose picture, we have two essential presumptions in this progression: initially,the sender and the recipient realize which picture is being transmitted and also, the territory in the picture that is utilized for concealing mystery information. Werecommend utilizing a zone that has a high level of clamor or highlevel of connection with its environment. Choosing a legitimate picture is a basic advance since we will change the pixels in the spatial space. In the wake of choosing an appropriate part in a picture the content can be embedded. Content can be written from numerous points of view. The picture chose for this object is known as the spread picture andthepicture acquired after steganography is known as the stego-picture. A picture is spoken to as a N*M (in the event of greyscale pictures) or N*M*3 (if there should be an occurrence of shading pictures) lattice in memory, with every passage speaking to the power estimation of a pixel. In picture steganography, a message is inserted into a picture by
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1537 modifying the estimations of certain pixels,whicharepicked by an encryption calculation. The beneficiary of the picture must know about a similar calculation so as to known which pixels the person in question must choose to extricate the message. 2.1 Pixel idea and shading models As of now referenced, pixels are the littlest individual component of a picture. Thus, every pixel is an example of a uniquepictureoranimage.Thatistosay,theoriginalcanhave progressively exact portrays by using more samples. The strength of every pixel in an image is variable. Frameworks in colourimaging,a colourisordinarilyindicatesbythreeorfour segment powers, for example, red, green, and blue, or cyan, red, yellow, and dark. Here, will work with the RGB shading model. As you can envision, the RGB shading model has 3 channels,red,green andblue.Inthisway,everypixel fromthe pictureismadeoutof3esteems(red,green,blue)whichare8- bitesteems(therangeis0– 255).foreverypixel wehavethree qualities, which can be spoken to in paired code (the PC language).When working with twofold codes, we have increasinglycritical bitsandlessnoteworthybits.Forinstance, on the off chance that we change the furthest left piece from 1 to 0 it will change the decimal incentive from 255 to 127. On theotherhand,thefurthestrightpieceisthelesshugepiece.In the event that we change the furthest right piece it will have lesseffectonthelastesteem.Forinstance,intheeventthatwe change the furthest left piece from 1 to 0 it will change the decimalincentivefrom255to254.Notethatthefurthestright piece will change just 1 of every scope of 256 (it speaks to under 1%). 3. Architecture of Proposed Model Fig1: Flow of proposed model using DNN The above block diagram shows the flow ofproposedmodel. Which consists of two stages. Secrete Textappendedonto an image using only Stegnography and in secondstageimage to image stegnography using DNN.  Secrete message and cover image: Where secrete message is a file which consists of text, it can be of any size. Within cover media steganography hides the secrete message, where we can use the cover media as audio, video, text or an image The each pixel of the cover image merged with the each bits of characters. This resultant image is called as stegno image1 which consists of encrypted message.  Cover image2 and stegno image2: Here cover image2 is similar to cover image1 but it is different image. Which gets appended with the stegno image and gives the resultant image which we can call stegno image2.To provide still more stronger security this step is been performed. Here it is possible to perform stegno image to cover image appending and smoothening process in parallel by using DNN.  Decryption of stegno images 1 &2: Decryption is the process of transforming encrypted information so that it is intelligible again. Will get non-readable messages to readable messages.   Network Model: The network model is built by using SVM(Support vector machine) and DNN(Deep Neural Network) Since SVM is classification algorithm we can use this in removing noise from message. The support vectors are created during the training time. These support vectors are required for the formation of the optimal hyperplane. 3.1 EXPERIMENTAL RESULTS Table1: Results Comparing Before Smoothening and after Smoothening of stegno images. Description: By looking at above table we can justify that, if the text file size increases then the amount of noise will be
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1538 increased accordingly. And that noise is been removed by smoothing process. GRAPH1: Variation in the size of the images in each of the stage. This graph shows the variation in the size of the images when the text file is varied from small size to large size. Where Input text file is indicated by blue, Stegno image is indicated by red and Smoothened stegno image is been indicated by green which contains the encrypted information. Where six different sizes of text files are taken and performed the proposed technique fordata security.We can observe the reduction in noise at the final stage. (a) and (b) : For ex 170kb input text file is been considered, this information is encoded and appended with original image1. which gives us Stegno image1 which contained secrete information along with that natural noise is added. (c) and (d): Stegno image1 is again appended with one more cover image2 just to provide strong security. (e): We will get one more stegno image2 and which is fed to network as an input to smoothen it. In this process we smoothen the image2 first then image1 secondly to remove noise from this image also we can retrieve the lost information during transmission. Then we go for decoding data to get desired text file. Fig2: performed demo when text file is130000Kb Note: Here you can observe that, file size is 130000Kb and stegno image which contained secrete information is 28Kb then after smoothening image size will become 20kb. So we can say that around 8kb of noise is been removed from an image. Fig 3: Output when File size is 40000kb
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1539 4. CONCLUSION and FUTURE SCOPE This project presents the Information hiding and which prevents the information loss which occurs during the transmission on a particular path. It is the right technique to exchange secret information over the internet. Proposed model uses VGG19 model of DNN to remove the noise from stegno images. REFERENCES [1] Donghui Hu, Liang Wang, Wenjie Jiang, Shuli Zheng, Bin Li" A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks" [2] Kamaldeep Joshi, Swati Gill, and Rajkumar Yadav" ANew Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image " [3] Saleh Delbarpour Ahmadi. "Image Steganography with Artificial Immune System "Faculty of Computer and Information Technology. Engineering, Qazvin Branch,Islamic AzadUniversity,Qazvin, Iran Saleh.delbarpour@yahoo.com [4] Dong-Hyun kim "Deep learning based steganalysis against spatial domain steganography" dept.of software engineering kumaho national institute of technology,Gumy, gyeonbuk republic of korea. [5] Kumar Nannapaneni Manoj, Kumar M. Praveen, Rao M. Srinivasa,"Data Hiding Using Image Steganography "International Journal of Advance Research and Development. [6] https://www.researchgate.net/publication/304066315 Ako Muhammad Abdullah and Roza Hikmat Hama Aziz " New Approaches to Encrypt andDecryptData inImageusing Cryptography and Steganography Algorithm " [7] Fuzhou Gong and Zigeng Xia Academy of Mathematics and Systems Science, Chinese Academy of Sciences2University of Chinese Academy of Sciences. " [8] Álvaro Ramiro Hernández Millán, Larry Mauricio Portocarrero López, Miguel Mendoza-Moreno, Alexander Castro-Romero. Facultad de Ingeniería, Escuela de Ing. Sistemas y Computación Universidad Pedagógica y Tecnológica de Colombia, U.P.T.C. Tunja, Colombia alvaro. [9] Subhajit Chaudhury, Sakyasingha Dasgupta, Asim Munawar, Md. A. Salam Khan, Ryuki Tachibana. 2017 IEEE INTERNATIONALWORKSHOPON MACHINELEARNINGFOR SIGNAL PROCESSING, SEPT. 25–28, 2017, TOKYO, JAPAN"TEXT TO IMAGE GENERATIVE MODEL USING CONSTRAINED EMBEDDING SPACE MAPPING". [10] Rupesh Gupta Dr.Tanu Preet Singh. Computer Science and Engineering DepartmentACETAmritsar,PTUJalandhar, Indi ACET Amritsar, PTU Jalandhar, India gupta_rupesh_mani@yahoo.co.in [11] G.Prashanti Information Technology Vignan’s Lara ammulu1310@gmail.com."Data Confidentiality Using Steganography and Cryptographic Techniques". [12] Ammad Ul Islam1, Faiza Khalid2, Mohsin Shah2 "An Improved Image Steganography Technique based on MSB using Bit Differencing". [13] Lisa M. Marvel and Charles T. Retter U.S.ArmyResearch Laboratory "Hiding Information in Images". [14] Garima Gupta (M.Tech Student) Department of Computer Science Engineering Department, Poornima College of Engineering, Jaipur(Rajasthan),India"HidingText Data in Image through Image Watermarking using DCT & DWT". [15] MENG Yan-yan, GAO Bao-jian, Qiang Yuan,Yu Fu- gen,Wang Cui-fang " A Novel Steganalysis of Data Hiding in Binary Text Images" [16] Amarjit Roy, Rabul HussainLaskarECEDepartmentNIT Silchar Silchar, India" Impulse noise removal based on SVM classification "