This document presents a new secure image steganography method based on the Just Noticeable Difference (JND) model. The method uses a modified matrix encoding technique to embed secret bits into cover images. It selects pixels for embedding by calculating the JND value and average gradient of each pixel, and choosing the pixel associated with the smallest estimated embedding distortion. Experimental results on a database of 10,000 images show that stego images produced with the proposed approach achieve higher perceptual quality and security than previous approaches.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
Reversible data embedding is a technique that embeds data into an image in a reversible manner. An important aspect of reversible data embedding is to find embedding area in the image and to embed the data into it. In the conventional reversible techniques, the visual quality is not taken into account which resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data hiding technique using multiple causal windows is proposed which predicts the embedding level with the help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System (HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly improves the data embedding capacity along with greater visual quality. The proposed method includes three phases: (i).Construction of casual window and calculation of edge and JND values in which the casual window determines the pixel values, the edge and the JND values are calculated (ii).Data embedding which is the process of embedding the data into the original image (iii). Data extractor and image recovery where the original image is recovered and the embedded bits are obtained. The experimental results and performance comparison with other reversible data hiding algorithms are presented to demonstrate the validity of the proposed algorithm. The experimental results show that the Performance of the proposed system on an average shows an accuracy of 95%.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
Steganalysis is the method used to detect the presence of any hidden message in a cover medium. A novel
approach based on feature mining on the discrete cosine transform (DCT) domain based approach,
machine learning for steganalysis of JPEG images is proposed. The neighboring joint density on both
intra-block and inter-block are extracted from the DCT coefficient array. After the feature space has been
constructed, it uses SVM like binary classifier for training and classification. The performance of the
proposed method on different Steganographic systems named F5, Pixel Value Differencing, Model Based
Steganography with and without deblocking, JPHS, Steghide etc are analyzed. Individually each feature
and combined features classification accuracy is checked and concludes which provides better
classification.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
Reversible data embedding is a technique that embeds data into an image in a reversible manner. An important aspect of reversible data embedding is to find embedding area in the image and to embed the data into it. In the conventional reversible techniques, the visual quality is not taken into account which resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data hiding technique using multiple causal windows is proposed which predicts the embedding level with the help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System (HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly improves the data embedding capacity along with greater visual quality. The proposed method includes three phases: (i).Construction of casual window and calculation of edge and JND values in which the casual window determines the pixel values, the edge and the JND values are calculated (ii).Data embedding which is the process of embedding the data into the original image (iii). Data extractor and image recovery where the original image is recovered and the embedded bits are obtained. The experimental results and performance comparison with other reversible data hiding algorithms are presented to demonstrate the validity of the proposed algorithm. The experimental results show that the Performance of the proposed system on an average shows an accuracy of 95%.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
Steganalysis is the method used to detect the presence of any hidden message in a cover medium. A novel
approach based on feature mining on the discrete cosine transform (DCT) domain based approach,
machine learning for steganalysis of JPEG images is proposed. The neighboring joint density on both
intra-block and inter-block are extracted from the DCT coefficient array. After the feature space has been
constructed, it uses SVM like binary classifier for training and classification. The performance of the
proposed method on different Steganographic systems named F5, Pixel Value Differencing, Model Based
Steganography with and without deblocking, JPHS, Steghide etc are analyzed. Individually each feature
and combined features classification accuracy is checked and concludes which provides better
classification.
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEijcsity
It is shown that neural networks (NNs) achieve excellent performances in image compression and reconstruction. However, there are still many shortcomings in the practical application, which eventually lead to the loss of neural network image processing ability. Based on this, a joint framework based on neural network and scale compression is proposed in this paper. The framework first encodes the incoming PNG image information, and then the image is converted into binary input decoder to reconstruct the intermediate state image, next, we import the intermediate state image into the zooming compressor and repressurize it, and reconstruct the final image. From the experimental results, this method can better process the digital image and suppress the reverse expansion problem, and the compression effect can be improved by 4 to 10 times as much as that of using RNN alone, showing better ability in the application. In this paper, the method is transmitted over a digital image, the effect is far better than the existing compression method alone, the Human visual system cannot feel the change of the effect.
An artificial neural network approach for detecting skin cancerTELKOMNIKA JOURNAL
This study aims to present diagnose of melanoma skin cancer at an early stage. It applies feature
extraction method of the first order for feature extraction based on texture in order to get high degree of
accuracy with method of classification using artificial neural network (ANN). The method used is training
and testing phases with classification of Multilayer Perceptron (MLP) neural network. The results showed
that the accuracy of test image with 4 sets of training for image not suspected of melanoma and melanoma
with the lowest accuracy of 80% and the highest accuracy of 88.88%, respectively. The 4 sets of training
used consisted of 23 images. Of the 23 images used as a training consisted of 6 as not suspected of
melanoma images and 17 as suspected melanoma images.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
International Journal on Soft Computing ( IJSC )ijsc
A variety of new and powerful algorithms have been developed for image compression over the years.
Among them the wavelet-based image compression schemes have gained much popularity due to their
overlapping nature which reduces the blocking artifacts that are common phenomena in JPEG
compression and multiresolution character which leads to superior energy compaction with high quality
reconstructed images. This paper provides a detailed survey on some of the popular wavelet coding
techniques such as the Embedded Zerotree Wavelet (EZW) coding, Set Partitioning in Hierarchical Tree
(SPIHT) coding, the Set Partitioned Embedded Block (SPECK) Coder, and the Embedded Block Coding
with Optimized Truncation (EBCOT) algorithm. Other wavelet-based coding techniques like the Wavelet
Difference Reduction (WDR) and the Adaptive Scanned Wavelet Difference Reduction (ASWDR)
algorithms, the Space Frequency Quantization (SFQ) algorithm, the Embedded Predictive Wavelet Image
Coder (EPWIC), Compression with Reversible Embedded Wavelet (CREW), the Stack-Run (SR) coding and
the recent Geometric Wavelet (GW) coding are also discussed. Based on the review, recommendations and
discussions are presented for algorithm development and implementation.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images from false mistakes. The grey wolf optimizer (GWO) is used to choose the pixel’s image that would be utilized to insert the hidden image in the cover image. GWO effectively selects pixels by calculating entropy, pixel intensity, and fitness function using the cover images. Moreover, the secret image was encrypted by utilizing a proposed hyper-chaotic improved Henon map and fractal Tromino. The suggested method increases computational security and efficiency with increased embedding capacity. Following the embedding algorithm of the secret image and the alteration of the cover image, the least significant bit (LSB) is utilized to locate the tempered region and to provide self-recovery characteristics in the digital image. According to the findings, the proposed technique provides a more secure transmission network with lower complexity in terms of peak signal-to-noise ratio (PSNR), normalized cross correlation (NCC), structural similarity index (SSIM), entropy and mean square error (MSE). As compared to the current approaches, the proposed method performed better in terms of PSNR 70.58% Db and SSIM 0.999 respectively.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
Reversible data embedding is a technique that embeds data into an image in a reversible manner. An important aspect of reversible data embedding is to find embedding area in the image and to embed the data into it. In the conventional reversible techniques, the visual quality is not taken into account which resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data hiding technique using multiple causal windows is proposed which predicts the embedding level with the help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System (HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly improves the data embedding capacity along with greater visual quality. The proposed method includes three phases: (i).Construction of casual window and calculation of edge and JND values in which the casual window determines the pixel values, the edge and the JND values are calculated (ii).Data embedding which is the process of embedding the data into the original image (iii). Data extractor and image recovery where the original image is recovered and the embedded bits are obtained. The experimental results and performance comparison with other reversible data hiding algorithms are presented to demonstrate the validity of the proposed algorithm. The experimental results show that the Performance of the proposed system on an average shows an accuracy of 95%.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEijcsity
It is shown that neural networks (NNs) achieve excellent performances in image compression and reconstruction. However, there are still many shortcomings in the practical application, which eventually lead to the loss of neural network image processing ability. Based on this, a joint framework based on neural network and scale compression is proposed in this paper. The framework first encodes the incoming PNG image information, and then the image is converted into binary input decoder to reconstruct the intermediate state image, next, we import the intermediate state image into the zooming compressor and repressurize it, and reconstruct the final image. From the experimental results, this method can better process the digital image and suppress the reverse expansion problem, and the compression effect can be improved by 4 to 10 times as much as that of using RNN alone, showing better ability in the application. In this paper, the method is transmitted over a digital image, the effect is far better than the existing compression method alone, the Human visual system cannot feel the change of the effect.
An artificial neural network approach for detecting skin cancerTELKOMNIKA JOURNAL
This study aims to present diagnose of melanoma skin cancer at an early stage. It applies feature
extraction method of the first order for feature extraction based on texture in order to get high degree of
accuracy with method of classification using artificial neural network (ANN). The method used is training
and testing phases with classification of Multilayer Perceptron (MLP) neural network. The results showed
that the accuracy of test image with 4 sets of training for image not suspected of melanoma and melanoma
with the lowest accuracy of 80% and the highest accuracy of 88.88%, respectively. The 4 sets of training
used consisted of 23 images. Of the 23 images used as a training consisted of 6 as not suspected of
melanoma images and 17 as suspected melanoma images.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
International Journal on Soft Computing ( IJSC )ijsc
A variety of new and powerful algorithms have been developed for image compression over the years.
Among them the wavelet-based image compression schemes have gained much popularity due to their
overlapping nature which reduces the blocking artifacts that are common phenomena in JPEG
compression and multiresolution character which leads to superior energy compaction with high quality
reconstructed images. This paper provides a detailed survey on some of the popular wavelet coding
techniques such as the Embedded Zerotree Wavelet (EZW) coding, Set Partitioning in Hierarchical Tree
(SPIHT) coding, the Set Partitioned Embedded Block (SPECK) Coder, and the Embedded Block Coding
with Optimized Truncation (EBCOT) algorithm. Other wavelet-based coding techniques like the Wavelet
Difference Reduction (WDR) and the Adaptive Scanned Wavelet Difference Reduction (ASWDR)
algorithms, the Space Frequency Quantization (SFQ) algorithm, the Embedded Predictive Wavelet Image
Coder (EPWIC), Compression with Reversible Embedded Wavelet (CREW), the Stack-Run (SR) coding and
the recent Geometric Wavelet (GW) coding are also discussed. Based on the review, recommendations and
discussions are presented for algorithm development and implementation.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images from false mistakes. The grey wolf optimizer (GWO) is used to choose the pixel’s image that would be utilized to insert the hidden image in the cover image. GWO effectively selects pixels by calculating entropy, pixel intensity, and fitness function using the cover images. Moreover, the secret image was encrypted by utilizing a proposed hyper-chaotic improved Henon map and fractal Tromino. The suggested method increases computational security and efficiency with increased embedding capacity. Following the embedding algorithm of the secret image and the alteration of the cover image, the least significant bit (LSB) is utilized to locate the tempered region and to provide self-recovery characteristics in the digital image. According to the findings, the proposed technique provides a more secure transmission network with lower complexity in terms of peak signal-to-noise ratio (PSNR), normalized cross correlation (NCC), structural similarity index (SSIM), entropy and mean square error (MSE). As compared to the current approaches, the proposed method performed better in terms of PSNR 70.58% Db and SSIM 0.999 respectively.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
MULTIPLE CAUSAL WINDOW BASED REVERSIBLE DATA EMBEDDINGijistjournal
Reversible data embedding is a technique that embeds data into an image in a reversible manner. An important aspect of reversible data embedding is to find embedding area in the image and to embed the data into it. In the conventional reversible techniques, the visual quality is not taken into account which resulted in a poor quality of the embedded images. Hence the histogram modification based reversible data hiding technique using multiple causal windows is proposed which predicts the embedding level with the help of the pixel value, edge value, Just Noticeable Difference(JND) value. Using this data embedding level the data is embedded into the pixels. The pixel level adjustment considering the Human Visual System (HVS) characteristics is also made to reduce the distortion caused by data embedding. This significantly improves the data embedding capacity along with greater visual quality. The proposed method includes three phases: (i).Construction of casual window and calculation of edge and JND values in which the casual window determines the pixel values, the edge and the JND values are calculated (ii).Data embedding which is the process of embedding the data into the original image (iii). Data extractor and image recovery where the original image is recovered and the embedded bits are obtained. The experimental results and performance comparison with other reversible data hiding algorithms are presented to demonstrate the validity of the proposed algorithm. The experimental results show that the Performance of the proposed system on an average shows an accuracy of 95%.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
This survey propose a Novel Joint Data-Hiding and
Compression Scheme (JDHC) for digital images using side match
vector quantization (SMVQ) and image in painting. In this
JDHC scheme image compression and data hiding scheme are
combined into a single module. On the client side, the data should
be hided and compressed in sub codebook such that remaining
block except left and top most of the image. The data hiding and
compression scheme follows raster scanning order i.e. block by
block on row basis. Vector Quantization used with SMVQ and
Image In painting for complex block to control distortion and
error injection. The receiver side process is based on two
methods. First method divide the received image into series of
blocks the receiver achieve hided data and original image
according to the index value in the segmented block. Second
method use edge based harmonic in painting is used to get
original image if any loss in the image.
A coverless image steganography based on robust image wavelet hashingTELKOMNIKA JOURNAL
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. In this paper, a new coverless steganography is presented to hide the secret data in a more secure way and to enhance the robustness against attacks. This method depends on frequency domain. The embedding process consists of several steps. Firstly, the secret data is divided into no overlapping segments. Secondly, a set of images is collected to find appropriate images to be stego images. Thirdly, to build a hash sequence for an image, a powerful hashing algorithm is used. Fourthly, for each image hash sequence, the inverted index structure is created. Fifthly, choose the image which its hash equivalent to the secret data segment. Several tests are done to measure the robustness of the proposed method. The results of the experiments reveal that the proposed strategy is resistant to a variety of image processing attacks such as joint photographic experts group (JPEG) compression, noise, low pass filtering, scaling, rotation and median and mean filter, brightness, and sharpening.
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient suspects the existence of the message a form of security through obscurity. The internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. In this paper, we proposed a class of new distortion functions known as uniform embedding distortion function (UED) is presented. By incorporating the syndrome trellis coding, the best code word with undetectable data hiding is achieved. Due to hiding more amounts of data into the intersected area, embedding capacity is increased. Our aim is to hide the secret information behind the image file. Steganography hides the secret message so that intruder’s can’t detect the communication. When hiding data into the intersected area, thus provides a higher level of security with more efficient data mean square error is reduced and embedding capacity is increased.
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
2. Int J Elec & Comp Eng ISSN: 2088-8708
A secure image steganography based on JND model (Tuan Duc Nguyen)
2089
combine with channel selection rule techniques to further enhance the visual quality of the resulting images
and security of the hidden messages. To obtain more embedding change solutions that can be selected to
perform, Kim et al. [7] presented Modified Matrix Encoding (MME). Via this method, the introduced
degradation is minimized by choosing an embedding solution that may cause less distortion to cover data.
In general, MME schemes are named as MME2, MME3, etc., according to the maximum of modifications (t)
which are required to hide k message bits to n cover bits [16].
For the channel selection rule approaches, these methods attempt to identify an image component’s
(a pixel in spatial domain or a transformed coefficient) that embedding secret bits into them cause less
degradation. In channel selection rule approach for JPEG images introduced by Huang in [12], Quantization
Step (QS) and magnitude of Discrete Cosine Transform (MQ), are concurrently considered with Perturbation
Error (PE) to estimate an embedding distortion. The measured embedding error is utilized to determine
embedding solutions to be performed in the data hiding process. Thus, the channel selection rule approaches
can be combined with block-based data hiding methods (such as Hamming code based steganography
techniques) [7] to improve the security of hidden data and obtain high visual quality stego-images.
For spatial images, several approaches have been presented [1, 13, 14, 17, 18] to enhance the visual
quality of the stego-images and the security of a mysterious message. In two proposed methods [1, 17],
a dissimilarity of considered pixel and its neighbors in value is estimated. After that, a characteristic (textured
or smooth) of an image region that the considered pixel belongs to is identified based on the estimated value.
If the pixel lies on complex image region, secret message bits are concealed in it. Otherwise, other pixels
are used.
Luo et al. [13] proposed a data hiding scheme, in which the used image regions are identified based
on the size of the secret message and the difference between two adjacent pixels. At low payloads,
only pixels in complex regions are selected to carry message bits while maintaining the other flat regions as
they are. When more message bits need to be embedded, more textured areas can be selected adaptively for
data hiding by adjusting used parameters. Unfortunately, for the used image with large flat regions and
the large payload is embedded, the less noisy regions are exploited to conceal the given secret message.
This leads to the reduction of possibility to against visual and statistical attack methods.
To solve the above-mentioned facts, in [18], Nguyen et al. introduced a novel scheme in which
a considered pixel’s value and a difference between it and its neighbors are exploited to select a suitable
pixel. Via this way, a visual quality of stego-images and the security of hidden message are enhanced.
Unfortunately, image texture characteristic illustrates the large difference between pixels which does not
include contrast and luminance. Luminance is illustrated as brightness; how bright an object appears to
the human eye. While contrast is the dismissibility in visual characteristics that makes an object can be
distinguished from other objects and the background. Two factors are used in Watson’s visual model [19]
which is applied to create a secure steganography method (proposed in [20]).
In this paper, a novel steganography scheme is proposed. In this approach the Just Noticeable
Difference (JND) value is combined with a gradient (instead of using magnitude of a pixel as in [21]) to
determine a pixel which need to be changed in data hiding process. This is due to the fact that hiding secret
message bits in a pixel which has a corresponding JND value (measured by an approach in [22]) is higher
than an altered value of pixel will cause less visible degradation. To examine the security of embedded
message, regular/singular and ensemble classifier attack methods are performed. In these experiments,
to further clarify the performance of the proposed approach, besides CBL [17], EALSBMR [13] is also used.
2. RESEARCH METHOD
In this section, a new image steganography scheme, which employs a novel channel selection rule to
measure embedding distortion, is presented. In this approach, a corresponding embedding error of each
solution (which is estimated by MME2) is calculated. Then, a solution which causes the smallest degradation
to stego-image is selected to be performed in the data hiding process. As it can be seen in Figure 1,
at sender’s side, a secret message is hidden to the selected image by employing the proposed scheme.
To send an image with a message embedded, a sender can use email services or upload it to public image
sharing services, in which a stego image is kept as original. In addition, users can transfer these stego-images
via social network services, such as Facebook. An uploaded image does not modify if user shares it through
the upload file feature in the group’s wall.
In this proposed approach, a JND value is calculated and then used to estimate embedding noise.
The reason is that JND employs enhanced contract masking (CM) estimation with better edge masking (EM)
and texture masking (TM) calculation [22]. Moreover, if the value of a pixel is changed with a quantity
which is smaller than its corresponding JND value, the introduced distortion is invisible to HVS. To further
enhance a security of hidden message, a new criterion average gradient (AG) of a pixel is utilized.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2088 - 2096
2090
It is integrated with JND value (which is calculated by a method in [22]) to measure embedding distortion.
This is an improvement of new approach in comparison with proposed method in [21]. The reason is that
pixel associated with large gradient value may belong to textured image regions, and those with small values
may be located on flat regions. While a large value of pixel cannot indicate the complexity of the region it
belongs to.
Figure 1. A JND model based steganography scheme
An embedding distortion is estimated as follows:
𝐸𝑖,𝑗 = (𝐽𝑖,𝑗)
𝛼1
/(𝐴𝐺𝑖,𝑗)
𝛼2
(1)
where Ji,j is a JND value and AGi,j is an average gradient of pixel (i, j). Note that, in case the gradient value of
considered pixel (𝐴𝐺𝑖,𝑗) equals to zero, it will be set to 10-3
to avoid dividing by zero. Two non-negative
parameters α1 and α2 are employed to examine the effect of provided factors JND and AG (which is
calculated by Equation (3) in [1]) to image visual quality and security of hidden message.
To further increase the security of hidden message, the schemes of MME2 (in which two
modifications are required) is utilized as an embedding method in the proposed scheme (named as
JND_AGMME2). This is because MME2 provides more than one possible bit-change choices to be
performed. In this proposed approach, embedding distortion is calculated (by Equation (1)) in each solution
(introduced by MME2) and the one associated with the smallest error is performed to carry given message
bits. To summarize, MME2 exhibits “how” to embed and the proposed channel selection rule shows “where”
to hide secret message bits. Consequently, the application of the proposed approach is presented as follows.
Given a message block of k bit M = (m1, m2,…,mk) to hide in a block of cover pixels P = (p1,
p2,…,pn) with n = 2k
– 1 pixels. A value of k is estimated according to the size of given message and cover
image. This strategy enables us to split message bits evenly spread out to stego-image. As a result, for a small
number of message bits, there are more cover pixels which will be used in block P. In contrast, when an
embedding rate increased, the number of pixels in the block P is reduced. Therefore, there are more
employed blocks to guarantee that all given message bits are embedded.
A message block M is concealed into the block of pixels P by performing three following steps:
Step 1. A value 𝜌 is calculated by 𝐻 ∗ 𝐵𝐿 𝑇
− 𝑀 𝑇
with BL (a block contains LSBs of pixels in P) and [.]T
is
transpose operator. After that the pairs (, ) that satisfy are listed. As mentioned above, there are
(n – 1)/2 pairs of pixels can be enumerated.
Step 2. For each pair (, ) in the enumerated list, a total corresponding embedding error is estimated by
Equation (1). Assume that Eρ is the noise caused by modifying LSB of a pixel at position ρ, then we denote
E(βmin, γmin) is the smallest measured embedding distortion of the pairs (of pixels) in the enumerated list.
Step 3. If Eρ < E(βmin, γmin) then pixel ρ is altered, otherwise the pair of pixels (min, min) are modified to carry
M. The selected pixel is changed by the following equation (which is derived from [18]):
Case #1: if (Pi = 255) || (Pi = 0) then
𝑃𝑖 = {
𝑃𝑖 = 𝑃𝑖 − 1 𝑖𝑓(𝑃𝑖 = 255)
𝑃𝑖 = 𝑃𝑖 + 1 𝑖𝑓(𝑃𝑖 = 0)
(2)
4. Int J Elec & Comp Eng ISSN: 2088-8708
A secure image steganography based on JND model (Tuan Duc Nguyen)
2091
Case #2: if (Pi > 0 && Pi < 255) then
𝑃𝑖 = {
𝑃𝑖 = 𝑃𝑖 − 1 𝑖𝑓(𝑟𝑎𝑛𝑑 < 0.5)
𝑃𝑖 = 𝑃𝑖 + 1 𝑖𝑓(𝑟𝑎𝑛𝑑 ≥ 0.5)
(3)
where i is the position of a pixel in P is modified to conceal message bits. To improve the security of secret
message against statistical steganalysis methods (such as Regular/Singular – RS [20]), in (3), a Matlab’s
function rand is used to add or subtract value of the selected pixels by 1 randomly. At the receiver side,
a hidden message is extracted by performing 𝑀 = 𝐻 ∗ 𝐵𝐿𝑆′
where BLS is a block of LSBs of stego pixels.
3. EXPERIMENTAL RESULTS AND PERFORMANCE ANALYSIS
This section describes the experimental results and compares the algorithm performance of
the proposed approach with other previous approaches. In the experiments, a public image database,
Break Our Watermarking System (BOWS) is employed as test image database. This image library contains
10,000 natural gray-scale images, each of whose sizes are all 512 x 512 pixels with different characteristics.
To use in the experiments, the PGM images in BOWS were converted to BMP image file format via imwrite
function of Matlab. In the following experiments, the message with various embedding payloads ranging
from 0.05 to 0.40 bpp with a step of 0.05 bpp is concealed into cover images by the proposed approach
JND_AGMME2 and three existing methods (AG_MME, the techniques presented in [1], EALSBMR [13]
and CBL [17]). The employed messages are generated randomly to make the ratio of bit 1 and 0 is balanced.
This plays an important role to avoid creating uniform regions in stego-images. It is because in the proposed
approach, the cover pixels are determined also based on the value of message bits.
3.1. Embedding capacity and visual quality discussion
For available embedding capacity, the proposed scheme exploits MME2 as an embedding method.
Hence, it offers the same embedding capacity as the previous based MME2 methods. In this perceptual
quality experiment, the images from BOWS are divided into five segments. Then generated message with
payload in the range of [0.05 – 0.40] bpp is embedded into these divided segments. Later, the images with
message embedded are analyzed for Peak signal-to-noise ratio (PSNR) to examine visual quality. Generally,
the higher PSNR value, the lesser is the degradation in stego-images [24]. Average PSNR values, which were
measured from cover images and their corresponding stego-images produced by the proposed approach
(JND_AGMME2) with different embedding rates of secret message, were presented in Table 1.
From Table 1, it is observed that the obtained average PSNR values of stego-images when the two
parameters 1, 2 > 0 are higher than those of stego-images produced by the proposed approach with other
values of 1 and 2 for most of the embedding capacities. In these cases, both criteria JND and AG are
utilized to estimate embedding noise (by (4)). In the possible embedding solutions (yielded by MME2),
the one associating with the smallest distortion (embedding noise) is altered in the embedding process.
Table 1. Average PSNR values of 10,000 stego-images by the proposed approach (JND_AGMME2) under
different embedding rates and value of two used parameters
bpp
PSNR (in dB)
1=0.0,
2=0.5
1=0.5,
2=0.0
1=0.2,
2=0.5
1=0.5,
2=0.2
1=0.0,
2=1.0
1=1.0,
2=0.0
0.05 69.6908 69.6730 69.6903 69.6936 69.6750 69.2627
0.10 65.3249 65.3194 65.3242 65.3256 65.3188 65.1226
0.15 63.5638 63.5586 63.5635 63.5649 63.5574 63.3514
0.20 61.4879 61.4868 61.4882 61.4893 61.4845 61.3567
0.25 60.5186 60.5175 60.5190 60.5198 60.5155 60.3875
0.30 58.7777 58.7778 58.7779 58.7785 58.7764 58.7180
0.35 58.1088 58.1084 58.1086 58.1090 58.1063 58.0477
0.40 57.5287 57.5283 57.5292 57.5292 57.5269 57.4678
As demonstrated results in Table 2, the proposed scheme offers better stego-image quality than
those of the three previous methods (AG_MME2, EALSBMR, and CBL). This enhancement is obtained by
integrating JND with AG of the considered pixel to estimate the embedding distortion caused by the data
hiding process. For example, at small embedding rates (from 0.05 to 0.20 bpp), the visual quality of stego-
images produced by the proposed approach extremely outperforms the other methods (CBL and EALSBMR).
The reason is that at low embedding rate, according to the principle of the proposed approach there are more
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2088 - 2096
2092
pixels utilized to embed the same as number of secret message bits in comparison with the cases which high
embedding rates are used. This strategy supports to obtain more modification solutions can be performed in
data hiding. As a result, the high perceptual quality is achieved.
PSNR metric only takes into account the difference between an original and modified pixels not
degradation in structure of an image. Therefore, to examine the degradations in structural information
introduced by data hiding to stego-images, a structural similarity index (SSIM) [25], an effective method in
measuring the similarity between two images (original and modified), is utilized. In SSIM, three factors loss
of correlation, luminance distortion, and contrast distortion, are employed. Therefore, it is suitable to measure
structural degradations of stego-images produced by the proposed approach. The higher SSIM value is,
the small distortion in the structural information of stego-image is.
Table 2. Visual quality comparison (illustrated by PSNR values) of the proposed approach and three
existing methods (AG_MME2, CBL, and EALSBMR) under different embedding rates
bpp PSNR (in dB)
1 = 0.0, 2 = 0.5 1 = 0.2, 2 = 0.5 1 = 0.5, 2 = 0.2 CBL EALSBMR
AG_MME2 JND_AGMME2 AG_MME2 JND_AGMME2 AG_MME2 JND_AGMME2
0.05 69.5554 69.6908 69.2069 69.6903 68.4291 69.6936 62.4646 65.3091
0.10 65.2851 65.3249 65.0524 65.3242 64.5762 65.3256 59.4548 62.2974
0.15 63.5180 63.5638 63.3094 63.5635 62.8342 63.5649 57.7102 60.5371
0.20 61.4692 61.4879 61.3025 61.4882 60.9840 61.4893 56.4801 59.2877
0.25 60.4986 60.5186 60.3445 60.5190 60.0275 60.5198 55.5199 58.3182
0.30 58.7718 58.7777 58.6462 58.7779 58.4776 58.7785 54.7320 57.5263
0.35 58.1016 58.1088 57.9852 58.1086 57.8153 58.1090 54.0532 56.8573
0.40 57.5223 57.5287 57.4110 57.5292 57.2423 57.5292 53.4767 56.2770
Table 3 reveal that the SSIM values of stego-images produced by the proposed scheme
JND_AGMME2 are higher than those of the previous method AG_MME2 for high embedding rates (from
0.35 to 0.40 bpp) when both of the two parameters 1, 2 > 0. This performing can be archived because
JND_AGMME2 compares embedding distortion caused by one-modification solutions with that of two
modifications required solutions to select an optimal solution (a solution introduced the smallest noise).
Moreover, in the proposed scheme, employing JND in embedding distortion measurement is an effective way
to maintance the structure of stego-images. From Table 3, for the embedding payload from 0.05 to 0.20 bpp,
the stego-images created by the proposed method illustrates a higher degradation in structural information
than those of CBL. The reason for this is that, in CBL, to reduce the number of required embedding changes,
a preprocess was performed. It sets LSBs of all image pixels to zero. Hence, if a secret bit is zero,
no modification is applied.
Table 3. Comparison of average SSIM over 10,000 stego-images produced by the proposed approach
and the three previous methods
bpp SSIM
1 = 0.0, 2 = 0.5 1 = 0.2, 2 = 0.5 1 = 0.5, 2 = 0.2 CBL EALSBMR
AG_MME2 JND_AGMME2 AG_MME2 JND_AGMME2 AG_MME2 JND_AGMME2
0.05 0.9999 0.9999 0.9999 0.9999 0.9999 0.9999 0.9999 0.9998
0.10 0.9998 0.9998 0.9998 0.9998 0.9998 0.9998 0.9999 0.9997
0.15 0.9997 0.9997 0.9997 0.9997 0.9997 0.9997 0.9997 0.9995
0.20 0.9996 0.9996 0.9996 0.9996 0.9995 0.9996 0.9996 0.9993
0.25 0.9995 0.9995 0.9995 0.9995 0.9994 0.9995 0.9994 0.9991
0.30 0.9992 0.9992 0.9992 0.9992 0.9991 0.9992 0.9992 0.9990
0.35 0.9991 0.9991 0.9991 0.9991 0.9990 0.9991 0.9990 0.9988
0.40 0.9990 0.9990 0.9989 0.9990 0.9989 0.9990 0.9987 0.9986
When the payloads were set to the range of [0.25 – 0.40] bpp, the number of required changes has
increased to hide a secret message. Therefore, the stego-images of CBL cannot maintain a low distortion in
terms of structure. Hence, Table 3 shows that SSIM values of stego-images generated by CBL are smaller
than those values of stego-images produced by JND_AGMME2 for all payloads. In comparison with
EALSBMR, JND_AGMME2 maintenances a better quality in structural of stego-images under various of
used embedding rates. This result is because EALSBMR uses the difference of the considered pixel and its
neighbor to determine whether the considered pixel located on complex regions or not. If an absolute
difference is higher than a predefined threshold T, then the two considering consecutive pixels are used to
6. Int J Elec & Comp Eng ISSN: 2088-8708
A secure image steganography based on JND model (Tuan Duc Nguyen)
2093
conceal secret message bits. Unfortunately, after embedding this approach need to readjust the value of stego
pixels to guarantee the difference between the two pixels is higher than threshold T. As a result, the change in
structural of the stego images created by EALSBMR is higher than that of the proposed approach.
3.2. Security analysis
a. Regular/singular attack
As a rule, employing the LSB of pixels to conceal secret message bits causes the statistical changes
of images. However, this distortion is invisible to HVS and LSB Enhancement is ineffective in discovering
a hidden message if the given message is embedded into edge pixels. Hence, in this subsection, to reliably
and accurately determine the existence of a mysterious message hidden by the proposed approach,
Regular/Singular steganalysis introduced by Fridrich et al. is employed [23].
In this test, a discrimination function and a flipping operation are used to identify three groups of
pixels Regular (R), Singular (S) and Unchanged (U). In general, the identification of these groups express on
how the flipping changes the value of discrimination function [26]. To evaluate the size of secret message,
the relative number of two groups is measured for the cover image and stego-image. The obtained results are
represented in RS diagram with four-dimensional RS features (RM, R-M, SM, S-M) and M is flipping mask.
As a rule, if a suspected stego image contains a secret message, the difference (in value) between features in
the pair (RM, R-M) and (SM, S-M) becomes larger when the embedding rate is increased [23].
To examine the security against RS steganalysis method of stego-images by the JND_AGMME2
and AG_MME2, the value of two groups in pairs (RM versus R-M, SM versus S-M) were plotted in Figure 2.
As it can be seen in Figure 2(a), it is obviously the higher data embedded, the larger dissimilarity of these
groups is. Contrary to AG_MME2, the relation of two groups in pairs in RS diagram (Figure 2(a)) is steady
unchanged even a large amount of message is hidden into stego-images by JND_AGMME2. This means that
JND_AGMME2 is robust to RS steganalysis. It can be observed that the randomly change of pixels in value
to carry message bits supports to remain the difference between these two groups in pairs as same as in
cover images.
(a) (b)
Figure 2. (a) RS diagram of stego-images produced by AG_MME2 and (b) JND_AGMME2
b. Security against ensemble classifier
In this subsection, we conduct an experiment to clarify the security against Ensemble Classifier
(an universal steganalysis based on feature set) [27] of the proposed approach. In this experiment, feature set
(including 1183 features) was extracted from each stego-image in divided segments by content-selective
residuals (CSR) [28] extractor, to be used in Ensemble classification. Out-of-bag (OOB) value is the testing
error introduced by Ensemble Classifier. Typically, the large OOB value indicates that the steganography
techniques can achieve a high security against Ensemble Classifier. Based on demonstrated results in
Figure 3, the security of JND_AGMME2 is significantly superior to three existing approaches (AG_MME2,
EALSBMR, and CBL) with payload is in the range of [0.05 – 0.40] bpp and various values of the two used
parameters (1, 2). The reason is that in JND_AGMME2 two factors were utilized in data hiding error
measurement. For the first criterion JND, the modifications with a changed value (of pixel) which is smaller
than the estimated JND value will cause less statistical noise than that of others. The high value of the second
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2088 - 2096
2094
criterion AG illustrates that the considered pixel locates in a complex region of image. That is obviously
employing JND and AG supports to reduce the possibility to be detected by Ensemble Classifier (illustrated
as high OOB errors). From the Table 4, it can be seen that with various values of the two used parameters,
the stego-images are produced with different security levels (illustrated by OOB errors). The security against
Ensemble Classifier is higher when the two parameters are non-zero. In other words, the possibility to detect
the existence of hidden message embedded by the proposed approach with the combination of gradient and
JND by Ensemble Classifier steganalyzer is reduced.
Figure 3. Comparision of security of stego-images produced by JND_AGMME2
and previous methods against Ensemble classifier
Table 4. Testing error OOB of JND_AGMME2 against CSR feature set
under different values were set to two parameters 1 and 2
bpp
OOB error
1=0.0
2=0.5
1=0.5
2=0.0
1=0.2
2=0.5
1=0.5
2=0.2
1=0.0
2=1.0
1=1.0
2=0.0
0.05 0.4372 0.4331 0.4418 0.4421 0.4425 0.4354
0.10 0.3114 0.3040 0.3118 0.3118 0.3073 0.3097
0.15 0.2866 0.2837 0.2893 0.2864 0.2845 0.2884
0.20 0.2067 0.2045 0.2060 0.2077 0.2038 0.2045
0.25 0.1825 0.1792 0.1814 0.1807 0.1822 0.1794
0.30 0.1389 0.1368 0.1379 0.1367 0.1372 0.1373
0.35 0.1184 0.1219 0.1220 0.1213 0.1235 0.1205
0.40 0.1018 0.0997 0.1028 0.1018 0.0998 0.1005
4. CONCLUSION
This paper proposed a secure channel selection rule-based steganography approach in spatial
domain. Two factors JND and AG are combined to estimate embedding degradation since JND reveals
the minimum visible threshold of HVS. While AG supports to identify the texture characteristic of image
region which the considered pixel belongs to. Therefore, the security of stego-images, produced by the new
scheme, against statistical steganalysis methods is enhanced. In the experiments conducted, although CSR
(the feature extractor with 1183 features) is employed instead for SPAM (including 686 features) in
Ensemble Classifier, the security of the proposed approach still overcomes the previous approaches.
In addition, RS analysis fails to detect the existence of mystery message embedded into stego-images by
the proposed approach. The proposed approach also offers high perceptual quality images proved by obtained
experimental results.
8. Int J Elec & Comp Eng ISSN: 2088-8708
A secure image steganography based on JND model (Tuan Duc Nguyen)
2095
ACKNOWLEDGEMENTS
The authors gratefully acknowledge the financial support of Hanoi Open University for this
research. We would like to thank our colleagues from Faculty of Information Technology, Hanoi Open
University who provided valuable suggestions that greatly assisted the research.
REFERENCES
[1] Y. Zhong, F. Huang, and D. Zhang, “New Channel Selection Criterion for Spatial Domain Steganography,” in
Digital Forensics and Watermaking, vol. 7809, Y. Q. Shi, H.-J. Kim, and F. Pérez-González, Eds. Berlin,
Heidelberg: Springer Berlin Heidelberg, pp. 1–7, 2013.
[2] E. A. Abbood, R. M. Neamah, and S. Abdulkadhm, “Text in Image Hiding using Developed LSB and Random
Method,” Int. J. Electr. Comput. Eng. IJECE, vol. 8, no. 4, p. 2091, Aug. 2018.
[3] W. A. Shukur and K. K. Jabbar, “Information Hiding using LSB Technique based On Developed PSO Algorithm,”
Int. J. Electr. Comput. Eng. IJECE, vol. 8, no. 2, p. 1156, Apr. 2018.
[4] S. Khan and T. Bianchi, “Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region,” Int. J.
Electr. Comput. Eng. IJECE, vol. 8, no. 1, p. 379, Feb. 2018.
[5] Q. Mao, “A fast algorithm for matrix embedding steganography,” Digit. Signal Process., vol. 25, pp. 248–254,
Feb. 2014.
[6] C. Wang, W. Zhang, J. Liu, and N. Yu, “Fast Matrix Embedding by Matrix Extending,” IEEE Trans. Inf. Forensics
Secur., vol. 7, no. 1, pp. 346–350, Feb. 2012.
[7] Y. Kim, Z. Duric, and D. Richards, “Modified Matrix Encoding Technique for Minimal Distortion Steganography,”
in Information Hiding, vol. 4437, J. L. Camenisch, C. S. Collberg, N. F. Johnson, and P. Sallee, Eds. Berlin,
Heidelberg: Springer Berlin Heidelberg, pp. 314–327, 2007,.
[8] R. Crandall, “Some Notes on Steganography,” 1998.
[9] T. Yang and H. Chen, “Matrix embedding in steganography with binary Reed–Muller codes,” IET Image Process.,
vol. 11, no. 7, pp. 522–529, 2017.
[10] G. Liu, W. Liu, Y. Dai, and S. Lian, “Adaptive steganography based on block complexity and matrix embedding,”
Multimed. Syst., vol. 20, no. 2, pp. 227–238, Mar. 2014.
[11] A. Sarkar, U. Madhow, and B. Manjunath, “Matrix Embedding With Pseudorandom Coefficient Selection and
Error Correction for Robust and Secure Steganography,” Inf. Forensics Secur. IEEE Trans. On, vol. 5,
pp. 225–239, 2010.
[12] F. Huang, J. Huang, and Y.-Q. Shi, “New Channel Selection Rule for JPEG Steganography,” IEEE Trans. Inf.
Forensics Secur., vol. 7, no. 4, pp. 1181–1191, Aug. 2012.
[13] Weiqi Luo, Fangjun Huang, and Jiwu Huang, “Edge Adaptive Image Steganography Based on LSB Matching
Revisited,” IEEE Trans. Inf. Forensics Secur., vol. 5, no. 2, pp. 201–214, Jun. 2010.
[14] K.-H. Jung and K.-Y. Yoo, “Data hiding using edge detector for scalable images,” Multimed. Tools Appl., vol. 71,
no. 3, pp. 1455–1468, Aug. 2014.
[15] A. Westfeld, “F5—A Steganographic Algorithm,” in Information Hiding, vol. 2137, I. S. Moskowitz, Ed. Berlin,
Heidelberg: Springer Berlin Heidelberg, pp. 289–302, 2001.
[16] F. Huang, W. Luo, J. Huang, and Y.-Q. Shi, “Distortion function designing for JPEG steganography with
uncompressed side-image,” Proceedings of the 2013 ACM Information Hiding and Multimedia Security Workshop,
2013, pp. 69-76.
[17] V. Sabeti, S. Samavi, and S. Shirani, “An adaptive LSB matching steganography based on octonary complexity
measure,” Multimed. Tools Appl., vol. 64, no. 3, pp. 777–793, Jun. 2013.
[18] T. D. Nguyen, S. Arch-int, and N. Arch-int, “A novel secure channel selection rule for spatial image
steganography,” in 2015 12th International Joint Conference on Computer Science and Software Engineering
(JCSSE), 2015, pp. 230–235.
[19] A. B. Watson, “DCT quantization matrices visually optimized for individual images,” Proceedings of SPIE - The
International Society for Optical Engineering, 1913–14, pp. 202–216, 1993.
[20] M. Fakhredanesh, R. Safabakhsh, and M. Rahmati, “A Model-Based Image Steganography Method Using
Watson’s Visual Model,” ETRI J., vol. 36, no. 3, pp. 479–489, Jun. 2014.
[21] Tuan Duc Nguyen and Huu Dung Le, “A new secure steganography method for grayscale images in spatial domain
based on Just Noticeable Difference model,” in The 19th National Symposium of Selected ICT Problems, Ha Noi,
pp. 14–20, 2016.
[22] A. Liu, W. Lin, M. Paul, C. Deng, and F. Zhang, “Just Noticeable Difference for Images With Decomposition
Model for Separating Edge and Textured Regions,” IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 11,
pp. 1648–1652, Nov. 2010.
[23] J. Fridrich, M. Goljan, and R. Du, “Reliable Detection of LSB Steganography in Color and Grayscale Images,”
IEEE Multimed., vol. 8, pp. 22–28, 2001.
[24] H.-H. Liu and C.-M. Lee, “High-capacity reversible image steganography based on pixel value ordering,”
EURASIP J. Image Video Process., vol. 2019, no. 1, p. 54, Apr. 2019.
[25] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image Quality Assessment: From Error Measurement
to Structural Similarity,” IEEE TRANS IMAGE Process., vol. 13, pp. 600–612, 2004.
[26] J. Fridrich, M. Goljan, D. Hogea, and D. Soukal, “Quantitative steganalysis of digital images: estimating the secret
message length,” Multimed. Syst., vol. 9, no. 3, pp. 288–302, Sep. 2003.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 2088 - 2096
2096
[27] J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble Classifiers for Steganalysis of Digital Media,” IEEE Trans. Inf.
Forensics Secur., vol. 7, no. 2, pp. 432–444, Apr. 2012.
[28] T. Denemark, J. Fridrich, and V. Holub, “Further study on the security of S-UNIWARD,” Proceedings of SPIE -
The International Society for Optical Engineering, vol. 9028 p. 902805, 2014.
BIOGRAPHIES OF AUTHORS
Tuan Duc Nguyen has received the PhD degree in Computer Science from Khon Kaen University
(KKU), Khon Kaen, Thailand, in 2016. He received the M.SC degree from Le Qui Don Technical
Univeristy, Vietnam in 2008. He is currently working as a lecturer in Faculty of Information
Technology, Hanoi Open University, Hanoi, Vietnam. His research interests are cryptography,
steganography and cloud computing. Contact him at nguyenductuan@hou.edu.vn
Huu Dung Le has received the M. Sc degree in Applied Mathematics for Information Technology
from VNU University of Science, Hanoi, Vietnam since 2015. He is currently a lecturer of Faculty
of Information Technology, Hanoi Open University, Hanoi, Vietnam. His research interests are
security and data science. Contact him at huudungle@hou.edu.vn