Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in
the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an
adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a
learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image. The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth
safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are
discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
Efficiency of LSB steganography on medical information IJECEIAES
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
LLC is a gainful method for contributing to acquire a lot of rate of profitability (ROI) in the UAE. The tax-exempt approach and no confinement capital repatriation limitations of the UAE government are pulling in financial specialists from everywhere throughout the world to build up their organizations in the UAE. You can simply find Bank account services in UAE with the help of a reliable UAE Offshore company formation company. Organizations with outside accomplices are picking to set up LLC in the UAE as the nation gives most extreme lawful proprietorship.
Image Compression based on DCT and BPSO for MRI and Standard ImagesIJERA Editor
Nowadays, digital image compression has become a crucial factor of modern telecommunication systems. Image compression is the process of reducing total bits required to represent an image by reducing redundancies while preserving the image quality as much as possible. Various applications including internet, multimedia, satellite imaging, medical imaging uses image compression in order to store and transmit images in an efficient manner. Selection of compression technique is an application-specific process. In this paper, an improved compression technique based on Butterfly-Particle Swarm Optimization (BPSO) is proposed. BPSO is an intelligence-based iterative algorithm utilized for finding optimal solution from a set of possible values. The dominant factors of BPSO over other optimization techniques are higher convergence rate, searching ability and overall performance. The proposed technique divides the input image into 88 blocks. Discrete Cosine Transform (DCT) is applied to each block to obtain the coefficients. Then, the threshold values are obtained from BPSO. Based on this threshold, values of the coefficients are modified. Finally, quantization followed by the Huffman encoding is used to encode the image. Experimental results show the effectiveness of the proposed method over the existing method.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in
the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an
adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a
learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image. The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth
safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are
discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
Efficiency of LSB steganography on medical information IJECEIAES
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
LLC is a gainful method for contributing to acquire a lot of rate of profitability (ROI) in the UAE. The tax-exempt approach and no confinement capital repatriation limitations of the UAE government are pulling in financial specialists from everywhere throughout the world to build up their organizations in the UAE. You can simply find Bank account services in UAE with the help of a reliable UAE Offshore company formation company. Organizations with outside accomplices are picking to set up LLC in the UAE as the nation gives most extreme lawful proprietorship.
Image Compression based on DCT and BPSO for MRI and Standard ImagesIJERA Editor
Nowadays, digital image compression has become a crucial factor of modern telecommunication systems. Image compression is the process of reducing total bits required to represent an image by reducing redundancies while preserving the image quality as much as possible. Various applications including internet, multimedia, satellite imaging, medical imaging uses image compression in order to store and transmit images in an efficient manner. Selection of compression technique is an application-specific process. In this paper, an improved compression technique based on Butterfly-Particle Swarm Optimization (BPSO) is proposed. BPSO is an intelligence-based iterative algorithm utilized for finding optimal solution from a set of possible values. The dominant factors of BPSO over other optimization techniques are higher convergence rate, searching ability and overall performance. The proposed technique divides the input image into 88 blocks. Discrete Cosine Transform (DCT) is applied to each block to obtain the coefficients. Then, the threshold values are obtained from BPSO. Based on this threshold, values of the coefficients are modified. Finally, quantization followed by the Huffman encoding is used to encode the image. Experimental results show the effectiveness of the proposed method over the existing method.
A deficiência de ferro é a deficiência nutricional mais comum e as mulheres estão na faixa de maior risco. O ferro é crítico para a produção de hemoglobina, uma proteína que ajuda as células vermelhas do sangue a fornecer oxigênio para todo o corpo. Assim, sem ele, o corpo todo sofre - e pode se tornar anêmico.
Impediments to the Successful Utilization of Pakistan’s Coal ResourcesIJERA Editor
Pakistan is endowed with a vast variety of minerals including coal. However, despite its significant amount of coal deposits of about 186billion tons, no significant contribution to the country’s GDPhas been realized from this resource. Also, in the face of the possession of this ‘richness’ in coal deposits, the country is still facing acute shortage of electricity, which wipes off about 2% of GDP annually. The current deposits of coal can give Pakistan its much needed social and economic boost. Unfortunately, Pakistan has not been able to utilize its Thar coal potential fully since its discovery in 1992, for instance, due to policy issues and other concerns. This paper investigates the current markets, trends and utilization modes for Pakistan’s coal with reference to the reasons for failure of the Thar coal project as well as opportunities available for Pakistan, going forward.
Selection of Equipment by Using Saw and Vikor Methods IJERA Editor
Now a days, Lean manufacturing becomes a key strategy for global competition. In this environment the most important process is the selection of the equipment. Equipment selection is a very important issue for effective manufacturing companies due to the fact that improperly selected machines can negatively affect the overall performance of manufacturing system. The availability of large number of equipments are more hence, the selection of suitable equipment for certain operation/ product becomes difficult. On the other hand selecting the best equipment among many alternatives is a Multi-criteria decision making ( MCDM ) Problems. In this Paper an approach which employs SAW, VIKOR Methods proposed for the equipment selection problem. The SAW and VIKOR is used to analyze the structure of the equipment selection problem and to determine weights of criteria and to obtain Final Ranking
To Establish Evacuation Decision-Making Selection Modes of Aboriginal Tribes ...IJERA Editor
In this study I try to utilize the concepts of ―environmental vulnerability‖ and ―evacuation behaviors among minority groups‖ and apply the evacuation selection mode generated from the public hazard perception to geographic information system, and analyze movement paths of residents during after disaster by using composite technology so that I can modify the suggested service scope and capacity of evacuation sites in the regions investigated in this study and provide minority groups with optimal selection mode.
A Review- Fog Computing and Its Role in the Internet of ThingsIJERA Editor
Fog computing extends the Cloud Computing paradigm to the edge of the network, thus enabling a new breed of applications and services. Dening characteristics of the Fog are: a) Low latency and location awareness; b) Wide-spread geographical distribution; c) Mobility; d) Very large number of nodes, e) Predominant role of wireless access, f) Strong presence of streaming and real time applications, g) Het-erogeneity. In this paper we argue that the above characteristics make the Fog the appropriate platform for a number of critical Internet of Things (IoT) services and applications, namely, Connected Vehicle, Smart Grid , Smart Cities, and, in general, Wireless Sensors and Actuators Net-works (WSANs).
Allocation of Transmission Cost Using Power Flow Tracing MethodsIJERA Editor
In the open access restructured power system market, it is necessary to develop an appropriate pricing scheme that can provide the useful economic information to market participants, such as generation, transmission companies and customers. Though many methods have already been proposed, but accurately estimating and allocating the transmission cost in the transmission pricing scheme is still a challenging task. This work addresses the problem of allocating the cost of the transmission network to generators and demands. In this work four methods using DC Power flow and AC power flow have been attempted. They are MW-Mile Method, MVA-Mile Method, GGDF method and Bialek Tracing method.MVA-Mile method and Bialek Tracing method applies AC power flow and considers apparent power flows. The purpose of the present work is to allocate the cost pertaining to the transmission lines of the network to all the generators and demands. A load flow solution is run and, the proposed method determines how line flows depend on nodal currents. This result is then used to allocate network costs to generators and demands. The technique presented in this work is related to the allocation of the cost to GENCO‘s TRANSCO‘s and DISCO‘s. A technique for tracing the flow of electricity of lines among generators with GGDF and Bialek upstream looking algorithm is proposed. With these methods correct economic signals are generated for all players. All these methods are tested on IEEE 14 bus system.
Improved Dead Reckoning Algorithm for Obstacle Avoidance and Automated CleaningIJERA Editor
This research presents a detailed account of map generating, comprehensive coverage, path plotting and scheming, as well as control mechanism for a mobile automation robot comprising of the automated ground cleaning of average to small indoor areas as an application objective. The algorithms put forward are centered upon supervised 2D map of the surrounding which is generated during the training phase and have the capacity to deal successfully with unforeseen obstacles which were not determined on the 2D map. The map is generated using dead reckoning algorithm and then an approach relying on templates is used for controlling execution of the path plan. The capability of the robot to deal with generation of the map, detecting unforeseen obstructions inside the work space and localizing itself in the map is the suggested approach’s originality. If unmapped obstructions continually block the planned path, the trajectory tracing control inserts these obstacles in the 2D map
Extract Business Process Performance using Data MiningIJERA Editor
This paper aimed to analyze the performance of the business process using process mining. The performance is very important especially in large systems .the process of repairing devices was used as case study and the Fuzzy Miner Algorithm used to analyze the process model performance
Implementation of Engraved Micro-Strip Antenna IJERA Editor
This paper asserts the study of a square shaped micro-strip patch antenna with Ultra-wideband characteristics. The antenna is composed of micro-strip line fed tosquare patch and lopsided shaped substrate. Various dielectric substrates are examined for the better performance and eventually used FR4-lossy as a substrate. Gain parameter, far-field radiation patterns and Voltage Standing Wave Ratio values are calculated and graphically represented at frequencies 3 GHz and 10 GHz respectively. It is shown that proposed antenna with escalated dimensions and copper as dielectric substrate has very low Return losses and high gain parameter for a Impedance bandwidth of 3 to 10 GHz at VSWR=1 in CST Microwave studio 2014
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image.
The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with
cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are some of the security measures applied in the cloud to secure user data. The objective of steganography is to hide the existence of communication from the unintended users whereas cryptography does provide security to user data to be transferred in the cloud. Since users pay for
the services utilize in the cloud, the need to evaluate the performance of the algorithms used in the cloud to
secure user data in order to know the resource consumed by such algorithms such as storage memory, network bandwidth, computing power, encryption and decryption time becomes imperative. In this work, we implemented and evaluated the performance of Text steganography and RSA algorithm and Image steganography and RSA as Digital signature considering four test cases. The simulation results show that, image steganography with RSA as digital signature performs better than text steganography and RSA algorithm. The performance differences between the two algorithms are 10.76, 9.93, 10.53 and 10.53 seconds for encryption time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45 kwh for processing power used when hiding and extracting data respectively. Except in test case2 where Text steganography and RSA algorithm perform better than Image Steganography and RSA as Digital Signature in terms of memory used when extracting data with performance difference of -5.09 mb because of the bit size of the image data when extracted. This research work recommend the use of image steganography and RSA as digital signature to cloud service providers and users since it can secure major data types such as text, image, audio and video used in the cloud and consume less system resources.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
Similar to A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value (20)
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
1. Farheen Fatima. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -4) October 2016, pp.01-06
www.ijera.com 1 | P a g e
A Secure & Optimized Data Hiding Technique Using DWT With
PSNR Value
Farheen Fatima1
, Dr.Deepak Arora2
1
Amity University, Lucknow, India
2
Amity University, Lucknow, India
ABSTRACT
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of
multimedia data of these applications, particularly over the web has increased the demand for protection of
copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection
and authentication of multimedia data while working in a networked environment. In this paper, a DWT based
watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum
tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each
coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size
is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to
pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function
criterion for the genetic algorithm decision making is based on PSNR values.
Keywords: Steganography,Watermarking,Discrete Wavelet Transform,Genetic Algorithm, Peak Signal to noise
Ratio, Data Hiding.
I. INTRODUCTION
Data Hiding or Steganography offers an
essential alternative to image integrity and
authenticity problem. It is a kind of data hiding
technique that provides another way of security
protection for digital image data. Unlike utilizing a
particular cipher algorithm to protect secret data
from illicit access, the purpose of steganography is
to embed secret data in preselected meaningful
images, called cover images, without creating
visually perceptible changes to keep an invader
unaware of the existence of the secret. Digital data
hiding is a multidisciplinary research area involving
theory of communications, signal processing,
multimedia coding, information theory,
cryptography and computer science etc. Soft
computing is one sub branch of computer science
which may be used to achieve tractable, robust, low
cost, optimal and adaptive solutions in data hiding
problems. Fuzzy Logic (FL), Rough Sets (RS),
Artificial Neural Networks (ANN), Genetic
Algorithms (GA) and Support Vector Machine
(SVM) etc. are the various components of soft
computing and each one offers specific attributes. In
data hiding problem, Genetic Algorithm(GA) may
be used for optimizing the fundamentally conflicting
requirements of imperceptibility, security and
robustness. Neural network may be used to design
robust watermarking for images to take advantages
of relatively easy algorithmic specification,pattern
mapping and classification. The feasibility of
Support Vector Machine (SVM) may be explored to
determine automatically where the significant blocks
are and to what extent the intensities of the block
pixels can be modified.
The proposed work is focused at achieving
watermarking of digital gray scale images using
Discrete Wavelet Transform (DWT), where the
hidden message image is to be embedded in one of
the coefficients out of the available four sub bands
of a 2D-DWT transform of the cover image. The
genetic algorithm based technique has been used to
embed the hidden image to the original image. The
rest of the paper gives a detailed description of the
method and result and analysis on various images.
II. BACKGROUND
The word "Steganography" is a Greek word
which literally means "covered or hidden writing".
In other words Steganography is an art and science
of hiding secret information behind the cover
medium. It is the art of concealed communication.
Cover medium can be any multimedia content like
digital images, audio files or video files. K.B. Raja
et al have mentioned that the main motive of
steganography is to hide the existence of
communication [1]. Steganography, watermarking
and cryptography are the three fields which are
closely interrelated to each other and belong to same
family i.e. Security. Steganography and
watermarking process is very difficult to
differentiate especially for those which are from
different disciplines. Figure 1 demonstrates the
taxonomy of security system.
RESEARCH ARTICLE OPEN ACCESS
2. Farheen Fatima. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -4) October 2016, pp.01-06
www.ijera.com 2 | P a g e
Fig 1: Taxonomy of Security Systems
GA are adaptive heuristic search algorithm
based relying on the evolutionary thoughts of usual
collection and inheritance. In [10]Gopesh Joshi‟s
work stand for a bright development of a random
investigation used to explain optimization problems.
The basic technique of the Gas are planned to
stimulate process in usual system essential for
progress ,particularly those go after the standard laid
down.GA are based on an similarity with the genetic
structure and performance of chromosomes within a
population of those. In the genetic algorithm
crossover and mutation operators are used for to
generate the optimized production in the crossover
which represents the mate among those. And
mutation which represent random modification,
selection operator provide liking to better
individuals, allow them to pass on their genes to the
next generation. The honesty of all individual
depends leading its fitness. In crossover operator
main famous factor of GA from extra optimization
techniques.
Let us suppose we have the chromosome:
C = 𝒙+𝒚*𝒚-𝒙/𝒚 (1)
And the appliance of mutation operator affect the
genes.
Then a new obtained chromosome can be:
C = 𝒙+𝒙*𝒚+𝒙/𝒚 (2)
The value of the gene corresponding to the
third position has been changed from 𝒚 to 𝒙 and the
value of the gene corresponding to the sixth position
(“-“) to (“+”).
Types of Steganography Technique
1) Spatial Domain Steganography
In spatial domain steganographic
techniques secret information is directly embedded
in pixel values i.e. pixels are directly altered to store
secret messages. Basically these techniques are very
simple but have greater impact then other
techniques.
a) Least Significant Bit Substitution Algorithm:
LSB substitution algorithm is simplest form of
algorithm in which LSBs of the cover image is
modified according to the secret message. It is
simple yet effective technique of embedding secret
data into images. Each pixel is of 8 bits in case of
Gray scale images. Color RGB images use 24 bits to
store color information each 8 bits for Red, Green
and Blue components. The Advantages of this
algorithm is simplicity and high perceptual
efficiency. It can also achieve high embedding
capacity but this algorithm is sensitive to image
manipulations such as cropping, scaling and
rotations, Lossy compression and addition of noise.
There are number of variations of this algorithm
including Edge and texture masking of cover image
to determine the number k bits of LSBs for data
embedding [3], Adaptive LSB algorithm based on
brightness, optimized LSB algorithm using cat
swarm and genetic algorithm [4,5], image
steganography based on histogram modifications
[6,7] etc. This research work mainly focuses on LSB
steganography algorithm, so the rest of all the
algorithms available in the literature will not be
discussed in detail.
b) Pixel Value Differencing: This technique sub
divides the cover image into non overlapping blocks
consisting of two connecting pixels. This technique
hides the data by altering the difference between two
connected pixels. High difference in the cover image
pixel value allows the higher alterations. Area of the
pixel decides the hiding capacity of this technique
for example if edge area is chosen then the
difference is high in between the connecting pixels,
whereas in smooth areas, difference is low.So ideal
choice is to select edge areas to embed the secret
message that is having more embedding capacity.As
inferred by the results of D.Wu et al. [8], stego
image produced by this technique has more quality
and has better imperceptibility results .
c) Grey Level Modification: In this technique data
is mapped by applying some modifications to the
gray values of the image pixels. This technique will
not hide or embed data, instead it map the data by
using some mathematical functions. Set of pixels are
selected for mapping using this mathematical
function. It uses the concept of odd and even
numbers for mapping the data in cover image.
V.M.Potdar et al.[9] have given a technique in which
high hiding capacity and low computational are
some advantages of this technique.
2) Prediction based Steganography
In this technique pixel values are predicted
with the help of predicator. This technique removes
the loopholes of other techniques which directly
3. Farheen Fatima. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -4) October 2016, pp.01-06
www.ijera.com 3 | P a g e
embed the secret data into pixel values. In order to
improve hiding capacity and visual quality it uses
prediction error values (EV). EVs are altered to hide
the secret data. It consists of two steps, namely
prediction step and entropy coding. In prediction
step predicators are used to determine the pixel
values of a cover image and in the second step
entropy coding of prediction error values is done.
3) Transform or Frequency Domain
Steganography
Transform domain steganography
techniques are the most complex way to embed the
secret data in the cover image. Any image in digital
form is made up of high and low frequency
components. Digital image can have smooth and
edge (sharp) areas. Smooth areas represent low
frequency whereas high frequency is represented by
edge or sharp areas of the cover image. Changes
done in low frequency areas can easily be visible to
human eyes. So it is not possible to embed equal
amount of secret information in all the regions. It has
number advantages over the spatial domain methods
of steganography such as it is more robust against
compression, image processing and cropping and
these methods are less prone to attacks. These
techniques are not dependent upon image file
format. Transform domain steganography techniques
are broadly classified into following types:
a) Discrete Wavelet Transformation Technique:
Discrete wavelet transformation techniques divides
the cover image into four sub bands where higher
band represent finer details and lower band has more
important information. Entropy coders locate the
transform coefficients and encode them. DWT
technique has extra edge over DCT that it offers
efficient energy compaction than DCT without any
blocking artifacts after the process of coding. DWT
has multi-resolution nature that make it best fit for
scalable image coding. There are several other types
of transforms that can applied with DWT such as
integer transform, curvelet transform, contourlet
transform, dual tree DWT etc.
b) Discrete Cosine Transformation Technique:
Discrete cosine transformation is very famous
steganography techniques which is best suited for
JPEG images. JPEG images are widely used over the
internet and have lossy nature of compression. DCT
is extensively used for image and video
compression. Every block of DCT is quantized with
the help of quantization table of JPEG. Quantized
coefficients are used to embed the secret message.
Afterward coding methods are applied such as
Huffman coding. In this technique high frequency
regions are better for information hiding as they
often become zero after the process of quantization.
Hence it is not necessary to modify the coefficient
value if the embedded data is zero. JSteg/ JPHide,
F5, YASS (Yet another steganographic scheme) and
outguess are some of the DCT steganography tools.
III. EXPERIMENTAL SETUP
The proposed work uses Genetic Algorithm
to locate the optimal positions for embedding the
watermark. The below diagram shows a flowchart
for the embedding and extraction process.
Fig. 2: Embedding Procedure
The image which is to be secured also
known as original image, is read into the engine, as
shown in the above diagram. It is converted to
grayscale type. The hidden message is then
generated. The hidden message which is to be
watermarked or embedded inside the original image
can be any text, image or audio message. For our,
engine we have taken a bit mapped image, with text
„BEST‟ written in it as shown in Fig 5. The 2-d
Wavelet Transform is then computed to get the
detailed coefficients of the image. The Daubechies
filter „db1‟ is used as wavelet filter. The PSNR
values are then calculated for all coeffcients and
based on it, the fitness function is generated. The
fitness function is given as a vectorized PSNR
obtained from each co-efficients.
Fitness Funtion:
F=PSNR(1)+PSNR(2)+PSNR(3)+PSNR(4) (1)
where PSNR is Peak Signal to Noise Ratio and
1,2,3,4 are the indexes of four quadrants of DWT.
The genetic algorithm is then applied with
the given fitness function and the image is
watermarked into the co-efficient for which best
value is obtained. This summarizes the complete
embedding procedure.
The block diagram for extraction is as shown below:
4. Farheen Fatima. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -4) October 2016, pp.01-06
www.ijera.com 4 | P a g e
Fig 3: Extraction procedure
The extraction method is comparatively
simple; the image which is supposed to be
watermark is read into the system. 2-D watermark
using the same filters is applied to it. The equation
(2), given below is applied to it, to obtain the pixel
value information of the hidden message. If the
image is watermarked one, then the hidden message
i.e the image „BEST‟ is obtained either partially or
fully. The partial appearance is attributed to the
noise or distortion, which can be added at various
stages of data transmission
cc=abs(cv1./N) (2)
where cc is hidden message, cv1 is the coefficients
of DWT and N is watermark size.
IV. RESULTS AND DISCUSSION
The simulation is performed using
MATLAB software platform on standard gray scale
images of size 256x256 like mandrill, boat, peppers
and Lena. MATLAB contains an extensive platform
for programming, calculation and graphics which
makes it a tool of choice for academic research and
study. The below figures show the various results
taking a peppers image.
Fig 4: Original Image (Peppers)
Fig 5: Hidden Message
Fig 5.shows the hidden message which is a
bit mapped(.bmp) image, which is being used as the
authentication key.
Fig 6: Watermarked Image
As can be seen from Fig 6, the method
gives a high level of image perceptibility which is
necessary for invisible watermarking applications.
The watermarked image appears exactly similar to
the original image and it is fairly impossible to
differentiate it with the original image.
Fig. 7: Extracted Watermark
The Fig. 7, contains the watermarked or
hidden message as extracted from the watermarked
5. Farheen Fatima. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -4) October 2016, pp.01-06
www.ijera.com 5 | P a g e
image, thus the method performs good on the
security ground as well.
Now let us consider a situation, where this
system is being used as a security and authentication
measure. The images are transmitted from one end.
Before transmitting every image is embedded with a
particular hidden security keyword as in the above
case is „BEST‟.
At the receiver end, we will have the
extraction procedure. After going through the
extraction procedure, if the hidden message is
retrieved, either partially (due to noise addition
during transmission) or completely (as shown in Fig.
6), then we can be assured that the image received at
the receiver end is the original image.
Now let us suppose, an intruder hacks our
data transfer system and fraudulently replaces the
image with some other fake image. Then, on passing
through the extraction procedure, the image will not
yield the key. Thus, proving that the image received
is not at all, the original one sent at the transmitter
end.
Thus, the security of a particular
communication system or data transfer involving
images can be ensured by using the proposed
method, where both the transmitter and receiver are
aware of the „Key Image‟, which is hidden inside the
cover or original image. In a way it is a public key
sharing based cryptography method.
Figure 8: Results on Lena Image
Figure 9: Results on Mandrill Image
Figure 10: Results on Boat Image
Table 1: Comparison Results with Other Papers
Host
Image
PSNR
Values [1]
PSNR
Values [2]
Proposed
Work
Peppers 44.8291 30.65 56.70
Boat 44.860226 29.75 53.45
Lena 44.783592 30.34 48.65
Mandrill 44.9216 26.46 52.62
V. CONCLUDING REMARKS
The area of data security is always a key
concern when designing any communication system.
In this research, security of image data has been
studied at length in terms of Image Watermarking
and Steganography. The various paradigms of image
security have been discussed. The research then
moves on to suggesting a Genetic Algorithm based
watermarking technique, which is based out of basic
2-D DWT. The Genetic Algorithm optimization
technique is used to find out the best region for the
hidden message to be embedded in. The PSNR
values of the various sub bands of DWT are used to
form the fitness function used in this research. The
technique is then tested on some standard test
images and shows a considerable improvement in
PSNR values and at the same time maintaining a
high level of perceptibility of the Watermarked
Image.
REFERENCES
[1]. K.B. Raja, C.R. Chowdary, K.R.
Venugopal and L. M. Patnaik, “A Secure
Image Steganography using LSB, DCT and
Compression Techniques on Raw Images”,
Proceeding of 3rd IEEE International
conference on Intelligent Sensing and
Information Processing (ICISIP), (2005)
December 14-17, Bangalore, India.
[2]. A. Cheddad, J. Condell, K. Curran, and P.
M. Kevitt, “Digital image steganography:
survey and analysis of current methods”,
Signal Processing, vol. 90, no. 3, (2010).
[3]. H. Yang, X. Sun, and G. Sun, “A High-
Capacity Image Data Hiding Scheme using
Adaptive LSB Substitution” , Radio
Engineering, vol. 18, no. 4, (2009).
[4]. Z. H. Wang, C. C. Chang, and M. C. Li,
“Optimizing Least Significant Bit
6. Farheen Fatima. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 6, Issue 10, ( Part -4) October 2016, pp.01-06
www.ijera.com 6 | P a g e
Substitution using Cat Swarm Optimization
Strategy”, Information Sciences, vol. 192,
no. 1, (2012).
[5]. S. Wang, B. Yang, and X. Niu, “A secure
steganography method based on genetic
algorithm”, Journal of Information Hiding
and Multimedia Signal Processing”, vol. 1,
no. 1 (2010).
[6]. Z. Zhao, H. Luo, Z. M. Lu, and J. S. Pan,
“Reversible Data Hiding Based on
Multilevel Histogram Modification and
Sequential Recovery”, International Journal
of Electronics and Communication, vol. 65,
no. 10, (2011).
[7]. C. C. Lin, W. L. Tai, and C. C. Chang,
“Multilevel Reversible Data Hiding Based
on Histogram Modification of Difference
Images”, Pattern Recognition, vol. 41, no.
12, (2008).
[8]. D. Wu, and W.H. Tsai, “A Steganographic
Method for Images by Pixel Value
Differencing”, Pattern Recognition, vol. 24,
no. 9-10, (2003).
[9]. V. M. Potdar, and E. Chang,“Gray Level
Modification Steganography for Secret
Communication”, Proceeding of 2nd IEEE
International Conference on Industrial
Informatics (INDIN), (2004) June 26-26,
Berlin, Germany.
[10]. Gopesh Joshi, “Review of Genetic
Algorithm: An Optimization Technique”,
InternationalInternational Journal of
Advanced Research in Computer Science
and Software Engineering, Volume 4, Issue
4,April2014
[11]. Tsai, P., Hu, Y.-C., & Chang, C.-C.“A
color image watermarking scheme based on
color quantization. Signal Processing”,
84(1), 95-106. doi:
10.1016/j.sigpro.2003.07.012.
[12]. Su, J. K., Hartung, F., & Girod, B. “ Digital
watermarking of text, image, and video
documents” Computers & Graphics,
22(6), 687-695. doi: 10.1016/s0097-
8493(98)00089-2,1998
[13]. Popa, R. An analysis of steganographic
techniques. The Politehnica University of
Timisoara, Faculty of Automatics and
Computers, Department of Computer
Science and Software Engineering,1998
[14]. Yu, Y.-H., Chang, C.-C., & Lin, I.-C. “A
new steganographic method for color and
grayscale image hiding. Computer Vision
and Image Understanding”, 107(3), 183-
194. doi: 10.1016/j.cviu.2006.11.002, 2007
[15]. Cheddad, A., Condell, J., Curran, K., & Mc
Kevitt, P. (2010). Digital image
steganography: Survey and analysis of
current methods. Signal Processing, 90(3),
727-752,2007