Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
Now-a-days many encryption algorithms have been proposed for network security. In this
paper, a new cryptographic algorithm for network security is proposed to assist the
effectiveness of network security. Here symmetric key concept instead of public key is
considered to develop the encryption – decryption algorithm. Also, to give more security in the
algorithm, the idea of one way function alongwith Newton’s method is applied as a secret key to
the proposed work as well as Digital Signature Standard (DSS) technology is used to send the
key. Moreover, steganography is used to hide the cipher within a picture in encryption
algorithm. In brief, a numerical method based secret key encryption – decryption algorithm is
developed using steganography to enhance the network security.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
Abstract - About 70% people of India are living in rural areas and are still dependent on Agriculture. Therefore transformation of the Agriculture through technology is quite important in today India’s Agriculture system. In olden days formers in India used to depend on clouds for rains, but today they are looking towards Cloud Computing where they are getting knowledge for cultivation of better crops, Expert advice for crop diseases and causes, Interactive learning service, Dynamic storage service, real time question answering service and many more in a nominal cost. With the evolution of cloud computing and its subsequent popularity, the service providers are coming up with very easy and affordable solution for our farmers. Just our farmers need to register with service provider like CloudCow and to pay for the agri services they got from service provider. In this study we proposed an Agri cloud model for rural Indian farmers, so that they can opt digital farming through cloud computing for better productivity of their agriculture products and to improve their life’s.
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
Abstract -Computer vision is a dynamic research field which involves analyzing, modifying, and high-level understanding of images. Its goal is to determine what is happening in front of a camera and use the facts understood to control a computer or a robot, or to provide the users with new images that are more informative or esthetical pleasing than the original camera images. It uses many advanced techniques in image representation to obtain efficiency in computation. Sparse signal representation techniqueshave significant impact in computer vision, where the goal is to obtain a compact high-fidelity representation of the input signal and to extract meaningful information. Segmentation and optimal parallel processing algorithms are expected to further improve the efficiency and speed up in processing.
More Related Content
Similar to A Review on - Data Hiding using Cryptography and Steganography
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
Now-a-days many encryption algorithms have been proposed for network security. In this
paper, a new cryptographic algorithm for network security is proposed to assist the
effectiveness of network security. Here symmetric key concept instead of public key is
considered to develop the encryption – decryption algorithm. Also, to give more security in the
algorithm, the idea of one way function alongwith Newton’s method is applied as a secret key to
the proposed work as well as Digital Signature Standard (DSS) technology is used to send the
key. Moreover, steganography is used to hide the cipher within a picture in encryption
algorithm. In brief, a numerical method based secret key encryption – decryption algorithm is
developed using steganography to enhance the network security.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Similar to A Review on - Data Hiding using Cryptography and Steganography (20)
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
Abstract - About 70% people of India are living in rural areas and are still dependent on Agriculture. Therefore transformation of the Agriculture through technology is quite important in today India’s Agriculture system. In olden days formers in India used to depend on clouds for rains, but today they are looking towards Cloud Computing where they are getting knowledge for cultivation of better crops, Expert advice for crop diseases and causes, Interactive learning service, Dynamic storage service, real time question answering service and many more in a nominal cost. With the evolution of cloud computing and its subsequent popularity, the service providers are coming up with very easy and affordable solution for our farmers. Just our farmers need to register with service provider like CloudCow and to pay for the agri services they got from service provider. In this study we proposed an Agri cloud model for rural Indian farmers, so that they can opt digital farming through cloud computing for better productivity of their agriculture products and to improve their life’s.
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
Abstract -Computer vision is a dynamic research field which involves analyzing, modifying, and high-level understanding of images. Its goal is to determine what is happening in front of a camera and use the facts understood to control a computer or a robot, or to provide the users with new images that are more informative or esthetical pleasing than the original camera images. It uses many advanced techniques in image representation to obtain efficiency in computation. Sparse signal representation techniqueshave significant impact in computer vision, where the goal is to obtain a compact high-fidelity representation of the input signal and to extract meaningful information. Segmentation and optimal parallel processing algorithms are expected to further improve the efficiency and speed up in processing.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
Abstract: The amount of information stored in the form of digital has a gigantic growth in this electronic era. Extraction of heterogeneous entities from biomedical documents is being a big challenge as achieving high f-score is still a problem. Text Mining plays a vital role for extracting different types of entities and finding relationship between the entities from huge collection of biomedical documents. We have proposed hybrid approach which includes a Dictionary based approach and a Rule based approach to reduce the number of false negatives and the Random Forest Algorithm to improve f-score measure.
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
Abstract-Due to scaling in recent trends in modern semiconductor industries, critical instance such as voltage spikes, temperature, interlink between IC circuits has been improvised under the design. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. We introduced the fuzzy logic based asynchronous NoC to attain the high throughput and diminish the delay between the inter logic circuits aim to select the less congested paths to produce load balance in the network especially under realistic traffic loads. Our Fuzzy logic based routing algorithm is an adaptive, low cost, and scalable. It outperforms against different adaptive routing algorithms in the average delay and saturation throughput for various traffic patterns. STDR can achieve up to 12%–32% average message delay lower than that of other routing algorithms. Moreover, the proposed scheme yields improvements in saturation throughput by up to 11%–82% compared with other adaptive routing algorithms
Abstract - A password is a sequence of characters used to determine whether the user is authenticated or not. Nowadays most of the password is text-based. Since text based password is hard to remember people try to use simple memorable password such as pet names, phone number, etc. which are easy to break by intruders. The main idea behind the paper is to replace the text-based passwords by image based password and encrypt using RSA algorithm. Our experimental result shows that image passwords are easy to remember, better than the text.
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
Abstract: Contemporary custom in education encourages students to gain exposure in the real world through student visits (field visits) to sites in count to conventional textbooks and lectures. This disclosure helps students to experience real world situations and integrate this experience into knowledge learned in class. This is important to students in various disciplines such as engineering, architecture and transportation. Students, however, have limited on-site access due to issues related to safety concerns, cost and effort. In an attempt to address such issues, Virtual Reality (VR) applications have been developed and implemented. With the growth in the number of VR applications, there is currently a lack of information about the design issues of VR applications from the standpoint of integrating different types of information associated with the real world. This paper aims to bridge this gap by evaluating VR applications with respect to these issues and highlights the lessons learned from the appropriate evaluations. The results demonstrate that VR application, which links different sources of information (as developed in this paper), promotes better learning than conventional printed materials and that students professed it positively as a precious complement to a physical field visit. The design recommendations for the development of similar VR learning applications are further discussed in this paper.
Smart Security For Data Sharing In Cloud ComputingMangaiK4
Abstract-- In these computational world security is the major Problem. Because the hackers are growing day by day. Here majorly attacker’s attacks mostly while sharing or sending the data. So here we are using PAAS i.e. windows azure as the storage which is one of the service in cloud. So to provide the security for the data here we come up with an RSA (encryption and decryption) algorithm. This is one of the security mechanism to protect the private data over the cloud.
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
Abstract - Detection of software bugs and its occurrences, repudiation and its root cause is a very difficult process in large multi threaded applications. It is a must for a software developer or software organization to identify bugs in their applications and to remove or overcome them. The application should be protected from malfunctioning. Many of the compilers and Integrated Development Environments are effectively identifying errors and bugs in applications while running or compiling, but they fail in detecting actual cause for the bugs in the running applications. The developer has to reframe or recreate the package with the new one without bugs. It is time consuming and effort is wasted in Software Development Life Cycle. There is a possibility to use graph mining techniques in detecting software bugs. But there are many problems in using graph mining techniques. Managing large graph data, processing nodes with links and processing subgraphs are the problems to be faced in graph mining approach. This paper presents a novel algorithm named BugLoc which is capable of detecting bugs from the multi threaded software application. The BugLoc uses object template to store graph data which reduces graph management complexities. It also uses substring analysis method in detecting frequent subgraphs. The BugLoc then analyses frequent subgraphs to detect exact location of the software bugs. The experimental results show that the algorithm is very efficient, accurate and scalable for large graph dataset.
Motion Object Detection Using BGS TechniqueMangaiK4
Abstract--- The detection of moving object is an important in many applications such as a vehicle identification in a traffic monitoring system,human detection in a crime branch.In this paper we identify a vehicle in a video sequence.This paper briefly explain the detection of moving vehicle in a video.We introduce a new algorithm BGS for idntifying vehicle in a video sequence.First, we differentiate the foreground from background in frames by learning the background.Then, the image is divided into many small nonoverlapped frames. The candidates of the vehicle part can be found from the frames if there is some change in gray level between the current image and the background.The extracted background subtraction method is used in subsequent analysis to detect a vehicle and classify moving vehicle
Encroachment in Data Processing using Big Data TechnologyMangaiK4
Abstract—The nature of big data is now growing and information is present all around us in different kind of forms. The big data information plays crucial role and it provides business value for the firms and its benefits sectors by accumulating knowledge. This growth of big data around all the concerns is high and challenge in data processing technique because it contains variety of data in enormous volume. The tools which are built on the data mining algorithm provides efficient data processing mechanisms, but not fulfill the pattern of heterogeneous, so the emerging tools such like Hadoop MapReduce, Pig, SPARK, Cloudera, Impala and Enterprise RTQ, IBM Netezza and Apache Giraphe as computing tools and HBase, Hive, Neo4j and Apache Cassendra as storage tools useful in classifying, clustering and discovering the knowledge. This study will focused on the comparative study of different data processing tools, in big data analytics and their benefits will be tabulated.
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
Abstract—Security is a most important field of research work for sending and receiving of data in secret way over the network.Cryptographyis a method for securing transformation like image, audio, video, text without any hacking problem.Encryption and Decryption are two methods used to secure the data. Image compression technique used to reducing the size of an image for effective data communication. There are variety of algorithms has been proposed in the literature for securing images using encryption/decryption techniques and reduce the size of images using image compression techniques. These techniques still need improvement to overcome issues, challenges and its limitations. Hence in this research work a hybrid method which combines securing image using RSA, hill cipher and 2bit rotation and compressing of images using lossless compression algorithm has been proposed. This method compared to execution time of existing method. This method secures the image and reduces the size of the image for data communication over the internet. This method is suitable for various applications uses images like remote sensing, medical and Spatio-temporal.
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
Abstract - Multiple-instance learning (MIL) is a speculation of supervised learning which tends to the order of bags. Like customary administered adapting, the greater part of the current MIL work is proposed in light of the suspicion that a delegate preparing set is accessible for a legitimate learning of the classifier. To manage this issue, we propose a novel Sphere-Description-Based approach for Multiple-Instance Learning (SDB-MIL). SDB-MIL takes in an ideal circle by deciding a substantial edge among the examples, and in the meantime guaranteeing that every positive sack has no less than one occasion inside the circle and every negative bags are outside the circle. In genuine MIL applications, the negative information in the preparation set may not adequately speak to the dispersion of negative information in the testing set. Thus, how to take in a proper MIL classifier when a delegate preparing set isn't accessible turns into a key test for genuine MIL applications. From the viewpoint of human examiners and approach producers, determining calculations must influence precise expectations as well as give to sup porting proof, e.g., the causal components identified with the occasion of intrigue. We build up a novel different example learning based approach that mutually handles the issue of recognizing proof based originators and conjectures occasions into what's to come. In particular, given a gathering of spilling news articles from different sources we build up a settled various occurrence learning way to deal with figure noteworthy societal occasions, for example, protests. Substantial investigates the benchmark and true MIL datasets demonstrate that SDB-MIL gets measurably preferable arrangement execution over the MIL strategies thought about.
Abstract: The common challenge for machine learning and data mining tasks is the curse of High Dimensionality. Feature selection reduces the dimensionality by selecting the relevant and optimal features from the huge dataset. In this research work, a clustering and genetic algorithm based feature selection (CLUST-GA-FS) is proposed that has three stages namely irrelevant feature removal, redundant feature removal, and optimal feature generation. The performance of the feature selection algorithms are analyzed using the parameters like classification accuracy, precision, recall and error rate. Recently, an increasing attention is given to the stability of feature selection algorithms which is an indicator that requires that similar subsets of features are selected every time the algorithm is executed on the same dataset. This work analyzes the stability of the algorithm on four publicly available dataset using stability measurements Average normal hamming distance(ANHD), Dices coefficient, Tanimoto distance, Jaccards index and Kuncheva index.
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
Abstract—This correlational study investigates whether Mathematics has a role in the performance of the students in their programming courses. Students’ grade points from their basic mathematics and programming courses were collected and correlated, specifically the grade points of the exiting Advanced-Diploma students from Semester 1 of Academic year 2016-2017 of Shinas College of Technology in Oman. Determining the relationship was analyzed through the use of Pearson r. Hypothesis is tested and the results of the correlation were established.
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
Abstract — Nowadays healthcare field has additional data mining process became a crucial role to use for disease prediction. Data mining is that the process of investigate up info from the huge information sets. The medical information is extremely voluminous. Therefore the investigator is extremely difficult to predict the disease is challenging. To overcome this issue the researchers use data mining processing technique like classification, clustering, association rules so on. The most objective of this analysis work is to predict disease supported common attributes intake of alcohol, smoking, obesity, diabetes, consumption of contaminated food, case history of liver disease using classification algorithm. The algorithms employed in this analysis work are J48, Naive Bayes. These classification algorithms are compared base on the performance factors accuracy and execution time. The investigational results could be a improved classifier for predict the liver disease.
Marine Object Recognition using Blob AnalysisMangaiK4
Abstract: In this paper, a new method of marine object recognition using blob analysis has been proposed, which is suitable to general objects recognition. A powerful foreground blob analysis is proposed to classify frontal areas. Conventionally, the main focus of the objects is recognized by prepared researchers through towed nets and human perception, which make much cost and hazard administrators and animals. Specific marine objects, box jellyfish and ocean snake, are effectively recognized in this work. Experiments conducted on picture datasets gathered by the Australian Institute of Marine Science (AIMS) demonstrate the adequacy of the proposed strategy.
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
Abstract - Proficient, multi mode and re-configurable architecture of interleaver/de-interleaver for multiple standards, like DVB, OFDM and WLAN is presented. Interleaver plays vital role in 4G technologies to recover symbols from burst errors. The aim of our work is to design a reconfigurable modulation technique called Adaptive modulation scheme uses QAM, QPSK and BPSK modulation that adapt themselves based on channel Signal to Noise ratio. Subcarrier allocation algorithm specifically used to focus on utilizing channels with high gains. Our proposed model can achieves a data rate of min 2.5 Gbps as per 3GPP standard by adaptive modulation technique using QAM, BPSK and QPSK.
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
Abstract - Renewable energy is used in the current fed switched inverter for high power production. High voltage support, wide yield ranges of operation, shoot-through resistance are a portion of the desired properties of an inverter for a reliable, versatile and less ripple AC inversion. This paper proposes a single stage, high boost inverter with buck-boost capacity which has a few particular advantages over traditional voltage source inverters (VSI) like better EMI noise, wide input and output voltage range of operation, and so on. The proposed inverter is named as Current-Fed Switched Inverter (CFSI). A renewable energy based converter structure of CFSI has been created which supplies both AC and DC loads, at the same time, from a single DC supply which makes it reasonable for DC smart grid application. This paper proposes the operation and control of a CFSI based converter which directs the AC and DC conversion voltages at their reference. The advancement of the proposed converter from essential current fed DC/DC topology is explained. The closed loop controller is verified by using the MATLAB/ Simulink environment.
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingMangaiK4
Abstract—In this paper, we suggest a model for the automatic detection and classification of nutrient deficiencies in plant leaves. In an agricultural country like India, farmers are facing lot of problems in detecting the causes for the diseases in plants. Only when the causes are sorted out, the solution can be found to treat them. With naked-eye observation it is difficult to classify the deficiency present in leaves. So with the help of image processing algorithms, we have proposed a model to detect the type of deficiencies in the leaves. The color and texture features are used to recognize and classify the deficiencies. The combinations of features prove to be very effective in deficiency detection. This paper presents an effective method for detection of nutrient deficiencies in leaves using color-texture analysis and k-means clustering.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A Review on - Data Hiding using Cryptography and Steganography
1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.24-28
ISSN: 2278-2397
24
A Review on - Data Hiding using Cryptography
and Steganography
M. Gajalakshmi1
, R. Vidya2
1
M.Phil Scholar, 2
Assistant Professor
1,2
PG & Research Department of Computer Science,
St.Joseph’s College of Arts and Science, Cuddalore, Tamil Nadu, India.
Email: vidya.sjc@gmail.com, gajalakshmi.mt@gmail.com
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage.
Many developers are working continuously to make an internet safe environment, but the intruders are very
smart to hack the information. For that, two entities communicating need to communicate in a way which is not
susceptible to listen in or interception. So every organization uses many data encryption techniques to secure
their communication. There are two security mechanisms called, Cryptography and Steganography are being
applied. By merging these techniques, two level of information security is achieved. This paper discuss about
the way of working Cryptography and Steganography and their different approaches.
Keywords: Cryptography, Steganography, Encryption, Decryption, Symmetric Key, Data Hiding, cipher text,
cover image.
I. INTRODUCTION
Nowadays sharing commercial and confidential information over the internet is a risky task. As data is
transmitted all the way through digital medium has certain demerits like tampering, illegal use, easy to access,
copyright violation etc. There are many applications and websites on the internet requires the users to fill their
personal data’s like telephone number, credit card information, addresses etc. so the users need to communicate
with private and secure confidential data transmission over the network. Data integrity and confidentiality are
required to protect against unauthorized access and use. Cryptography and steganography are the two common
methods play a major role for secure communication. By combining these two methods provides two level
security of information sharing. The differentiation between these techniques is computer programs survive that
will encrypt a message using cryptography and hide the encryption within an image using steganography.
Steganography is combined with cryptography; combination is termed as metamorphic cryptography [18].
Cryptography is the art and science of building a cryptosystem that is able to provide a information security.
Cryptography mainly deals with the actual securing of digital data. It refers to the design of mechanisms based
on mathematical algorithms that provide fundamental information security services. And cryptography concern
with the design of cryptosystems, whereas cryptanalysis is the study of breaking the cryptosystems. The
cryptosystem contains of plaintext, encryption and decryption algorithm, cipher text and key. The plaintext is
the message or data in which normal or readable (not encrypted) form. And Encryption is process, converting
plaintext into Cipher text by using Key. The Cipher text is the result from encryption by applying the encryption
key on plaintext. And Decryption is process of retrieving the plaintext from the cipher text. Finally Key is the
information to control the cryptosystem (cipher system). There are two types of cryptosystems is used, in which
encryption-decryption is take place in the system:
i. Symmetric Key Encryption
ii. Asymmetric Key Encryption
A. Symmetric Key Encryption
In encryption process the identical keys are used for encrypting and decrypting the information is called as
Symmetric Key Encryption. Otherwise, in Symmetric key cryptography sender encrypts the ostensible text
content by using secret key and receiver decrypt the cipher text by using the same key. So there is a requirement
2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.24-28
ISSN: 2278-2397
25
to ship the defended key to the receiver along with the cipher text. Secrecy of facts in symmetric key
cryptography depends at the confidentiality and length of the secret key. The generally used algorithms of
Symmetric key cryptography are DES, 3DES, AES, BLOWFISH and many others [5].
B. Asymmetric Key Encryption
In encryption process distinctive keys are used for encrypting and decrypting the information is called as
Asymmetric Key Encryption. Otherwise, asymmetric key cryptography use one of the two keys i.e. public key
and private key that are complementary in function. The textual content, that is encrypted the usage of public
key, can simplest be decrypted the usage of the subsequent private key. RSA, DSA, ECC are the example of
asymmetric key cryptography [5].
Steganography (art of “concealed writing”) is used to hide the confidential and sensitive data inside a digital
medium. Otherwise, we can called it as hidden communication, i.e., we can hide the secret data (not noticeable
by the human eye) into a cover object like image, audio, video, etc. A steganalyst is a person who is skilled in
detecting hidden messages from a digital media. Steganalysis is the study of extracting hidden messages from
the digital medium which is done with the help of steganography [18].
In Image Steganography it consists of two algorithms, one for embedding and another one for extraction. The
embedding is the procedure of hiding secret message inside a cover media (i.e. cover image), and result of this
embedding process is the stego image. The extraction is the process of inversing the embedding process, which
reveals the secret message [29].
Different application areas of Steganography are copy right of multimedia object, medical image, military
communication, authentication & several areas associated with communication and it has currently reached at a
new technology referred to as cloud. Steganography provide the cloud users with data confidentiality,
authentication and integrity [1].
So simply it proves that, Cryptography converts the information from its original form (plaintext) into
unreadable form (cipher text); where as in steganography, it is the art of hiding messages within other data
without changing the data to it attaches, so before and after the process hiding the data almost look like the
same. The above figure shows the, Cryptography and Steganography process is carried out in Data hiding
technique.
II. RELATED WORK
All the sectors need a secured data transmission. In most instances, data hiding cases has experience in some
distortion over the cover object and can’t move it back to original cover object. This will be taken place, as
some parameter will be distorted over the cover object even after the hidden data has been extracted. But in
reversible data hiding, the original cover object is losslessly recovered after the message is extracted
[22,23,24,25]. The reversible data hiding (RDH) technique is commonly utilized in area of medical, law
forensics and military, here there will be no alteration of the original object will be allowed.
The Reversible Data Hiding technique was first delivered is proposed via Z. Ni et.al. [22], which uses
Histogram Shift (HS) approach. An "image histogram" is a type of histogram which illustrates a graphical
3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.24-28
ISSN: 2278-2397
26
representation of the pixel value distribution in a digital image. Advantage of this paper is results good PSNR
(Peak Signal-to-Noise Ratio) value and computational complexity is low. Disadvantage is of this paper is there
is no Key is used for data hiding so security level is low and easy to attack by attackers.
The author X. Zhang [23], overcomes the limitations on Histogram Shifting (HS) and Pixel Value Difference
(PVD) methods, here the encryption and decryption process of confidential data and cover image is processed
by using data hiding Key. The author W. Hong et.al.[25], overcomes the limitations of previous methods and
results by minimizing the error rate. It improves the problems of non-overlapping block method and calculates
the smoothness of each block.
The author X. Zhang et.al.[24,26], using image encryption a new feature is added, i.e. if the receiver has only
data hiding key means he can able to extract the confidential data, but the receiver does not know the cover
image. If the receiver has only encryption key means he can decrypt the cover image cannot extract the
confidential data. Advantage of this paper is getting separate privacy for both the confidential data and cover
image, medium PSNR value. The author k. Ma et.al.[27], gets the advantage of all the previous approaches and
work carried out. The only additional feature is it reserves the space for accommodating the confidential data
before the image encryption is carried out. Advantage of this method is high security and good PSNR value.
Disadvantage is high computational complexity when comparing other methods [28].
After all this approaches, the extended version of reversible data hiding technique is introduced by the author
Achuthshankar et.al.[1]. This method mainly focused on enhancing the image quality by contract enhancement
with high security novel lightweight symmetric stream cipher namely A-S algorithm. In this approach
introduces the user defined file as a Key instead of generating the Key.
The type of file and size of file will be user defined wish. The additional information is embedded to the image
with the use of a data hiding key. At the receiver side it will be decrypted. After the decryption it is extracted
and the original image will be recovered. If the receiver is not known about the data hiding key he cannot extract
the data. So the data will be safe again. The user can use the Key file as text file, image, audio, and video. All
the privileges are depending upon the user. XOR operation is performed for encrypting the file. Using
Histogram Shift method it achieves good and stable PSNR value. Execution time of the algorithm is very low.
It takes the first character of the file plain text file and the first character of the key file and performs an XOR
operation which is encrypted as the first character of the cipher text and so on. When the EOF of the key file
occurs, it wraps around. In A-S algorithm has maximum possible substitution which is 256 powers of numbers
for the character in the plain text.
Fig.2. Block Diagram for proposed work
4. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.24-28
ISSN: 2278-2397
27
III. RESULT AND DISCUSSION
Execution time of this algorithm when comparing 3DES, IDEA, CAST-128, the A-S algorithm takes 2ms to
execute the 50kb file size and 4ms to execute the 250kb file size and vice versa[1]. This approach results in
good performance on data hiding. And it is very much safe, simple and faster. The future work of this paper will
be minimizing the previous execution time and to deliver the better result in PSNR value with highest security,
and also by including Watermarking technique it achieves high security in data transmission. Watermarking is
the concept of copyright protection or digital ownership that can read by only authenticated person.
IV. CONCLUSION
In simple words, Cryptography and Steganography is a way to data hiding in such a fashion, presence of hidden
message cannot be conceived. Several researchers are working in this area to improve efficiency of the
algorithms. In this paper discussed about the various authors proposed a several algorithms and techniques to
improve the data security. The future work of this paper will be way to improve the efficiency of the A-S
algorithm by using Reversible Data Hiding technique, and including the Watermarking concept, so the result
may provide the very high data security.
References
[1] Achuthshankar, A., Achuthshankar, A., Arjun, K. P., & Sreenarayanan, N. M. (2016). Encryption of
Reversible Data Hiding for Better Visibility and High Security. Procedia Technology, 25(Raerest), 216–
223. https://doi.org/10.1016/j.protcy.2016.08.100
[2] Alam, S. S., & Jianu, R. (2017). Analyzing Eye-Tracking Information in Visualization and Data Space:
From Where on the Screen to What on the Screen. IEEE Transactions on Visualization and Computer
Graphics, 23(5), 1492–1505. https://doi.org/10.1109/TVCG.2016.2535340
[3] Ansari, N., & Gupta, A. (2017). Image Reconstruction Using Matched Wavelet Estimated from Data
Sensed Compressively Using Partial Canonical Identity Matrix. IEEE Transactions on Image Processing,
26(8), 3680–3695. https://doi.org/10.1109/TIP.2017.2700719
[4] Arya, I. G., & Dewangga, P. (2017). A New Approach of Data Hiding in BMP Image Using LSB
Steganography and Caesar Vigenere Cipher Cryptography, 12(21), 10626–10636.
[5] Chandra, S., Mandal, B., Alam, S. S., & Bhattacharyya, S. (2015). Content Based Double Encryption
[6] Algorithm Using Symmetric Key Cryptography. Procedia Computer Science, 57(Icrtc), 1228–1234.
https://doi.org/10.1016/j.procs.2015.07.420
[7] Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and
analysis of current methods. Signal Processing, 90(3), 727–752.
https://doi.org/10.1016/j.sigpro.2009.08.010
[8] Dutta, M. K., Singh, A., Soni, K. M., Burget, R., & Riha, K. (2013). Watermarking of digital media with
encrypted biometric features for digital ownership. 2013 6th International Conference on Contemporary
Computing, IC3 2013, 108–112. https://doi.org/10.1109/IC3.2013.6612172
[9] Gupta, R., & Singh, T. P. (2014). New proposed practice for secure image combing cryptography
stegnography and watermarking based on various parameters. Proceedings of 2014 International
Conference on Contemporary Computing and Informatics, IC3I 2014, 475–479.
https://doi.org/10.1109/IC3I.2014.7019643
[10] Hemalatha, S., Acharya, U. D., & Renuka, A. (2014). Wavelet transform based steganography technique to
hide audio signals in image. Procedia Computer Science, 47(C), 272–281.
https://doi.org/10.1016/j.procs.2015.03.207
[11] Lin, C. C., & Tsai, W. H. (2004). Secret image sharing with steganography and authentication. Journal of
Systems and Software, 73(3), 405–414. https://doi.org/10.1016/S0164-1212(03)00239-5
[12] Mstafa, R. J., Elleithy, K. M., & Abdelfattah, E. (2017). A Robust and Secure Video Steganography
Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC. IEEE Access, 5(c), 5354–
5365. https://doi.org/10.1109/ACCESS.2017.2691581
5. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 07, Issue: 01, June 2018, Page No.24-28
ISSN: 2278-2397
28
[13] Nascimento, J. C., & Carneiro, G. (2017). Deep Learning on Sparse Manifolds for Faster Object
Segmentation. IEEE Transactions on Image Processing, 26(10), 4978–4990.
https://doi.org/10.1109/TIP.2017.2725582
[14] Raypure, R. M., & Keswani, P. V. (2017). Implementation For Data Hiding Using Visual Cryptography.
International Research Journal of Engineering and Technology(IRJET), 4(7), 925–928. Retrieved from
https://irjet.net/archives/V4/i7/IRJET-V4I7217.pdf
[15] Reddy, M. I. S., & Kumar, A. P. S. (2016). Secured Data Transmission Using Wavelet Based
Steganography and Cryptography by Using AES Algorithm. Procedia Computer Science, 85(Cms), 62–69.
https://doi.org/10.1016/j.procs.2016.05.177
[16] Rezghi, M. (2017). A Novel Fast Tensor-Based Preconditioner for Image Restoration. IEEE Transactions
on Image Processing, 26(9), 4499–4508. https://doi.org/10.1109/TIP.2017.2716840
[17] Sabnis, S. K., & Awale, R. N. (2016). Statistical Steganalysis of High Capacity Image Steganography with
Cryptography. Procedia Computer Science, 79, 321–327. https://doi.org/10.1016/j.procs.2016.03.042
[18] Shivani, Yadav, V. K., & Batham, S. (2015). A Novel Approach of Bulk Data Hiding using Text
Steganography. Procedia Computer Science, 57, 1401–1410. https://doi.org/10.1016/j.procs.2015.07.457
[19] Thomas, A. P., Sruthi, P. S., Jacob, J. R., Nair, V. V, & Reeba, R. (2017). Secret Data Transmission Using
Combination of Cryptography & Steganography, 4(5), 171–175.
[20] Valandar, M. Y., Ayubi, P., & Barani, M. J. (2017). A new transform domain steganography based on
modified logistic chaotic map for color images. Journal of Information Security and Applications, 34, 142–
151. https://doi.org/10.1016/j.jisa.2017.04.004
[21] Weng, I. C., & Chen, T. H. (2017). A novel weighted visual cryptography scheme with high visual quality.
International Journal of Network Security, 19(6), 922–928. https://doi.org/10.6633/IJNS.201711.19(6).08
[22] Z. Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 16, no. 3, pp. 354–362, Mar.2006.
[23] X. Zhang, “Reversible Data Hiding With Optimal Value Transfer” IEEE Trans. On Mult., vol. 15, no. 2,
pp.316-325, Feb. 2013.
[24] X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett. vol. 18, no. 4, pp.
255–258, Apr. 2011.
[25] W. Hong, T. Chen, and H. Wu, “An Improved Reversible Data Hiding in Encrypted Images Using Side
Match”, IEEE Signal Process. Lett. vol. 19, no. 4, pp.199-202, Apr. 2012.
[26] X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol.
7, no. 2, pp. 826–832, Apr. 2012.
[27] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, “Reversible Data Hiding in Encrypted Images by Reserving
Room Before Encryption” , IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 533–562, Mar. 2013.
[28] V. Suresh and C. Saraswathy, “Separable Reversible Data Hiding using Compression in Encrypted
Image”, IJARECE, Vol. 2, Issue 5, May2013.
[29] Saleh, M. E., Aly, A. A., & Omara, F. A. (2016). Data Security Using Cryptography and Steganography
Techniques. IJACSA) International Journal of Advanced Computer Science and Applications, 7(6), 390–
397.
[30] Vidya, R., Raj, D. V., & Sujatha, K. (2017). Knowledge understanding and advanced searching,
6959(April),1467–1472. https://doi.org/10.21917/ijsc.2017.0203.