The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed to improve
security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for
double protection during data transmission. The selected steganographic algorithm is the use of a
combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very
important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed
method of DCT transformation first, proceed with DWT transformation. From the experimental results
obtained better imperceptibility quality, compared with existing methods. To add OTP message security
applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments
conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and
NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all
images is 1.
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document discusses the implementation of a new steganography technique called BPCS-Steganography. Steganography hides secret data within other carrier data without leaving any visible evidence of alteration. Traditional techniques have limited capacity of less than 10% of the carrier size. The new technique embeds secrets in the bit-planes of an image carrier. It takes advantage of human inability to perceive shapes in complex binary patterns to replace "noise-like" bit-plane regions with secret data without affecting image quality. This allows hiding secret data up to 50% of the original image size. The document also discusses technologies, security considerations using RSA encryption, and a system study of the proposed technique versus existing work.
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...IDES Editor
This paper proposes a 2-tier data hiding technique
that involves Exploiting Modification Direction (EMD) method
and Huffman Coding. Firstly, a secret message of an arbitrary
plain text is encrypted, compressed and transformed into a
stream of bits. Subsequently, the bits are converted into secret
digits by using the Huffman dictionary table. Secondly, a
cover image is segmented into groups of n pixels and each
group is embedded with one secret digit by modifying one
gray-scale value at most to hide the secret digit in (2n+1)-ary
notational system. The experimental results have shown that
both PSNR and payload of the proposed method are higher
than that of well-known methods namely, OPAP, EMD and
Opt EMD.
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
An improved security and message capacity using AES and Huffman coding on ima...TELKOMNIKA JOURNAL
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document discusses the implementation of a new steganography technique called BPCS-Steganography. Steganography hides secret data within other carrier data without leaving any visible evidence of alteration. Traditional techniques have limited capacity of less than 10% of the carrier size. The new technique embeds secrets in the bit-planes of an image carrier. It takes advantage of human inability to perceive shapes in complex binary patterns to replace "noise-like" bit-plane regions with secret data without affecting image quality. This allows hiding secret data up to 50% of the original image size. The document also discusses technologies, security considerations using RSA encryption, and a system study of the proposed technique versus existing work.
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...IDES Editor
This paper proposes a 2-tier data hiding technique
that involves Exploiting Modification Direction (EMD) method
and Huffman Coding. Firstly, a secret message of an arbitrary
plain text is encrypted, compressed and transformed into a
stream of bits. Subsequently, the bits are converted into secret
digits by using the Huffman dictionary table. Secondly, a
cover image is segmented into groups of n pixels and each
group is embedded with one secret digit by modifying one
gray-scale value at most to hide the secret digit in (2n+1)-ary
notational system. The experimental results have shown that
both PSNR and payload of the proposed method are higher
than that of well-known methods namely, OPAP, EMD and
Opt EMD.
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
The document proposes a system that combines cryptography and steganography for secure data transmission. It discusses using the DES algorithm for encryption and 2DDCT for data hiding in images. The encrypted message is then split, with part of the message hidden in an image using 2DDCT and the rest used to generate two secret keys. This combination of cryptography and steganography is intended to provide highly secure transmission even if the hidden data is retrieved.
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
Highly secure scalable compression of encrypted imageseSAT Journals
Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression
Encryption converts plaintext into ciphertext using an algorithm and key. Gaussian elimination with partial pivoting and row exchange is used to encrypt images by converting the image matrix to an upper triangular matrix and generating a decryption key. The encrypted image matrix and key can then be multiplied to recover the original image matrix and decrypt the image. This algorithm allows for faster encryption time while still producing robust encryption to prevent unauthorized access to images.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
This document evaluates the performance of chaotic encryption algorithms. It aims to analyze the confidentiality, integrity, and efficiency of encrypting video data. The document introduces cryptography and chaos concepts. It describes chaotic encryption and decryption processes. It evaluates existing algorithms like CVES, SEA, NCA, and EES based on encryption speed, CPU utilization, and power consumption. The results show that CVES and NCA have better encryption speeds while EES requires more time. The algorithms provide varying levels of security from high to middle.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
This document discusses applying BPCS steganography techniques to embed secret information in wavelet compressed video. It begins with an abstract describing BPCS steganography, which embeds secret data in the bit-planes of an image without deteriorating image quality. It then provides an introduction to steganography and its applications for secure internet communication. The document discusses the design of the steganography technique, including its high embedding capacity of up to 50% of the original image size without increasing file size. It also covers security considerations like the RSA encryption algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
Hiding data in images using steganography techniques with compression algorithmsTELKOMNIKA JOURNAL
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
The document proposes a system that combines cryptography and steganography for secure data transmission. It discusses using the DES algorithm for encryption and 2DDCT for data hiding in images. The encrypted message is then split, with part of the message hidden in an image using 2DDCT and the rest used to generate two secret keys. This combination of cryptography and steganography is intended to provide highly secure transmission even if the hidden data is retrieved.
A SECURE DNA CRYPTOSYSTEM BASED ON STEGANOGRAPHY AND INDEXING CIPHERIJNSA Journal
One of the essential challenges nowadays; is how to secure data with the increase of its volume as well as its transmission rate. The most frequent approach used to give a high degree of protection, preserve data from hackers, and accomplish multilayer security is steganography combined with encryption. DNA (Deoxyribonucleic Acid) is considered as a new promising carrier for data security while achieving powerful security and maximum protection. In this paper, a secure DNA cryptosystem model which combines steganography with encryption is introduced and categorized into two layers. The original data are hidden in the first layer into a reference DNA based on the insertion method to obtain a fake DNA sequence. In the second layer, this fake DNA sequence, which is the first layer's output, is encrypted using an indexing cipher to produce an encrypted message in the form of indexes. The proposed model guarantees multilayer security to the secret data with high performance and low-time wasting. It addresses the long-generation key problem of the DNA cryptography. The experimental results assess and validate the theoretical security analysis and model performance.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
Highly secure scalable compression of encrypted imageseSAT Journals
Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression
Encryption converts plaintext into ciphertext using an algorithm and key. Gaussian elimination with partial pivoting and row exchange is used to encrypt images by converting the image matrix to an upper triangular matrix and generating a decryption key. The encrypted image matrix and key can then be multiplied to recover the original image matrix and decrypt the image. This algorithm allows for faster encryption time while still producing robust encryption to prevent unauthorized access to images.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
This document evaluates the performance of chaotic encryption algorithms. It aims to analyze the confidentiality, integrity, and efficiency of encrypting video data. The document introduces cryptography and chaos concepts. It describes chaotic encryption and decryption processes. It evaluates existing algorithms like CVES, SEA, NCA, and EES based on encryption speed, CPU utilization, and power consumption. The results show that CVES and NCA have better encryption speeds while EES requires more time. The algorithms provide varying levels of security from high to middle.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
This document discusses applying BPCS steganography techniques to embed secret information in wavelet compressed video. It begins with an abstract describing BPCS steganography, which embeds secret data in the bit-planes of an image without deteriorating image quality. It then provides an introduction to steganography and its applications for secure internet communication. The document discusses the design of the steganography technique, including its high embedding capacity of up to 50% of the original image size without increasing file size. It also covers security considerations like the RSA encryption algorithm.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
Hiding data in images using steganography techniques with compression algorithmsTELKOMNIKA JOURNAL
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
- Steganography is the art and science of invisible communication as it hides the information message
inside cover image In This paper the cover image is decomposed using multilevel wavelet transform and theses
wavelet coefficients are statistically weighted according to their perceptual importance (CSF weights) to identify
the regions of interest for the embedding. The hiding image is encrypted using secret key based on wavelet
coefficients on the last approximation level. Then the encrypted watermark is embedded using CSF weights in
the wavelet domain into the cover image. Experimental results denote the feasibility of the proposed method as
the stego images has high PSNR and subjective quality which declare that the algorithm gains a good
performance in transparency and robustness against noise attacks.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
An improved robust and secured image steganographic schemeiaemedu
The document summarizes an improved steganographic scheme that embeds secret data in images. It modifies an existing DCT-based scheme by embedding an "embedding map" to indicate the blocks used for concealment. The embedding map is also hidden using DWT coefficients and secured using SURF features. The proposed method aims to overcome limitations in the existing scheme like potential data loss during extraction due to changes in block energy values. Results show the scheme is robust against attacks like noise and compression while maintaining good image quality. However, capacity is still limited as only part of the image can hide the embedding map.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and detecting sound waves. The steganography system applies compressive sampling (CS) to the process of acquisition and compression of bits in binary images. Rivest, Shamir, and Adleman (RSA) algorithms are used as a system for securing binary image information by generating encryption and decryption key pairs before the process is embedded. The insertion method uses statistical mean manipulation (SMM) in the wavelet domain and low frequency sub-band by dividing the audio frequency sub-band using discrete wavelet transform (DWT) first. The optimal results by using our system are the signal-to-noise ratio (SNR) above 45 decibel (dB) and 5.3833 bit per second (bps) of capacity also our system has resistant to attack filtering, noise, resampling and compression attacks.
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
Delay and disruption tolerant network (DTN) is used for long area communication in computer network, where there is no direct connection between the sender and receiver and there was no internet facility. Delay tolerant network generally perform store and forward techniques as a result intermediate node can view the message, the possible solution is using encryption techniques to protect the message. Starting stages of DTN RSA, DES, 3DES encryption algorithms are used but now a day’s attribute based encryption (ABE) techniques are used. Attribute based encryption technique can be classified in to two, key policy attribute based encryption (KPABE) and cipher policy attribute based encryption (CPABE). In this paper we perform a categorized survey on different encryption techniques presents in delay tolerant networks. This categorized survey is very helpful for researchers to propose modified encryption techniques. Finally the paper compares the performance and effectiveness of different encryption algorithms.
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
The document summarizes a research paper presented at the National Conference on Emerging Trends in Information and Computing Technologies. The paper proposes a novel steganographic technique that embeds data by altering the least significant bit of low frequency discrete cosine transform coefficients of image blocks. Experimental results showed the technique has a better peak signal-to-noise ratio value and higher data capacity compared to other techniques like least significant bit, modulus arithmetic, and SSB4-DCT embedding. It also maintains satisfactory security as the secret message cannot be extracted without knowing the decoding algorithm.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
Steganography is the science that involves
communicating secret information in an appropriate
carrier so no one apart from the sender and the recipient
even can recognize that there is hidden
information. Steganography is the art of hiding
messages inside unsuspicious medium such as images,
videos, various types of files…etc. It's a method to
establish a secure communication channel between two
parties. The purpose of steganography is to hide the
existence of a message from an eavesdropper or third
parties. Steganalysis is the branch of data processing
that seeks the identification of carrier vessels and
retrieval of message hidden. In this paper we present
enhanced implementation for Steganography algorithm,
an algorithm that we claim to be safe, built over DCT
(Discrete Cosine Transformation) frequency
domain mutation[12], the algorithm uses error reductive
measurements such as pattern matching to obtain
a reasonable a better image quality by reducing number
of changes that steganography algorithm made during
the embedding process.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
Data security is one of major challenges in the recent literature. Cryptography is the most
common phenomena used to secure data. One main aspect in cryptography is creating a hard to
guess cipher. Artificial Neural Networks (ANN) is one of the machine learning techniques
widely employed in several fields based on its characters, depending on the application area.
One of these fields is data security. The state of art in this paper is the use of self organizing
map (SOM) algorithm concept as a core idea to construct a pad; this pad is used to generate the
cipher at one end. At the other end of communication the same process is synchronized to
generate the same pad as the deciphering key. The security of the proposed model depends on
the complex nature of ANN's. The algorithm could be categorized under symmetric
cryptography, merging both stream and block cipher. A modified version of the same algorithm
also presented employs permutation and variable SOM neighborhoods. The proposal can be
applied over several file formats like videos, images, text files, data benchmarks, etc as show in
experimental results
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
2. TELKOMNIKA ISSN: 1693-6930
A Good Performance OTP Encryption Image based on DCT-DWT ... (Wellia Shinta Sari)
1981
combination of DCT and DWT to improve the imperceptibility aspect, while also adding OTP
encryption to encrypt the message before it is embedded in the cover file so that double
protection on the message is sent.
2. Research Method
2.1. Data Gathering
In this experiment, we used 20 standard grayscale image data with the .jpg format with
512x512 size coming from source [22], while the secret message image is a 32x32 pixel binary
image as shown in Figure 1. The experiment was tested executed with the Matlab tool. Here is
an image used to experiment.
(a) (b) (c) (d) (e) (f) (g)
(h) (i) (j) (k) (l) (m) (n)
(o) (p) (q) (r) (s) (t) (u)
Figure 1. Images Database: (a) babbon.jpg, (b) barbara.bmp, (c) butterfly.png, (d)
cameraman.jpg, (e) lena.bmp, (f) peppers.tiff, (g) fishingboat.jpg, (h) f16.jpg, (i) zelda.gif , (j)
house.jpg, (k) girlface.jpg, (l) goldhill.jpg, (m) tank.tiff, (n) couple.jpg, (o) kiel.gif, (p) view.jpg, (q)
lung.jpg, (r) brain.jpg, (s) cat.jpg, (t) trucks.tiff, (u) message.bmp
2.2. Theoretical Basis
2.2.1. One Time Pad (OTP)
OTP is a popular algorithm that is often used through cryptographic techniques. OTP
belongs to a group of symmetric cryptographic algorithms where one key is used for encryption
and decryption [20]. The algorithm used in OTP is very simple that is by using XOR operation or
can also use modulo (mod). Although very simple, OTP has the advantage that is very difficult
to solve because it has a key that is only once used and has the same length as the message to
be encoded [23]. This algorithm will also be very difficult to describe because the attacker
should try every possible key when decrypting and it is very difficult to guess the original
plaintext. The equation of OTP encryption can be seen on Equation 1, whereas OTP decryption
can be seen on Equation 2.
𝐶𝑖 = (𝑃𝑖 + 𝑘𝑖) 𝑚𝑜𝑑 𝑧 (1)
3. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1980 – 1987
1982
𝑃𝑖 = (𝐶𝑖 − 𝑘𝑖) 𝑚𝑜𝑑 𝑧 (2)
Where,
𝐶𝑖 = Cipherteks,
𝑃𝑖 = Plaintext,
𝑘𝑖 = Random key,
𝑧 = the number of possible characters
2.2.2. Discrete Cosine Transform (DCT)
DCT is the transform is resistant to attack lossless image compression [11] and working
to change the function of the spatial domain into the frequency domain [10]. DCT transforms the
input signal into two kinds of coefficients ie direct current (DC) and alternating current (AC) [24].
The DC coefficient is a representation of approximation and illumination and contains the image
core information [10]. While the AC coefficients consist of three frequencies, namely: high
frequency, low frequency, and medium frequency. Message insertion can be done on all
coefficients, it's just insertion in the DC part has advantages that are more robust but the quality
of stego image is maintained [7]. Figure 2 is an illustration of the AC and DC coefficients in the
input image of size 8x8.
Figure 2. Mapping of Coefficients and Frequencies at DCT
DCT is a transformation that is often used in compression, steganography, and
watermarking techniques. DCT is operated using base and column of the image (MxN). DCT
operations on images, in general, can be translated through Eq. 3 and Eq. 4 for inverse DCT
operation.
𝐻(𝑓, 𝑔) = 𝑎(𝑓)𝑎(𝑔) ∑ ∑ 𝑠(𝑜, 𝑝) 𝑐𝑜𝑠
(2𝑜 + 1)𝑓𝜋
2𝑀
𝑐𝑜𝑠
(2𝑝 + 1)𝑔𝜋
2𝑁
𝑁−1
𝑝=0
𝑀−1
𝑜=0
(3)
𝑠(𝑜, 𝑝) = 1/𝑜 =
2
√𝑀. 𝑁
𝑎(𝑓)𝑎(𝑔) ∑ ∑ 𝐻(𝑓, 𝑔) 𝑐𝑜𝑠
(2𝑜 + 1)𝑓𝜋
2𝑀
𝑐𝑜𝑠
(2𝑝 + 1)𝑔𝜋
2𝑁
𝑁−1
𝑝=0
𝑀−1
𝑜=0
(4)
Where,
𝑓 is 0,1,2, … , 𝑀 − 1 with signal length 𝑀 = 8
𝑔 is 0,1,2, … , 𝑁 − 1 with signal length 𝑁 = 8
𝑁 and 𝑀 is signal length
2.2.3. Discrete Wavelet Transform (DWT)
DWT is a transform domain that uses an operating model based on subband LL, LH,
HL, and HH as shown in Figure 3 [24]. The four subband is obtained by using two kinds of
filters, namely low pass filter and high pass filter. The use of this filter is done through rows
4. TELKOMNIKA ISSN: 1693-6930
A Good Performance OTP Encryption Image based on DCT-DWT ... (Wellia Shinta Sari)
1983
(vertical) and column (horizontal) on the image. Subband LL contains low frequency, while
subband HH contains high frequency. Subband LH and HL are medium frequencies, the
difference is HL obtained from low frequency using high pass filter vertically, whereas LH is
obtained from high frequency using low pass filter vertically [15] [25]. In steganography theory,
each subband has advantages and disadvantages to insert messages. Message insertion on
subband LL can improve robustness but reduce imperceptibility, subband HH otherwise,
whereas HL and LH tend to be more neutral [26]. However, some studies suggest that insertion
in LL subband is still quite good in the imperceptibility aspect [6].
LL HL
LH HH
Figure 3. Wavelet Subbands
2.3. The Proposed Method
Based on the above literature it is proposed a combination of DCT-DWT method and
OTP encryption to improve message security. In this paper, there are two main processes,
namely the process of embedding and extracting. Where in each process, DCT transform is
done first, then proceed with DWT transformation. The message image is encrypted with the
OTP method before it is inserted in the cover image. For more details see Figure 4
and Figure 5.
Figure 4. Embedding Scheme using DCT-DWT-OTP
5. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1980 – 1987
1984
Figure 5. Extraction Scheme using DCT-DWT-OTP
2.3.1 Embedding Scheme
The embedding process that will be done in this research can be translated into:
1. Select a 512x512 pixel image host then split into 8x8 sized sub-blocks.
2. The sub-blocks are then transformed by DCT and collect the DC coefficients on every sub-
block.
3. The DC coefficients of every sub-block are then aggregated into one in the reference
image(𝐶𝑅𝑖).
4. Then transform the Reference image DWT and grab subband LL, resulting in transform
image(𝐶𝑅𝑙𝑙).
5. On the other hand, pass encryption to the image image image with the OTP algorithm and
the secret key generated from the rand function using Eq.1, thus forming the cipher
image(𝑐𝑖).
6. Embed the cipher image(𝑐𝑖) on LL subband reference image(𝐶𝑅𝑙𝑙), with Eq. 5, thus
generating mofidied LL subband reference image(𝑀𝑅𝑙𝑙).
𝑀𝑅𝑙𝑙 = 𝐶𝑅𝑙𝑙 + (𝑐𝑖 ∗ 𝛽) (5)
Where 𝛽 is embedding factor .
7. Next, do the inverse DWT (IDWT) process on the transformed image to get modified
reference image. Thus replace the DC coefficients on every sub block.
8. Finally, do IDCT for each subblock, this process got stego image.
2.3.2 Extracting Scheme
The following is a stego image extracting process in Figure 5:
1. Stego image is divided into 8x8 subblock and processed using DCT.
2. Collect the DC coefficients on each subblock to reference the image.
3. Continue with DWT on the reference image and select LL subband.
4. Do the same on the host image starting from point 1 to point 3.
5. Extract by comparing the LL subband on the stego image and host image, using Equation
𝑟𝑐𝑖 = (𝐻𝑅𝑙𝑙 − 𝑆𝑅𝑙𝑙)/𝛽 (6)
Where, 𝑟𝑐𝑖 is recover chipper file, 𝐻 𝑅𝑙𝑙 is LL subband of host reference image, 𝑆𝑅𝑙𝑙 is LL
subband of stego refecence image
6. The extraction results are then processed with OTP using Equation 2 so it will generate
decryption of recovery message
6. TELKOMNIKA ISSN: 1693-6930
A Good Performance OTP Encryption Image based on DCT-DWT ... (Wellia Shinta Sari)
1985
3. Results and Analysis
To find out the proposed algorithm's performance, the embedding process will be
measured with PSNR and MSE, while the extraction results will also be measured by NC.
𝑀𝑆𝐸 =
1
𝑀𝑥𝑁
∑ ∑ [{𝑥(𝑝, 𝑞) − 𝑦(𝑝, 𝑞)}2]
𝑁−1
𝑞=0
𝑀−1
𝑝=0
(7)
Equation 7 is an equation for computing MSE, where M and N are rows and columns of
pixels in the image. MSE is a quadratic function used to measure the difference between a host
image and a stego image. Where the smaller the value of MSE, the quality of the more closely
resembles the cover image. The good value of PSNR in the realm of steganography is at least
40 dB [27]. The equation for calculating PSNR as shown in Equation 9.
𝑃𝑆𝑁𝑅 = 10 𝑙𝑜𝑔10 (
𝑀𝑥𝑁
𝑀𝑆𝐸
) (8)
From Equation 8 above, it is known that PSNR is calculated by using the inverse
operation of the exponent in a natural logarithm based on 10 and multiplied by M, N which is the
row and column of the measured image. While the formula of NC can be elaborated through
Equation 7.
𝑁𝐶 =
∑ (𝐻(𝑝, 𝑞)𝑆(𝑝, 𝑞))𝑁−1
𝑖,𝑗=0
∑ (𝐻(𝑝. 𝑞))
2𝑁−1
𝑖.𝑗=0
(9)
Based on Equation 9, N is the image size to be measured, 𝐻(𝑝, 𝑞) is the pixel value of
the original image, while 𝑆(𝑝, 𝑞)is the pixel value of the stego image. If the value of NC close to
one, then the image of extraction is also increasingly identical with the original message image.
Table 1 shows the results of the experiment to show DCT-DWT-OTP performance.
Table 1. Embedding and Extraction Results using DCT-DWT-OTP (in PSNR, MSE, and NC)
Cover Image MSE PSNR
NC without
attack
Baboon 0.4980 51.3053 1.0000
Barbara 0.4863 51.2615 1.0000
Buterfly 0.4990 51.2615 1.0000
Cameraman 0.5117 51.1496 1.0000
Lena 0.4961 51.1752 1.0000
Peppers 0.4834 51.2878 1.0000
Fishingboat 0.5156 51.1754 1.0000
F16 0.4961 51.1923 1.0000
Zelda 0.4971 51.2878 1.0000
House 0.5176 51.3853 1.0000
Girlface 0.4853 51.2704 1.0000
Goldhill 0.5137 51.1752 1.0000
Tank 0.4971 51.1666 1.0000
Couple 0.5176 50.9910 1.0000
Kiel 0.4853 51.2705 1.0000
View 0.4990 51.1497 1.0000
Lung 0.5010 51.1326 1.0000
Brain 0.5107 51.0488 1.0000
Cat 0.4873 51.2529 1.0000
Trucks 0.5156 51.0075 1.0000
From Table 1 above it can be seen that all images during embedding process produce
PSNR more than 50 dB and the highest PSNR value is 51.3853 dB. Thus it can be concluded
that this algorithm is stable when applied to various types of images. As for the MSE in all
images also did not reach 0.52. For extraction result, all image got value 1, where this value
indicates there is no difference between original message image with the image of extraction
message. This result is a perfect extraction result.
7. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 4, December 2017 : 1980 – 1987
1986
In this study also performed comparisons with studies conducted by [13], [14], and [24].
In the study [13] and [14] used a combination of DCT and DWT transformations, while in the
study [24] only used DCT transformation. Fig. 6 is a chart that presents a comparison of PSNR
scores of the three previous methods and the method proposed in this study.
Based on Figure 6 it can be seen that the score of PSNR in the proposed method in this
study is superior to the previous study. Research conducted by [13] and [14] both use two
transformations ie DWT and DCT. In the study [14] additionally Arnold's transformation to
improve the security of the message image. Both of these studies performed DWT
transformation first, then continued with DCT transformation. While in this study DCT
transformation done first, then transformed by DWT.
Figure 6. Comparison of PSNR Values with Previous Studies
4. Conclusion
In this study, DCT-DWT steganography was combined with OTP cryptography on the
image media. Of the 20 512x512 pixel grayscale-formatted images tested in this paper, all of the
images all receive a PSNR value of more than 40 dB, which means that the quality of
imperceptibility meets the human visual system aspect. The lowest PSNR is 50.9910 dB and
the highest is 51.3053 dB. Performance tests were also assessed using MSE and NC. Each
managed to get an MSE value between 0.4 to 0.5, while the NC value of all images is 1. This
value indicates that the message can be extracted well and has 100% similarity with the original
message image. Selection of DCT coefficients, subband DWT and embedding factor value
greatly affect the quality of imperceptibility. In this study, DC coefficients of DCT transform and
LL subband on DWT transformation were chosen as the place of embedding of message image.
Based on the results comparable with the studies [13], [14], and [24], the proposed method
suggests that the PSNR score is higher than the previous three studies.
References
[1] A. Cheddad, J. Condell, K. Curran and P. M. Kevitt. Digital image steganography: Survey and analysis
of current methods. Signal Processing. 2010; 90(3); 727-752.
[2] K. Joshi and R. Yadav. A New LSB-S Image Steganography Method Blend with Cryptography for
Secret Communication. in International Conference on Image Information Processing (ICIIP),
Waknaghat, 2015.
[3] P. V. Nadiya and B. M. Imran. Image Steganography in DWT Domain using Double-Stegging with
RSA Encryption. in International Conference on Signal Processing Image Processing & Pattern
Recognition (ICSIPR), Coimbatore, 2013.
[4] H. E. Suryavanshi, A. Mishra and S. Kumar. Digital Image Watermarking in Wavelet Domain.
International Journal of Electrical and Computer Engineering (IJECE). 2013; 3(1): 1-6.
[5] V. Kumar and D. Kumar. Performance Evaluation of DWT Based Image Steganography. in
International Advance Computing Conference (IACC), Patiala, 2010.
[6] A. Susanto, D. R. I. M. Setiadi, C. A. Sari and E. H. Rachmawanto. Hybrid Method using HWT-DCT
for Image Watermarking. in International Conference on Information Technology for Cyber and IT
Service Management (CITSM), Denpasar, 2017.
8. TELKOMNIKA ISSN: 1693-6930
A Good Performance OTP Encryption Image based on DCT-DWT ... (Wellia Shinta Sari)
1987
[7] D. R. I. M. Setiadi, T. Sutojo, E. H. Rachmawanto and C. A. Sari. Fast and Efficient Image
Watermarking Algorithm using Discrete Tchebichef Transform. in International Conference on
Information Technology for Cyber and IT Service Management (CITSM), Denpasar, 2017.
[8] C. A. Sari, E. H. Rachmawanto, and D. R. I. M. Setiadi. Robust and Imperceptible Image
Watermarking by DC Coefficients Using Singular Value Decomposition. in International Conference on
Electrical Engineering, Computer Science, and Informatics (EECSI), Yogyakarta, 2017.
[9] P. Bedi, V. Bhasin, and T. Yadav. 2L-DWTS — Steganography technique based on second level
DWT. in International Conference on Advances in Computing, Communications, and Informatics
(ICACCI), Jaipur, 2016.
[10] J. Li and Q. C.. DSDWA: A DCT-based Spatial Domain Digital Watermarking Algorithm.
TELKOMNIKA Indonesian Journal of Electrical Engineering. 2014; 12(1): 693-702.
[11] M. A. Faizal, H. B. Rahmalan, E. H. Rachmawanto and C. A. Sari. Impact Analysis for Securing Image
Data Using Hybrid SLT and DCT. International Journal of Future Computer and Communication.
2012; 1(3): 308-311.
[12] A. Goswami and S. Khandelwa. Hybrid DCT-DWT Digital Image Steganography. International Journal
of Advanced Research in Computer and Communication Engineering, 2016; 5(6): 228-233.
[13] A. Goswami and S. Khandelwal. Coloured and Gray Scale Image Steganography using Block Level
DWT DCT Transformation. International Journal of Computer Applications. 2016; 148(7): 1-3.
[14] A. Nambutdee and S. Airphaiboon. Medical Image Encryption Based on DCT-DWT Domain
Combining 2D-DataMatrix Barcode. in Biomedical Engineering International Conference (BMEiCON),
Pattaya, 2015.
[15] M. R. Pour Arian and A. Hanani. Blind Steganography in Color Images by Double Wavelet Transform
and Improved Arnold Transform. Indonesian Journal of Electrical Engineering and Computer Science.
2016; 3(3): 586-600.
[16] P. G. Jose, S. Chatterjee, M. Patodia, S. Kabra and A. Nath. Hash and Salt based Steganographic
Approach with Modified LSB Encoding. International Journal of Innovative Research in Computer and
Communication Engineering. 2016; 4(6): 10599-10610.
[17] M. Jain and S. K. Lenka. Secret Data Transmission using Vital Image Steganography over
Transposition Cipher. in International Conference on Green Computing and Internet of Things
(ICGCIoT), Noida, 2015.
[18] P. Patel and Y. Patel. Secure and Authentic DCT Image Steganography through DWT - SVD Based
Digital Watermarking with RSA Encryption. in International Conference on Communication Systems
and Network Technologies (CSNT), Gwalior, 2015.
[19] J. Thakur and N. Kuma. DES, AES, and Blowfish: Symmetric Key Cryptography Algorithms Simulation
Based Performance Analysis. International Journal of Emerging Technology and Advanced
Engineering. 2011; 1(2): 6-12.
[20] N. Nagaraj and P. G. Vaidya. One-Time Pad, Arithmetic Coding and Logic Gates: An unifying theme
using Dynamical Systems. arXiv.org, New York, 2008.
[21] O. Tornea, M. E. Borda, V. Pileczki and R. Malutan. DNA Vernam cipher. in E-Health and
Bioengineering Conference (EHB), Iasi, 2011.
[22] F. Petitcolas. The Information Hiding Homepage. 1997. [Online]. Available:
http://www.petitcolas.net/watermarking/image_database/. [Accessed 2 2017].
[23] R. Shukla, H. O. Prakash, R. P. Bhushan, S. Venkataraman and G. Varadan. Sampurna Suraksha:
Unconditionally Secure and Authenticated One Time Pad Cryptosystem. in International Conference
on Machine Intelligence and Research Advancement (ICMIRA), Katra, 2013.
[24] D. R. I. M. Setiadi, E. H. Rachmawanto, and C. A. Sari. Secure Image Steganography Algorithm
Based on DCT with OTP Encryption. Journal of Applied Intelligent System. 2017; 2(1): 1-11.
[25] H. Gao, L. Jia, and M. Liu. A Digital Watermarking Algorithm for Color Image Based on DWT.
TELKOMNIKA. 2013; 11 (6) 3271-3278.
[26] K. Yun. In the Network Communication an Improved Algorithm of Image Watermarking based on
DWT. TELKOMNIKA. 2013; 11(11): 6304-6308.
[27] P. S. Addison. A Review of Wavelet Transform Time–Frequency Methods for NIRS-Based Analysis of
Cerebral Autoregulation. IEEE Reviews in Biomedical Engineering. 2015; 8: 78 - 85.
[28] B. Li, J. He, J. Huang, and Y. Q. Shi. A Survey on Image Steganography and Steganalysis. Journal of
Information Hiding and Multimedia Signal Processing. 2011; 2(2): 142-172.