In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
analysis on concealing information within non secret dataVema Reddy
Steganography is the art of covered writing or hidden writing. The steganography can be done in six types of techniques, namely: substitution system technique, transform domain technique, spread spectrum technique, statistical method technique, distortion technique and cover generation technique. This ppt deals with substitution system technique and transforms domain technique. This ppt deals with four methods of steganography, namely: plain LSB steganography, inverted LSB steganography, pattern based steganography and twosided, threesided, foursided side matched methods
steganography. The performance and evaluation of these methods are shown in the ppt.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
A Review of Comparison Techniques of Image SteganographyIOSR Journals
This document reviews and compares three common techniques for hiding information in digital images: Least Significant Bit (LSB) steganography, Discrete Cosine Transform (DCT) steganography, and Discrete Wavelet Transform (DWT) steganography. LSB is implemented in the spatial domain by replacing the least significant bits of cover image pixels with payload bits. DCT and DWT are implemented in the frequency domain by transforming the cover image and embedding payload bits in the transformed coefficients. The document evaluates and compares the performance of these three techniques based on metrics like mean squared error, peak signal-to-noise ratio, embedding capacity, and robustness.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient suspects the existence of the message a form of security through obscurity. The internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. In this paper, we proposed a class of new distortion functions known as uniform embedding distortion function (UED) is presented. By incorporating the syndrome trellis coding, the best code word with undetectable data hiding is achieved. Due to hiding more amounts of data into the intersected area, embedding capacity is increased. Our aim is to hide the secret information behind the image file. Steganography hides the secret message so that intruder’s can’t detect the communication. When hiding data into the intersected area, thus provides a higher level of security with more efficient data mean square error is reduced and embedding capacity is increased.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
This document provides an exploratory review of soft computing techniques for image segmentation. It discusses various segmentation techniques including discontinuity-based techniques like point, line and edge detection using spatial filtering. Thresholding techniques like global, adaptive and multi-level thresholding are also covered. Region-based techniques such as region growing, region splitting/merging and morphological watersheds are summarized. The document concludes that future work can focus on developing genetic segmentation filters using a genetic algorithm approach for medical image segmentation.
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The document summarizes previous work on mosaic image steganography and proposes using genetic algorithms and key-based random permutation to improve the technique. Mosaic image steganography hides a secret image by dividing it into fragments and embedding the fragments into a target image to create a mosaic. Previous methods required a large database of images or allowed only arbitrary target image selection. The proposed method uses genetic algorithms to generate a mapping sequence for embedding tile images without a database, improving clarity and reducing computational complexity. It also applies a key-based random permutation to the mapping sequence for enhanced security and robustness. The mosaic image can be recovered using the same key and mapping sequence, making it a lossless data hiding method.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Este documento presenta la matriz de valoración del portafolio interactivo digital y planificador de proyecto de Paola Andrea Echeverry. El proyecto se titula "Implementación de una página web de apoyo académico para las modalidades de reparación y ensamble de computadores y electricista residencial" para el grado 10-9. La matriz evalúa diversos aspectos del portafolio y planificador de proyecto como la estructura, publicación de evidencias, formulación del proyecto, planificación curricular, estrategia pedagógica, met
El documento habla sobre la independencia de Colombia de España. Menciona que un incidente conocido como "El florero de Llorente" inició el proceso de independencia. También menciona que Santander dejó la escuela para unirse al movimiento revolucionario. Finalmente, explica que la independencia permitió la emancipación de Colombia del imperio español y puso fin al periodo colonial, luego de la guerra de independencia librada en el siglo XIX.
El documento habla sobre la independencia de Colombia de España. Menciona que un incidente entre criollos y españoles conocido como el florero de Llorente inició el proceso de independencia. También dice que Santander dejó sus estudios para unirse al movimiento revolucionario. Finalmente, explica que la independencia permitió la emancipación de Colombia del imperio español y puso fin al periodo colonial tras la guerra de independencia en el siglo XIX.
This document summarizes a panel discussion on internet security and privacy ten years in the future. The panel will discuss key threats and elements that may shape security and privacy over the next decade. They will consider how approaches to security and privacy may need to change as internet technologies evolve. The panel will also explore new approaches like information-centric networking and homomorphic encryption that could potentially solve future problems. Finally, the discussion will address whether security and privacy will become more antagonistic, requiring harder trade-offs, or more cooperative over time to allow more comprehensive solutions.
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
analysis on concealing information within non secret dataVema Reddy
Steganography is the art of covered writing or hidden writing. The steganography can be done in six types of techniques, namely: substitution system technique, transform domain technique, spread spectrum technique, statistical method technique, distortion technique and cover generation technique. This ppt deals with substitution system technique and transforms domain technique. This ppt deals with four methods of steganography, namely: plain LSB steganography, inverted LSB steganography, pattern based steganography and twosided, threesided, foursided side matched methods
steganography. The performance and evaluation of these methods are shown in the ppt.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
A Review of Comparison Techniques of Image SteganographyIOSR Journals
This document reviews and compares three common techniques for hiding information in digital images: Least Significant Bit (LSB) steganography, Discrete Cosine Transform (DCT) steganography, and Discrete Wavelet Transform (DWT) steganography. LSB is implemented in the spatial domain by replacing the least significant bits of cover image pixels with payload bits. DCT and DWT are implemented in the frequency domain by transforming the cover image and embedding payload bits in the transformed coefficients. The document evaluates and compares the performance of these three techniques based on metrics like mean squared error, peak signal-to-noise ratio, embedding capacity, and robustness.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient suspects the existence of the message a form of security through obscurity. The internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. In this paper, we proposed a class of new distortion functions known as uniform embedding distortion function (UED) is presented. By incorporating the syndrome trellis coding, the best code word with undetectable data hiding is achieved. Due to hiding more amounts of data into the intersected area, embedding capacity is increased. Our aim is to hide the secret information behind the image file. Steganography hides the secret message so that intruder’s can’t detect the communication. When hiding data into the intersected area, thus provides a higher level of security with more efficient data mean square error is reduced and embedding capacity is increased.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
This document provides an exploratory review of soft computing techniques for image segmentation. It discusses various segmentation techniques including discontinuity-based techniques like point, line and edge detection using spatial filtering. Thresholding techniques like global, adaptive and multi-level thresholding are also covered. Region-based techniques such as region growing, region splitting/merging and morphological watersheds are summarized. The document concludes that future work can focus on developing genetic segmentation filters using a genetic algorithm approach for medical image segmentation.
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The document summarizes previous work on mosaic image steganography and proposes using genetic algorithms and key-based random permutation to improve the technique. Mosaic image steganography hides a secret image by dividing it into fragments and embedding the fragments into a target image to create a mosaic. Previous methods required a large database of images or allowed only arbitrary target image selection. The proposed method uses genetic algorithms to generate a mapping sequence for embedding tile images without a database, improving clarity and reducing computational complexity. It also applies a key-based random permutation to the mapping sequence for enhanced security and robustness. The mosaic image can be recovered using the same key and mapping sequence, making it a lossless data hiding method.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Este documento presenta la matriz de valoración del portafolio interactivo digital y planificador de proyecto de Paola Andrea Echeverry. El proyecto se titula "Implementación de una página web de apoyo académico para las modalidades de reparación y ensamble de computadores y electricista residencial" para el grado 10-9. La matriz evalúa diversos aspectos del portafolio y planificador de proyecto como la estructura, publicación de evidencias, formulación del proyecto, planificación curricular, estrategia pedagógica, met
El documento habla sobre la independencia de Colombia de España. Menciona que un incidente conocido como "El florero de Llorente" inició el proceso de independencia. También menciona que Santander dejó la escuela para unirse al movimiento revolucionario. Finalmente, explica que la independencia permitió la emancipación de Colombia del imperio español y puso fin al periodo colonial, luego de la guerra de independencia librada en el siglo XIX.
El documento habla sobre la independencia de Colombia de España. Menciona que un incidente entre criollos y españoles conocido como el florero de Llorente inició el proceso de independencia. También dice que Santander dejó sus estudios para unirse al movimiento revolucionario. Finalmente, explica que la independencia permitió la emancipación de Colombia del imperio español y puso fin al periodo colonial tras la guerra de independencia en el siglo XIX.
This document summarizes a panel discussion on internet security and privacy ten years in the future. The panel will discuss key threats and elements that may shape security and privacy over the next decade. They will consider how approaches to security and privacy may need to change as internet technologies evolve. The panel will also explore new approaches like information-centric networking and homomorphic encryption that could potentially solve future problems. Finally, the discussion will address whether security and privacy will become more antagonistic, requiring harder trade-offs, or more cooperative over time to allow more comprehensive solutions.
Este documento presenta la matriz de valoración del portafolio interactivo digital y planificador de proyecto de la maestra María Helena Ramos Arana. La matriz evalúa diversos aspectos del portafolio y planificador de proyecto en una escala del 1 al 5, incluyendo la estructura, publicación de evidencias, formulación de objetivos, planificación curricular, estrategias pedagógicas, de evaluación y apoyo a estudiantes diferenciados. El proyecto trata sobre "El planeta Tierra mi casa" para grado quinto y recibe re
El documento presenta la matriz de valoración de un planificador de proyecto diseñado para reforzar contenidos de matemáticas en los grados 11-1 y 4-3. El planificador recibió una calificación total de 100% al abordar aspectos como la formulación del proyecto, los objetivos de aprendizaje, la planificación curricular, las estrategias pedagógicas, la metodología de proyectos y las estrategias de evaluación de manera articulada e integral.
Este documento presenta un proyecto de aula que busca desarrollar la expresión artística a través del arte pop y su aplicación en la publicidad digital. El proyecto involucra las áreas de Educación Artística, Tecnología e Informática y Práctica Empresarial en estudiantes de grado 10, durante 10 semanas. Los objetivos son que los estudiantes desarrollen su sensibilidad visual, encuentren elementos estéticos del arte pop para aplicarlos en publicidad digital, y creen un poster digital usando este estilo artí
El documento presenta la matriz de valoración de un portafolio interactivo digital y planificador de proyecto sobre papiroflexia para grados 1-3. La matriz evalúa aspectos como la formulación del proyecto y objetivos, planificación curricular, estrategia pedagógica, habilidades del siglo XXI, metodología, evaluación y oportunidades de aprendizaje. Ofrece recomendaciones para mejorar la claridad de los tutoriales para los niños.
O documento discute os "bugs de percepção" no século 21 e como as tecnologias digitais estão transformando a espécie humana em uma "tecno-espécie". Argumenta que estamos vivendo uma mudança na governança da espécie, não apenas na comunicação, e que precisamos recriar a sociedade, não apenas fazer ajustes. Também diz que a mídia social é importante pela possibilidade de criarmos colaboração em massa, não apenas por plataformas como Facebook.
OECD, 10th Meeting of CESEE Senior Budget Officials - Marta Postula, PolandOECD Governance
This presentation by Marta Postula, Poland, was made at the 10th Meeting of CESEE Senior Budget Officials held in Den Haag on 26-27 June 2014. Find more information at http://www.oecd.org/gov/budgeting/10thannualmeetingofseniorbudgetofficialsfromcentraleasternandsoutheasterneuropeanceseecountries.htm
El documento presenta los pasos para determinar los componentes de esfuerzo en una sección transversal sometida a flexión. Primero se determinan los momentos flectores y las coordenadas de los puntos de la sección. Luego, se calculan las tensiones normales y cortantes en cada punto, así como los ejes principales de tensión. Finalmente, se determinan las tensiones máximas de flexión.
OECD, 10th Meeting of CESEE Senior Budget Officials - Irena Valkova, Czech Re...OECD Governance
This presentation by Irena Valkova, Czech Republic, was made at the 10th Meeting of CESEE Senior Budget Officials held in Den Haag on 26-27 June 2014. Find more information at http://www.oecd.org/gov/budgeting/10thannualmeetingofseniorbudgetofficialsfromcentraleasternandsoutheasterneuropeanceseecountries.htm
Gabriel Eligio García Márquez el Telegrafista.Jesús Navarro
Gabriel Eligio García Martínez nació en 1901 en Sincé, Colombia. Fue hijo de Gabriel Martínez Garrido y Argemira García Paternina. Su abuelo paterno fue Gabriel Antonio Garrido, un sacerdote que construyó la iglesia de Sincé. Su abuela materna, Argemira García, tuvo siete hijos con cuatro hombres diferentes y vivió en la pobreza. Gabriel Eligio heredó la habilidad de su abuelo paterno para transmitir mensajes en largas distancias. Más tarde, Gabriel
La Real Fábrica de Tapices de Santa Bárbara es una de las manufacturas reales para la fabricación de objetos de lujo creadas por la política mercantilista de la Ilustración española. Fue fundada en el año 1720 por Felipe V, a imitación de los talleres reales franceses que seguían el modelo de Colbert, tras la interrupción de la importación de tapices flamencos tras la Paz de Utrecht, que proveían las piezas destinadas a las dependencias reales. Desde 1889 se encuentra en el barrio de Pacífico de Madrid, en un edificio construido en 1889 y 1891. En la actualidad mantiene la actividad para la que fue creada.
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images from false mistakes. The grey wolf optimizer (GWO) is used to choose the pixel’s image that would be utilized to insert the hidden image in the cover image. GWO effectively selects pixels by calculating entropy, pixel intensity, and fitness function using the cover images. Moreover, the secret image was encrypted by utilizing a proposed hyper-chaotic improved Henon map and fractal Tromino. The suggested method increases computational security and efficiency with increased embedding capacity. Following the embedding algorithm of the secret image and the alteration of the cover image, the least significant bit (LSB) is utilized to locate the tempered region and to provide self-recovery characteristics in the digital image. According to the findings, the proposed technique provides a more secure transmission network with lower complexity in terms of peak signal-to-noise ratio (PSNR), normalized cross correlation (NCC), structural similarity index (SSIM), entropy and mean square error (MSE). As compared to the current approaches, the proposed method performed better in terms of PSNR 70.58% Db and SSIM 0.999 respectively.
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image.
The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in
the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an
adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a
learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image. The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth
safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are
discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
A coverless image steganography based on robust image wavelet hashingTELKOMNIKA JOURNAL
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret data in a more secure way and to enhance the robustness against attacks. This method depends on frequency domain. The embedding process consists of several steps. Firstly, the secret data is divided into no overlapping segments. Secondly, a set of images is collected to find appropriate images to be stego images. Thirdly, to build a hash sequence for an image, a powerful hashing algorithm is used. Fourthly, for each image hash sequence, the inverted index structure is created. Fifthly, choose the image which its hash equivalent to the secret data segment. Several tests are done to measure the robustness of the proposed method. The results of the experiments reveal that the proposed strategy is resistant to a variety of image processing attacks such as joint photographic experts group (JPEG) compression, noise, low pass filtering, scaling, rotation and median and mean filter, brightness, and sharpening.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
This document proposes a new hybrid approach for improving data security and reducing the size of hidden data in image steganography. It uses three techniques: 1) Huffman encoding is applied to compress the text message, 2) DNA encryption is applied to the compressed data, and 3) a state transition algorithm is used to update the pixel locations in the cover image where bits will be hidden. The implementation and evaluation of the proposed technique shows that it provides higher security than traditional techniques like LSB, LF-DCT, and MF-DCT substitution. It is also more efficient and secure while maintaining good image quality as measured by PSNR and MSE metrics.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
An improved robust and secured image steganographic schemeiaemedu
The document summarizes an improved steganographic scheme that embeds secret data in images. It modifies an existing DCT-based scheme by embedding an "embedding map" to indicate the blocks used for concealment. The embedding map is also hidden using DWT coefficients and secured using SURF features. The proposed method aims to overcome limitations in the existing scheme like potential data loss during extraction due to changes in block energy values. Results show the scheme is robust against attacks like noise and compression while maintaining good image quality. However, capacity is still limited as only part of the image can hide the embedding map.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
1. The document discusses data hiding techniques for images, specifically uniform embedding. It reviews existing methods like LSB substitution and proposes developing a new technique to select pixels for embedding, reduce embedded text size, and increase confidentiality.
2. It surveys related work on minimizing distortion in steganography, a modified matrix encoding technique for low distortion, and designing adaptive steganographic schemes.
3. The objectives are to develop a new pixel selection technique for embedding, reduce embedded text size, and increase resistance to extraction through high confidentiality. The significance is providing a solution to digital image steganography problems and focusing on choosing pixels to embed text under conditions.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
This document summarizes a research paper that proposes a steganographic method for hiding encrypted messages in the least significant bits of image pixels. The method analyzes the cover image to determine the statistical distribution of the least significant two bits per pixel. It then encrypts the message using a chaotic Bernoulli map and selects the encrypted frame that is most statistically similar to the cover image for substitution. The full paper implements and tests the method in MATLAB, finding that substituting a more similar encrypted frame leads to better statistical properties in the resulting stego-image compared to a less similar frame.
This document discusses data hiding techniques for images. It begins by introducing steganography and some common image steganography methods like LSB substitution, blocking, and palette modification. It then reviews related work on minimizing distortion in steganography, modifying matrix encoding for minimal distortion, and designing adaptive steganographic schemes. The document proposes using a universal distortion measure to evaluate embedding changes independently of the domain. It presents a system for reversible data hiding in encrypted images that partitions the image, encrypts it, hides data in the encrypted image, and allows extraction from the decrypted or encrypted image. Least significant bit substitution is discussed as an approach for hiding data in the encrypted image.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
Similar to A new image steganography algorithm based (20)
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Zener Diode and its V-I Characteristics and Applications
A new image steganography algorithm based
1. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
DOI : 10.5121/ijnsa.2015.7203 37
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED
ON MLSB METHOD WITH RANDOM PIXELS
SELECTION
Odai M. Al-Shatanawi1
and Nameer N. El. Emam2
1
Department of Computer Science, Philadelphia University, Jordan
2
Department of Computer Science, Philadelphia University, Jordan
ABSTRACT
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
KEYWORDS
Steganography; Image segmentation; Byte characteristic.
1.INTRODUCTION
Over a year's the flow of information in the twenty and twenty one century are rapid growth of
information and the communication media using a large amount of data that exchanged over the
Internet [1]. This growth of information encourages researchers to develop security techniques
and to keep data transmission between sender and receiver safer from attackers [2].
The performance of steganography algorithms is based on many levels of security to produce
stego images (stg) with high imperceptible [3]. These levels are added to be sure that the
difficulties to extract the secret image (S) have been reached. Another factor that challenges the
security level is the amount of payload capacities in the stego image (Stg) this factor should be
calculated carefully to find the maximum number of bits from (S) that can embed into a cover
image safely and more robustness. Numbers of metrics have been applied by many researchers to
calculate error rate and brightness like mean square error (MSE), peak signal to noise ratio
(PSNR), correlation coefficient (Corr.), Chi squire ( 2
χ ), and standard deviation [4].
There are many Steganography algorithms proposed by many researchers, some of the algorithms
are very complicated due to the long time needed to hide secret data, while the others are simple
2. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
38
methods with low complexity as in LSB (Least Significant Bit) [5, 6]. Spatial and frequency
domains were used by the research to construct a steganography algorithm.
Many researchers working on frequency domain to hide secret information into JPEG images and
to provide better camouflage but the embedding rate is limited [7].
Raftari, N., Moghadam, A. (2012) [8] proposed image steganography technique that combines
the integer wavelet transformed (IWT) and discrete cosine transformed (DCT). This algorithm
was constructed to embed a secret image in a frequency domain by using Munkres' assignment
algorithm. Prabakaran et al., (2013) [9] present steganography approach in a frequency domain
using DWT technique on both secret and cover images. Motamedi, H. (2013) [10] presented a
wavelet-based method to perform image steganography in the frequency domain and utilize
image denoising algorithms by wavelet shareholding. Steganographic algorithms are in general
based on replacing noise components of a digital object to be used for hiding secret message.
In the spatial domain, the common ground of spatial steganography is directly changed the image
pixel values for hiding data. The embedding rate is often measured in a bit per pixel (bpp).
Ioannidou, A et al., (2012) [11] proposed a technique to produce image steganography, which
belongs to techniques taking advantage of sharp areas in images in order to hide a large amount
of data. Specifically, this technique is based on the edges present in an image. However, this
approach cannot increase the payload capacity when the hiding process is working on smooth
images or images with non sharp edges [12]. Hemalatha et al, (2013) [13]. Propose a method
using two secret images to hide into one cover image to produce a high quality of a stg. However,
the quality of Stg produced in this approach was not promising due to a large payload capacity
(Hong, W., et al, 2010)
El-Emam, N., Al-Zubidy, R., (2013) [14] proposed steganography algorithm to hide a large
amount of secret messages into a cover image by using four security layers. Moreover, this
algorithm presents image segmentation algorithm and intelligent technique based on adaptive
neural networks with genetic algorithm. However, this technique needs much time to produce
high imperceptible Stg through four layers of security. Li, Y. et al (2010) [15], proposed a
reversible data hiding method, Adjacent Pixel Difference (APD), which employs the histogram of
the pixel difference sequence to increase the embedding capacity. This technique is working on
gray image, and a PSNR measure is not enough to confirm the quality of Stg, in addition the
author did not mention how to work against new attackers. Zhu, Y et al., (2012) [16] provide a
general construction of steganography without any special assumptions and prove theoretically
that the construction was a computationally secure stego system against adaptive chosen hidden
text attacks. Wang et al, (2013) [17] used a reversible data hiding scheme based on histogram
shifting in the spatial domain, the embedding capacity was increased, and image quality was
enhanced by using wall and non-wall pixels. However, the author discussed the quality of image
using PSNR and SSIM measures without attention to the effect of statically attack measures.
In this paper, we proposed new image steganography algorithm based on different size image
segmentations (DSIS) and modified least significant bits (MLSB). The new hypothesis has been
applied to measure byte characteristics and to fix the number of bit to be hide in the cover image.
The rest of the paper is structured as follows: In the section two, preliminary and definitions have
been introduced to explain the theoretical concepts of steganography notations. The proposed
steganography algorithm based on MLSB technique with new image segmentation has been
presented in the section three. The prototype implementations are shown in the section four. The
3. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
39
simulation results with their comparisons are presented in section five. Finally, the conclusion has
been appeared in the section six.
2. PRELIMINARY AND DEFINITIONS
Some theoretical background to embed data into digital image has been introduced in this section
to show how to improve three common requirements, (i) the security, (ii) the capacity, (iii) and
the imperceptibility [18]. The performance of steganographic techniques is needed to confirm the
security level with high payload and to demonstrate how to develop and implement the proposed
technique to guarantee the authenticity of digital media. In Figure 1, the proposed steganography
architecture has been constructed in this paper; it appears that we have two sides, the embedding
and the extracting sides. In the first side, the embedding algorithm accepts three sets; these sets
are: a set of non-uniform segments, a set of cover bytes, and set of integer values that represent
the number of bit to be hiding at each pixel (NBTH). However, a set of non-uniform segments
have been constructed by using DSIS algorithm while the set of NBTH have been estimated using
new hypothesis based on byte characteristics. The output signals of the first side are a set of stego
bytes Stg with high payload capacity and high imperceptible. In the second side, the system
accepts the essential parameters as the input signals that represents a set of stego bytes and cipher
key, whereas the output signal of this side is the set secret bytes S.
4. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
40
Figure1: The proposed steganography architecture
The definitions of the main components in the proposed algorithm have been discussed in the
following:
An image compression is promising to save the storage and the time, in the proposed algorithm,
we select lossless image compression approach based on set of partitions in hierarchal tree
(SPIHT) algorithm [19, 20, 21]. The SPIHT method it provides lossless images.
5. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
41
The AES algorithm has been applied to encrypt a compressed secret image. This algorithm is
hard to crack, and it is well suitable to increase the security service in the applications. Moreover,
AES algorithm needs low memory requirement and fast for the encryption process, so it is
particularly well-suited to be used for the hiding algorithm [22].
Definition 3: Let image segmentation function define in the map SSKI:CDSIS →× , where
DSIS is the different size image segmentation algorithm, I is a cover or stego image, SS is the set
of segments , each segment (Seg) is represented by segment’s location using (x and y )
coordinates with segments’ edges ( Rs,X and Rs,Y ) at the raster R, see Eqs. (2,3).
The purpose of using DSISC is to divide a cover image C into set non-uniform segments SSeg
and to scatter the secret bits on the segments, see Figure 2.
Figure 2: Non-Uniform image segmentation
Definition 4: The embedding function (EM) is represented in the map
StgCESSC:EM S →×× and it bases on byte characteristic assessment in a cover image C (to
compute a number of bits to be hiding NBTH) , set of segments SS, and a secret image's
compression and encryption SCE ; see section 3.
Definition 5: The extraction function (EX) is represented in the map SCESSStg:EX →× and
it bases on byte characteristic assessment on stego image Stg to compute NBTH for each byte at
each color and a set of segments SS, see section 3.
Definition 6: Image decryption is defined in the map SCS CCE:IDcry S
→× l
Definition 7: Data decompression function DEC defines in the map SC:DEC S → , where
the function domain contains a compressed secret image SC , while the function range contains a
secret image after decompression S.
Definition 8: Let (NB) represents the set of eight neighboring bytes around the target byte
(TB) [23], see Eq.(1). The locations of NB are illustrated in the Figure3.
6. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
42
( ) ( ) jrthenisifthatsuchTBNBTBNB
1i
1is
1j
1jr
j,is,rj,i ≠==
+
−=
+
−=
U U (1)
Figure 3: Eight neighbour bytes
3.STEGANOGRAPHY ALGORITHM BASES ON MLSB
TECHNIQUE
The proposed new steganography algorithm follows a set of rules to guide us to create a stego
image Stg that produces after embedded secret image S into a cover image C. In the other hands,
we implement an extraction rules to reconstruct a secret image S. In Figure1, we show the main
components that are used to implement hiding/ extracting processes, where the proposed
steganography algorithm (sender side) is based on two parts. The first part aims to construct
different size image segmentations (DSIS) from cover image to scatter secret data randomly,
while the second part aims to build an effective approach to embed a secret image into a cover
image with high imperceptible to works against attacks under high payload.
3.1 Image segmentation algorithm:
Image segmentation is the process that uses to partition cover image into a set of sub images
depending on a new hypothesis. Different methods proposed by many researchers had been
implemented to achieve image segmentation based on the value of intensity, similarity, and
variance between neighboring bytes. In the proposed algorithm, the hypothesis that is created is
based on cipher key with three operations to make hard to detect the segments edges from the
attacker.
In Figure 4 we explain the proposed image segmentation based on partitioning a cover image into
different segments' sizes. This cover image contains three layers red, green and blue; each layer
has a two-dimensional array ( CC HW × ) where CW and CH are the width and the height of a
cover image C respectively.
The size of segment (s) is based on two variables, the first is variable is a length of width of
segment s represented by ( Rs,X ), whereas the second variable is a length of height of segment s
represented by Rs,Y , see Eq. (2-3). The cipher key K has been used to generate Rs,X and Rs,Y
for each segment. We believe that image segmentation is an excellent approach to work against
attack by hiding secret message randomly and reduced the possibility for detection with
probability
SS
1
where SS is the number of segments in a cover image.
7. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
43
Figure 4: Using non-uniform image segmentation base on DSIS algorithm
The size of each segment s at each raster R is equal to R,sR,s YX × , where R,sX and R,sY are
calculated using Eqs.(2-3).
h
h
+
= C
R,s
W
X (2)
D
D
+
++
=
BAH
Y C
R,s (3)
where h is equal to ( ) ( )( )CStrBStrVal + (the decimal value of the concatenation of B and C
strings) and D is equal to ( ) ( )( )BStrAStrVal + (the decimal value of the concatenation of A
and B strings) , where Str(.) function is the convertor from decimal to string value whereas
Val(.) function is the convertor from string to decimal value. In addition, the variables A, B, and
C are calculated using Eqs. (4-6).
=
100
F
A (4)
×−
=
10
100AF
B (5)
( ) ( )( )10B100AFC ×−×−= (6)
where F is define in the Eq. 7.
( )( )r
SMStrValF −ℵ= (7)
Such that ℵis the constant equal to 300, ( )r
SM is reversed order of MS. and MS is defined in
the Eq. 8.
8. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
44
( ) SS,...,1sKValM SS =∀= (8)
The size of Rs,Gap shown in Figure 4 and it is appeared under the segment s at raster R is
calculated using Eqs. (9).
)Y-)(Ymax(XGap Rs,Ri,
Rin)i(index
segment
Rs,Rs,
∀
×= (9)
The necessary conditions that should be reach is ( )( )
=∧= ∑∑ ∀
∀
∀
c
Rins
R,s
s
c
Rins
R,s HYmaxWX
The proposed segmentation algorithm (DSIS) is constructed to calculate the size of each segment
conformity according to the following steps:
Algorithm1: Image segmentation DSIS
Step1: Input K, Cover image C and ℵ;
Step2: For each color in C; // { }B,G,Rcolor∈ .
Step3: For each raster R in the C;
Step 3-1: For each segment s in the raster R;
Step 3-1-1: Compute MS ; // Using Eq.(8).
Step 3-1-2: Compute F; // Using Eq. (7).
Step 3-1-3: Compute A; // Using Eq. (4).
Step 3-1-4: Compute B; // Using Eq. (5).
Step 3-1-5: Compute C; // Using Eq. (6).
Step 3-1-6: Compute Rs,X ; // Using Eq. (2).
Step 3-1-7: Compute Rs,Y ; // Using Eq. (3).
Step 3-1-8: Compute Rs,Gap ; // Using Eq. (9).
End; // foreach segment s.
End; // foreach raster R.
End.// End Algorithm1
The time complexity measure of DSIS is defined using “Big- O” notation, where the time
required for each segment is defined in Eq. (10):
O(7))T(Y)T(XT(C)T(B)T(A)T(F)T(Ms)TimeSeg sss ≈++++++= (10)
Moreover, the time required for all segments for all coloris define in Eq. (11):
( )SS21O)SS3O(7)SS3O(TimeSeg)SS,T(TimeSeg ss ×≈××≈××= (11)
3.2 Byte characteristic assessment in the embedding algorithm:
Bytes' characteristics have been used in the proposed algorithm to find a number of bit(s) to
embed secret bit(s) at each byte for each color in a cover image, these secret bits are hidden
without any suspicion form steganalysis for both visual and statically attacks [ 23 , 25]. The
proposed algorithm depends on the variance measure of the target byte ( j,iTB ) and its eight
9. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
45
neighbored byte ( NB ) , where the embedding process is based on scanning bytes from the upper
left to the lower right of a cover image.
In this work, we apply byte value reduction function ().BVR to damp byte intensity from (0-
255) to (1-16), see Eq. (12). The benefits of using sixteen levels instead of 265 levels are to
reduce the number of classification levels of each byte and the calculation of the variance for each
byte should be faster [14].
( )
+= 1
16
byte
byteBVR j,i
j,i (12)
where j,ibyte represents a target byte j,iTB at the location (i, j) or neighbored bytes NB . Where
the surrounding bytes ( )j,iTBNB around the j,iTB are defined in the set:
( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ){ }j,i1j,1ij,i1j,ij,i1j,1ij,ij,1ij,ij,1ij,i1j,1ij,i1j,ij,i1j,1i TBNB,TBNB,TBNB,TBNB,TBNB,TBNB,TBNB,TBNB ++++−+−−+−−−
Figure 5: the BVR (.) of the target byte (TP) and the eight neighbour bytes (NB)
New hypothesis has been proposed based on variance calculation between target bytes TB,
and its eight neighbored bytes see Eq. (13). This hypothesis has been used to calculate a number
of bits to be hide (NBTH),
( )( )
( )( ) ( )( )( )
[ ] [ ]
{ } { }
∈∀∨∈∀
−∈∀∨−∈∀
×
σ∪σ
σ
= ∀
CC
CC
7.1
j,ir,s
r,s
2
j,i
2
j,i
2
j,i
H,1jW,1i4
1H,2j1W,2i6.0
TBNBBVRTBBVRmaxarg
TBBVR
EXP
NBTH
(13)
where 2
σ is the variance value of the target byte BVR(TB) and its neighbor eight bytes
BVR(NB) , the value of these bytes are changed based on byte value reduction (BVR) to extract
the high nibble of the byte that are not used by the hiding algorithm. The value of j,iNBTH is in
the range [1,4] and the proposed hypothesis checks the variations between the target byte and its
surrounding eight bytes to estimate a number of bits to be replaced.
10. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
46
In general, steganography algorithm contains two parts; the first part is the sender that contains
the embedding algorithm based on (.)EM function while the second part is the receiver that
contains the extracting algorithm based on (.)EX function [26].
The proposed embedding algorithm EM (.) is based on MLSB and it includes the following steps:
Algorithm2: Embedding algorithm.
Step 1: Input Cover image (C), cipher key (K) and Secret image (S).
Step 2: Apply )I,Uˆ,Uˆ,S(Comp mSm
(
function to produce SC ; // see definition 1.
Step 3: Apply ),C(IEncry SCS l function to produce SCE ; // see definition 2.
Step4: For each color in C;
Step4-1: Apply )K,C(CDSIS function to produce non uniform segments Stg by
calculating YandX Rs,Rs, ; // see definition 3 and Eqs. (2-9).
Step4-2: Call Byte_Characteristic(.) to find NBTH; // see Sub-Algorithm2.
Step4-3: Perform embedding function EM(C, SS, SCE ) of the secret image’s compression
and encryption ( SCE ); // see definition 4.
Step 5: Send Stg image to insecure channel;
End. //End Algorithm2
Sub-Algorithm2 // Set the intensity of each byte in the range (1, 16) and then find j,iNBTH
for each byte at each color; see Eq. (13)
Byte_Characteristic( NBTH ) {
// scanning all bytes for all segment at each color in a cover image
For each color in C
For each segment sSeg
For each byte B
Calculate BBVR ; // using Eq. (12).
Calculate NBTHB ; // using Eq. (13).
End. // for each segment set.
End. // for each segment set.
End. //for each color.
}// end sub-algorithm2.
Algorithm3- Extraction algorithm
Step1: Input Stg image and the K that are received from the insecure channel;
Step2: For each color in Stg;
Step2-1: Applying )K,Stg(CDSIS to find the edges of each segment SSeg by
calculating YandX Rs,Rs, ; // see Eq.(2-3).
Stp2-2: Scan all bytes in Stg image and calculate NBTH; // Eq.(13).
11. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
47
Step2-3: Apply EX function EX( Stg , SS) for all bytes depending on byte characteristics to
produce SCE ; // see definition 5.
Step3: Apply )CE(IDcry SCS l× function to produce SC ; // see definition 6.
Step4: Apply )C(DEC S function to find a secret image S; // see definition 7.
End. // End Algorithm3
The "big-O" notation has been applied to measure time complexity for data embedding (EM)
and data extraction (EX), time complexity is defined in Eq. (14).
( )∑ ∑ ∑= =
×
=
∀∀
∀∀
×××≈==
3
1color
SS
1S
)YX(max
1byte
R,sR,s
R,s
R,sR,s
R,s
YXmaxSS3OMLSB)EX(T)EM(T (14)
4. IMPLEMENTATION
The implementation of the proposed embedding algorithm has been applied by using MLSB on
three colors to hide a secret image. We can hide one to four bit(s) depending on the value of
NBTH by using Eq. (13). In Figure 6, we applied the proposed embedding algorithm on selective
cover image (F16) since the difference in byte characteristics has been shown on three colors.
Figure 6: Find a number of bits to be replaced for each byte and at each color (R, G, B) with the embedding
process
Furthermore, the proposed steganography algorithm calculates the value of NBTH for each color
to minimize the distortion on stego image [27]; it appears that the read color has a highest value
of NBTH equal to four due to large variance between the TB and the surrounding NBs while the
blue color has the lowest value of NBTH equal to one due to small variance between TB and the
surrounding NBs.
5. RESULTS AND DISCUSSIONS
The proposed algorithm using modified LSB has been implemented using MATLAB
environment. The performance of the proposed approach has been studded using different kinds
of measures like (amount of payload capacity, PSNR, MAE, AD, and NCC).
12. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
48
To confirm the performance of the proposed approach, we apply the proposed algorithm on more
than 200 images from ((BOSS base version. 0.92) database. In this section we display the results
using four testing color images, these are: (Lena, F16, Baboon, Peppers and Tiffany), see Fig 7.
Figure 7: Five testing images.
The quality of stego image stg has been studded using peak signals to noise ratio (PSNR), see
Eq.(15).
( )
×=
avg
2
MSE
255
log10PSNR
(15)
where avgMSE is the average of MSE for three colors (R, G, B).
3
MSEMSEMSE
MSE BGR
avg
++
=
(16)
In Table 1, we display the value of PSNR for the stego image Stg after hiding the secret image's
compression and encryption.
Table 1: Calculate PSNR values Eq.(15) for different cover and
secret images size (256*256).
Cover
image
(256*256)
Channels
(R,G,B)
Secret
Image
(256X256)
PSNR of
the
Proposed
Algorithm
Lena
Red-1
F16
43.436
Green-2 43.2875
Blue-3 43.462
All 43.39
Lena
Red-1
Baboon
43.6466
Green-2 43.5839
Blue-3 43.6
All 43.61
F16
Red-1
Lena
44.0967
Green-2 44.0845
Blue-3 44.56
All 44.2470
13. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
49
We observed that PSNR of the tested images using the proposed hiding algorithm has a
maximum average able to (44.2470 dB) when the cover image is (F16), and the secret image is
(Lena), while the minimum average is equal to (43.39 dB) when the cover image is (Lena), and
secret image is (F16). Moreover, the results illustrated that blue channels have the maximum sum
of PSNR equal to (131.622 dB) while the green channels have the minimum sum of PSNR equal
to (130.9559 dB) about 0.5319% less than the blue channel. However, the result indicates that the
amount of secret data into the green channel should be reduced to avoid perceptible of secret
image by attackers.
The variances of cover and the stego images (F16) have been shown the Figure 8 when the secret
image is Lena. Histograms in Figure 8 (a) and (b) refer to the variance of the cover and stego
images respectively using red channel, whereas histograms in Figure 8 (c) and (d) refer to the
variance of the cover and stego images respectively using Green channel and histograms in
Figure 8 (e) and (f) refer to the variance of the cover and stego images respectively using blue
channel.
Figure 8: Histograms of different layers of the cover image and the corresponding stg image. (a) And (b)
for red channel. (c) And (d) for the green channel. (e) And (f) for the blue channel.
In addition, the histograms in Figure 8 show that the matching between cover and stego images
has been satisfied at the red channel while the noise are appeared at stego image in the blue
channel.
Table 2 shows the PSNR values for different payload percentages on the F16 as the cover image.
It appears that the percentage of the payload (amount of bits to be hidden) have highest PSNR at
the payload percentage equal to 10%. In addition, the results appear that PSNR value is decreased
when the payload percentage has been increased, where the percentage of PSNR has been
reduced about 9.63% for the payload percentage equal to 20% and has been reduced about
12.87% for the payload percentage equal to 30% and has been reduced about 16.93% for the
payload percentage equal to 50%.
14. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
50
Table 2: PSNR OF Stg image with different payload
Cover image Payload 10% Payload 20%
Payload
30%
Payload
50%
F16 53.43db 48.28db 46.55db 44.38db
In Table 3, a comparative study with other researchers has been taken up with the same
circumstances (same cover images, same secret images, and same image size). These
comparisons are applied between the proposed approach and the two previous according to the
value of PSNR. The results confirm obviously that the proposed method is more secure and
preserved secret information than the other steganographic schemes. It appears that the average
of three stego images in the proposed approach is better than (EL-EMAM, N. 2013) [14] and
(Chang, C., 2008) [28] about 11.23% and 14.42% respectively.
Table 3: Comparison with other researcher works
Cover image
(512 X 512)
Channels
(R,G,B)
Secret
image
PSNR
(Chen.
2008)
[28]
PSNR
EL-EMAM,
N. 2013
[14]
The
Proposed
algorithm
The Percentage to improve the
other works
EL-EMAM,
2013
[14]
Chen.
2008
[28]
Lena
Red
Peppers
37.97 39.01 42.97
8.12% 10.28%
Green 37.87 39.42 42.94
Blue 39.78 39.98 43.05
All 38.54 39.47 42.96
F16
Red
Lena
36.32 37.45 44.88
15.33% 19.02%
Green 35.55 37.12 44.95
Blue 37.43 39.71 45.14
All 36.43 38.09 44.99
Baboon
Red
Tiffany
37.39 39.21 42.45
10.24% 13.96%
Green 36.38 37.98 42.4
Blue 35.85 37.17 42.57
All 36.54 38.12 42.47
In Table 4, the performance of the proposed algorithm has been checked using five measures;
these measures have been discussed through the PSNR, see Eq. (15), the mean absolute error
(MAE), see Eq. (17 ), the average difference (AD), see Eq. (18), and normalized cross
correlation (NCC), see Eq. (19).
∑∀∀
−
×
=
j,i
j,ij,i
CC
StgC
HW
1
MAE (17)
∑∑= =
−
×
=
C CW
1i
H
1j
j,ij,i
Cc
StgC
HW
1
AD (18)
( )( )( )
( ) ( )
5.0
t,r
2
t,r
2
t,r
t,r
t,rt,r
StgStgww
StgStgCC
)Stg,C(NCC
−−
−−
=
∑
∑
∀∀
∀∀
(19)
15. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
51
where C is the mean of cover image while j,iStg is the mean of stego image.
Table 4: Check the performance of the proposed algorithm through
different measures
Cover
image
Channels
(R,G,B)
Secret
image
PSNR Payload NCC AD MAE
Lena
Red
F16
43.436 100648 0.9986 0.2563 0.0057
Green 43.2875 102521 0.9976 0.2586 0.0107
Blue 43.462 101424 0.9976 0.2582 0.0097
All 43.39 304593 0.9979 0.2577 0.0087
Lena
Red
Baboon
43.6466 100648 1 0.0211 0.0056
Green 43.5839 102521 0.999 0.0209 0.0105
Blue 43.6 101424 0.999 0.0098 0.0096
All 43.61 304593 0.9993 0.0172 0.0085
F16
Red
Lena
44.0967 91715 0.999 0.1708 0.005
Green 44.0845 90258 0.9991 0.173 0.0049
Blue 44.56 89561 0.9993 0.1451 0.0045
All 44.2470 271534 0.999 0.1629 0.0048
The experimental results in Table 4 have been considered on many color images to check the
performance using the largest amount of payload capacity. The results illustrate that the quality of
stego image Stg has been reached according to those measures. In addition, results show that the
high quality has been reached when AD and MAE are small, PSNR is large and NCC tends to
one. Therefore, when the stego image is Lena and the secret image is Baboon the relative quality
in the maximum, while when the stego image is Lena and the secret image is F16, the relative
quality in the minimum. Moreover, the results show that the payload capacities for three stego
images are different; they appear that the stego image Lena that holds Baboon or F16 as secret
images is better than the stego image F16 that holds Lena secret image about 10.85%.
6. CONCLUSIONS
This paper presented a description of a new steganography algorithm. The algorithm is employed
effectively over an insecure channel and working against attacks by producing high imperceptible
steg images for both low and high payload. The proposed steganography algorithm bases on
many components, these components are:
i) DSIS algorithm to generate set of non-uniform segments. These segments are employed
to hide a secret image randomly instead of sequentially. This approach can decrease the
probability of detection to (
SS
1
).
ii) Using DWT to get a high lossless compression ratio to increase the amount of the
secret image that can be sent [29].
iii) Apply advanced encryption standard (AES) to make a secret image unreadable by
attackers.
16. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
52
iv) Modified the traditional LSB to embed more than one bit for each byte with high
imperceptible. The aim of MLSB to increase the payloads and to improve the security.
The proposed approach justifies the security according to experimental results shown in this
paper.
ACKNOWLEDGMENTS
The authors would like to thank Prof. R. H. Al-Rabeh from Cambridge University for his
supported and help. This support is gratefully acknowledged.
REFERENCES
[1] Abduallah, W. M., Rahma, A. M. S., Pathan, A. S. K. (2014). Mix column transform based on
irreducible polynomial mathematics for color image steganography: A novel approach. Computers &
Electrical Engineering, 40(4), 1390-1404.
[2] Fridrich, J., Kodovsky, J. (2012). Rich models for steganalysis of digital images. Information
Forensics and Security, IEEE Transactions on, 7(3), 868-882.
[3] Ganesan, P., Bhavani, R. 2013. A High secure and robust image steganography using dual wavelet
and blending model. Journal of Computer Science, 9(3).
[4] Rashid, M. K. R., Missen, S., Rashid, A., |(2014). Robust Increased Capacity Image Steganographic
Scheme. Transformation, 5(11).
[5] Khalind, O., Aziz, B. (2014). Detecting 2LSB steganography using extended pairs of values analysis.
Published in SPIE Proceedings Vol. 9120 Mobile Multimedia/Image Processing, Security, and
Applications: (pp. 912003-912003). International Society for Optics and Photonics. doi:
10.1117/12.2048880
[6] Juneja, M., Sandhu, P. S. (2014). Improved LSB based Steganography Techniques for Color Images
in Spatial Domain. IJ Network Security, 16(4), 366-376.
[7] Andriotis, P., Oikonomou, G., Tryfonas, T. (2013). JPEG steganography detection with Benford's
Law. Digital Investigation, 9(3), 246-257.
[8] Raftari, N., Moghadam, A. M. E., (2012). Digital Image Steganography Based on Assignment
Algorithm and Combination of DCT-IWT. InComputational Intelligence, Communication Systems
and Networks (CICSyN), 2012 Fourth International Conference on (pp. 295-300).
[9] Prabakaran, G., Bhavani, R., Kanimozhi, K. (2013). Dual transform based steganography using
wavelet families and statistical methods. In Pattern Recognition, Informatics and Mobile Engineering
(PRIME), 2013 International Conference on (pp. 287-293).
[10] Mohammadi, F. G., Abadeh, M. S. (2014). Image steganalysis using a bee colony based feature
selection algorithm. Engineering Applications of Artificial Intelligence, 31, 35-43.
[11] Ioannidou, A., Halkidis, S. T., Stephanides, G. (2012). A novel technique for image steganography
based on a high payload method and edge detection.Expert Systems with Applications, 39(14),
11517-11524.
[12] Hong, W., Chen, T. S., Chang, Y. P., Shiu, C. W. (2010). A high capacity reversible data hiding
scheme using orthogonal projection and prediction error modification. Signal Processing, 90(11),
2911-2922.
[13] Hemalatha, S., Acharya, U. D., Renuka, A., Kamath, P. R. (2013). A secure and high capacity image
steganography technique. Signal & Image Processing, An International Journal, 4(1), 83-89.
[14] El-Emam, N., Al-Zubidy, R., (2013). New steganography algorithm to conceal a large amount of
secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm.
Journal of Systems and Software, 86(6), 1465-1481, Elsevier.
[15] Li, Y. C., Yeh, C. M., Chang, C. C. (2010). Data hiding based on the similarity between neighbouring
pixels with reversibility. Digital Signal Processing, 20(4), 1116-1128.
[16] Zhu, Y., Yu, M., Hu, H., Ahn, G. J., Zhao, H., (2012). Efficient construction of provably secure
steganography under ordinary covert channels. Science China Information Sciences, 55(7), 1639-
1649.
17. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
53
[17] Wang, X. T., Chang, C. C., Nguyen, T. S., Li, M. C., (2013). Reversible data hiding for high quality
images exploiting interpolation and direction order mechanism. Digital Signal Processing, 23(2), 569-
577.
[18] Thai, T. H., Retraint, F., Cogranne, R., (2014). Statistical detection of data hidden in least significant
bits of clipped images. Signal Processing, 98, 263-274.
[19] Dubey, V., Dubey, R. (2013). A new Set Partitioning in Hierarchical (SPIHT) Algorithm and
Analysis with Wavelet Filters. International Journal of Innovative Technology and Exploring
Engineering, 3(3), 125-128.
[20] Reddy, K. S. N., Reddy, B. R. S., Rajasekhar, G., Rao, K. C., (2012). A Fast Curvelet Transform
Image Compression Algorithm using with Modified SPIHT.International Journal of Computer
Science and Telecommunications, 3(2), 1-8.
[21] Chowdhury, M. M. H., Khatun, A. (2012). Image Compression Using Discrete Wavelet Transform.
IJCSI International Journal of Computer Science Issues,9(4).
[22] Shingote, P. N., Syed, A., Bhujbal, P. M., (2014). Advanced Security Using Cryptography and LSB
Matching Steganography. IJCER, 3(2), 52-55.
[23] De Kok, R. (2012). Spectral Difference in the Image Domain for Large Neighborhoods, a GEOBIA
Pre-Processing Step for High Resolution Imagery.Remote Sensing, 4(8), 2294-2313.
[24] Kanan, H. R., Nazeri, B. 2014. A novel image steganography scheme with high embedding capacity
and tunable visual image quality based on a genetic algorithm. Expert Systems with Applications,
41(14), 6123-6130.
[25] Motamedi, H., Jafari, A. (2012). A new image steganography based on denoising methods in wavelet
domain. In Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
(pp. 18-25).
[26] Al-Bahadili, H. (2013). A Secure Block Permutation Image Steganography Algorithm. Submitted to
the International Journal on Cryptography and Information Security. 3(3), 11-22.
[27] Filler, T., Judas, J., Fridrich, J. (2011). Minimizing additive distortion in steganography using
syndrome-trellis codes. Information Forensics and Security, IEEE Transactions on, 6(3), 920-935.
[28] Chang, C., Lin, C., Fan, Y., (2008). Lossless data hiding for color images based on block truncation
coding. Pattern Recognition 41, 2347–2357, Elsevier.
[29] Jayprkash, A., Vijay, R. (2013). Compression of MR Images Using DWT by Comparing RGB and
YCbCr Color Spaces. Journal of Signal and Information Processing, 4, 364.
Authors
Odai M. Al-Shatanawi: He received the B.S. degree in computer science from the AOU,
Amman, Jordan, in 2006, and the M.S. degree in computer science from Philadelphia
University, Amman, Jordan, in 2015. He has CCNA certified. His current research interest
is computer security using steganography.
Nameer N. EL-Emam: He completed his PhD with honor at Basra University in 1997. He
works as an assistant professor in the Computer Science Department at Basra University.
In 1998, he joins the department of Computer Science, Philadelphia University, as an
assistance professor. Now he is an associated professor at the same university, and he
works as a chair of computer science department and the deputy dean of the faculty of
Information Technology, Philadelphia University. His research interest includes Computer Simulation with
intelligent system, Parallel Algorithms, and Soft computing using Neural Network, GA, ACO, and PSO for
many kinds of applications like Image Processing, Sound Processing, Fluid Flow, and Computer Security
(Seteganography).