International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
This document proposes a novel image steganography technique based on pixel pair matching. The technique uses "diamond encoding" to embed secret data by adjusting pixel values in image blocks. It can conceal a (2k^2 + 2k + 1)-ary digit into each pixel pair by modifying at most one pixel value. The embedding and extraction processes are described. Experimental results on test images like Lena show the technique can hide more secret data while maintaining good stego-image quality as measured by PSNR, outperforming simple LSB substitution methods.
This document describes two novel image hiding schemes: Optimal Pixel Pair Matching (OPAP) and Diamond Encoding (DE).
OPAP embeds secret data by adjusting pixel values at their optimal level using least significant bit substitution to minimize embedding distortion. DE extends the Exploiting Modification Direction method by concealing secret digits in a diamond-shaped neighborhood of pixel pairs using a diamond characteristic value.
Experimental results show that both OPAP and DE provide acceptable image quality while embedding a significant amount of data, with DE able to embed larger payloads than OPAP by exploiting a diamond-shaped pixel neighborhood. DE selectively embeds data according to a specific notational system but maintains imperceptible stego-image quality
Image steganography techniques can be classified into two major categories such as spatial domain techniques and frequency domain techniques.
In spatial domain techniques the secret message is hidden inside the image by applying some manipulation over the different pixels of the image.
In frequency domain techniques the image is transformed to another form by applying a transformation like discrete wavelet transform and then the message is hidden by applying any of the usual embedding techniques.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...cscpconf
In a gray scale image the pixel value ranges from 0 to 255. But when we use pixel-value
differencing (pvd) method as image steganographic scheme, the pixel values in the stego-image
may exceed gray scale range. An adaptive steganography based on modified pixel-value
differencing through management of pixel values within the range of gray scale has been
proposed in this paper. PVD method is used and check whether the pixel value exceeds the
range on embedding. Positions where the pixel exceeds boundary has been marked and a delicate handle is used to keep the value within the range. From the experimental it is seen that the results obtained in proposed method provides with identical payload and visual fidelity of stego-image compared to the pvd method
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
This document proposes a novel image steganography technique based on pixel pair matching. The technique uses "diamond encoding" to embed secret data by adjusting pixel values in image blocks. It can conceal a (2k^2 + 2k + 1)-ary digit into each pixel pair by modifying at most one pixel value. The embedding and extraction processes are described. Experimental results on test images like Lena show the technique can hide more secret data while maintaining good stego-image quality as measured by PSNR, outperforming simple LSB substitution methods.
This document describes two novel image hiding schemes: Optimal Pixel Pair Matching (OPAP) and Diamond Encoding (DE).
OPAP embeds secret data by adjusting pixel values at their optimal level using least significant bit substitution to minimize embedding distortion. DE extends the Exploiting Modification Direction method by concealing secret digits in a diamond-shaped neighborhood of pixel pairs using a diamond characteristic value.
Experimental results show that both OPAP and DE provide acceptable image quality while embedding a significant amount of data, with DE able to embed larger payloads than OPAP by exploiting a diamond-shaped pixel neighborhood. DE selectively embeds data according to a specific notational system but maintains imperceptible stego-image quality
Image steganography techniques can be classified into two major categories such as spatial domain techniques and frequency domain techniques.
In spatial domain techniques the secret message is hidden inside the image by applying some manipulation over the different pixels of the image.
In frequency domain techniques the image is transformed to another form by applying a transformation like discrete wavelet transform and then the message is hidden by applying any of the usual embedding techniques.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...cscpconf
In a gray scale image the pixel value ranges from 0 to 255. But when we use pixel-value
differencing (pvd) method as image steganographic scheme, the pixel values in the stego-image
may exceed gray scale range. An adaptive steganography based on modified pixel-value
differencing through management of pixel values within the range of gray scale has been
proposed in this paper. PVD method is used and check whether the pixel value exceeds the
range on embedding. Positions where the pixel exceeds boundary has been marked and a delicate handle is used to keep the value within the range. From the experimental it is seen that the results obtained in proposed method provides with identical payload and visual fidelity of stego-image compared to the pvd method
To help the hajjam in applying and removing the mihjamih.
Blade: For making superficial incisions within the marked area.
Syringe: Used nowadays instead of sucking through the mouth to create vacuum.
Gloves: Used nowadays for hygienic reasons.
Zaater: Herbal powder applied after hijamah.
Fig. 9: Hijamah tools: 1- Mihjamih (horn or cup), 2- Assistant's hands, 3- Blade, 4- Syringe, 5- Gloves, 6- Zaater (herbal powder).
the spring and autumn. The best time is early
morning before breakfast on an
La circunferencia se realizó con una tabla digital a mano alzada. El documento describe cómo se llevó a cabo la medición de una circunferencia utilizando una tabla digital sin apoyos o referencias externas, solo con la mano del usuario. El proceso de medición se completó exitosamente midiendo el perímetro de la circunferencia deseada.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Para resolver el problema de baja autoestima y desempeño escolar en alumnos de nuevo ingreso, el proyecto integra distintas asignaturas para demostrar cómo los conocimientos adquiridos pueden elevar la confianza y autoestima. Se creó un blog para publicar los resultados e incentivar a los estudiantes. El objetivo es que los alumnos fortalezcan su autoestima a través del desarrollo académico para mejorar su rendimiento escolar.
International Journal of Computational Engineering Research(IJCER)ijceronline
This document describes a mobile phone based system for remotely controlling multiple devices. The system uses cellular networks to transmit control signals from a mobile phone to a receiver connected to a PC and interface circuits. The PC program decodes the signals and sends commands to circuits controlling devices like motors, valves, levers, and sirens. The system integrates mobile and computing technologies to allow secure remote control of industrial and home appliances, reducing costs and manual labor.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Este documento describe platos típicos de Italia, Tailandia y Ecuador. En Italia, la gastronomía varía regionalmente y se centra en eventos familiares. Algunos platos italianos incluyen carpaccio, ensalada caprese, minestrone, canelones y pizza margarita. En Tailandia, los platos incluyen wonton, langostinos tempura, pad thai y mango sticky rice. Los platos ecuatorianos descritos son trió de tortillas de verde, corviche, bolón de verde, llapingach
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document provides details about Ananda Kumar T who is seeking a role as Manager Logistics & Stores. He has over 22 years of experience in warehouse management and logistics operations. Currently employed with Buhler India Pvt. Ltd. since 2008, he is responsible for managing a team of over 30 people and inventory worth over 50 crores. Prior to this, he has held roles with various companies like IFB Industries, Applicomp India, and Escorts Mahle Ltd. He is proficient in SAP MM module and aims to reduce inventory costs through efficient processes.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Este documento describe cómo las tabletas y computadoras pueden usarse en el aula para facilitar el aprendizaje de una manera didáctica y divertida. Explica que las tabletas pueden usarse como cuadernos de clase, libros de texto y para almacenar lecturas y materiales complementarios. También sugiere crear una plataforma virtual para compartir recursos y desarrollar tareas usando herramientas web 2.0 como foros de discusión y documentos compartidos. El objetivo es motivar la lectura y la comunicación pedagógica
All Star Displays have a wide range of exhibition stands, exhibit booth displays, pop up stands and other exhibition display systems. We are one the leading supplier of exhibition displays; Contact us today for all your exhibition needs.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
El documento contiene dos nombres de personas con sus respectivas fechas de nacimiento: Armida Mejía Orozco nació el 3 de Noviembre y María Teresa Arreola Rodríguez nació el 29 de Noviembre.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document proposes an efficient data steganography method called Adaptive Pixel Pair Matching (APPM) with high security. APPM hides data by substituting pixel pairs in a cover image based on a secret key. It defines an extraction function and compact neighborhood set for pixel pairs to minimize embedding distortion. APPM converts the secret message into digits of a B-ary numerical system for hiding. It calculates the optimal value of B and neighborhood set based on the image and message size. APPM generates a random embedding sequence using a key for substitution. It also provides an external password for additional security of the hidden message. The document claims this method provides better image quality and higher payload than previous pixel pair matching methods with increased security.
To help the hajjam in applying and removing the mihjamih.
Blade: For making superficial incisions within the marked area.
Syringe: Used nowadays instead of sucking through the mouth to create vacuum.
Gloves: Used nowadays for hygienic reasons.
Zaater: Herbal powder applied after hijamah.
Fig. 9: Hijamah tools: 1- Mihjamih (horn or cup), 2- Assistant's hands, 3- Blade, 4- Syringe, 5- Gloves, 6- Zaater (herbal powder).
the spring and autumn. The best time is early
morning before breakfast on an
La circunferencia se realizó con una tabla digital a mano alzada. El documento describe cómo se llevó a cabo la medición de una circunferencia utilizando una tabla digital sin apoyos o referencias externas, solo con la mano del usuario. El proceso de medición se completó exitosamente midiendo el perímetro de la circunferencia deseada.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Para resolver el problema de baja autoestima y desempeño escolar en alumnos de nuevo ingreso, el proyecto integra distintas asignaturas para demostrar cómo los conocimientos adquiridos pueden elevar la confianza y autoestima. Se creó un blog para publicar los resultados e incentivar a los estudiantes. El objetivo es que los alumnos fortalezcan su autoestima a través del desarrollo académico para mejorar su rendimiento escolar.
International Journal of Computational Engineering Research(IJCER)ijceronline
This document describes a mobile phone based system for remotely controlling multiple devices. The system uses cellular networks to transmit control signals from a mobile phone to a receiver connected to a PC and interface circuits. The PC program decodes the signals and sends commands to circuits controlling devices like motors, valves, levers, and sirens. The system integrates mobile and computing technologies to allow secure remote control of industrial and home appliances, reducing costs and manual labor.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Este documento describe platos típicos de Italia, Tailandia y Ecuador. En Italia, la gastronomía varía regionalmente y se centra en eventos familiares. Algunos platos italianos incluyen carpaccio, ensalada caprese, minestrone, canelones y pizza margarita. En Tailandia, los platos incluyen wonton, langostinos tempura, pad thai y mango sticky rice. Los platos ecuatorianos descritos son trió de tortillas de verde, corviche, bolón de verde, llapingach
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document provides details about Ananda Kumar T who is seeking a role as Manager Logistics & Stores. He has over 22 years of experience in warehouse management and logistics operations. Currently employed with Buhler India Pvt. Ltd. since 2008, he is responsible for managing a team of over 30 people and inventory worth over 50 crores. Prior to this, he has held roles with various companies like IFB Industries, Applicomp India, and Escorts Mahle Ltd. He is proficient in SAP MM module and aims to reduce inventory costs through efficient processes.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Este documento describe cómo las tabletas y computadoras pueden usarse en el aula para facilitar el aprendizaje de una manera didáctica y divertida. Explica que las tabletas pueden usarse como cuadernos de clase, libros de texto y para almacenar lecturas y materiales complementarios. También sugiere crear una plataforma virtual para compartir recursos y desarrollar tareas usando herramientas web 2.0 como foros de discusión y documentos compartidos. El objetivo es motivar la lectura y la comunicación pedagógica
All Star Displays have a wide range of exhibition stands, exhibit booth displays, pop up stands and other exhibition display systems. We are one the leading supplier of exhibition displays; Contact us today for all your exhibition needs.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
El documento contiene dos nombres de personas con sus respectivas fechas de nacimiento: Armida Mejía Orozco nació el 3 de Noviembre y María Teresa Arreola Rodríguez nació el 29 de Noviembre.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document proposes an efficient data steganography method called Adaptive Pixel Pair Matching (APPM) with high security. APPM hides data by substituting pixel pairs in a cover image based on a secret key. It defines an extraction function and compact neighborhood set for pixel pairs to minimize embedding distortion. APPM converts the secret message into digits of a B-ary numerical system for hiding. It calculates the optimal value of B and neighborhood set based on the image and message size. APPM generates a random embedding sequence using a key for substitution. It also provides an external password for additional security of the hidden message. The document claims this method provides better image quality and higher payload than previous pixel pair matching methods with increased security.
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
This paper presents an efficient algorithm to accelerate software video encoders/decoders by reducing the number of arithmetic operations for Discrete Cosine Transform (DCT). A multiplierless Ramanujan Ordered Number DCT (RDCT) is presented which computes the coefficients using shifts and addition operations only. The reduction in computational complexity has improved the performance of the video codec by almost 58% compared with the commonly used integer DCT. The results show that significant computation reduction can be achieved with negligible average peak signal-to-noise ratio (PSNR) degradation. The average structural similarity index matrix (SSIM) also ensures that the degradation due to the approximation is minimal.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
The document proposes a color image steganography method based on pixel value differencing (PVD) in the spatial domain. It separates each color channel of a pixel into separate matrices and applies PVD separately to embed bits in a sequential order across the channels. It embeds different number of bits in different channels for increased security and quality. It overcomes the issue of pixel values exceeding the 0-255 range in previous PVD methods by selectively embedding one less bit if needed to keep values in range. Experimental results show it provides better visual quality than previous PVD methods.
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
Most watermark methods use pixel values or coefficients as the judgment condition to embed or
extract a watermark image. The variation of these values may lead to the inaccurate condition
such that an incorrect judgment has been laid out. To avoid this problem, we design a stable
judgment mechanism, in which the outcome will not be seriously influenced by the variation.
The principle of judgment depends on the scale relationship of two pixels. From the observation
of common signal processing operations, we can find that the pixel value of processed image
usually keeps stable unless an image has been manipulated by cropping attack or halftone
transformation. This can greatly help reduce the modification strength from image processing
operations. Experiment results show that the proposed method can resist various attacks and
keep the image quality friendly.
This paper presents embedding of data in an image using pixel-value differencing technique. This scheme is used to embed large amount of data by changing the difference between two pixels so that we are able to increase the embedding capacity. There is another technique that is pixel value shifting which also increase the embedding capacity but according to this scheme capacity will increase at edge areas of image.
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
Copyright protection is a vital issue in modern day’s data transmission over
internet. For copyright protection, watermarking technique is extensively used. In this
paper, we have proposed a robust watermarking scheme using 2D Logistic map and elliptic
curve cryptosystem (ECC) in the DWT domain. The combined encryption has been taken to
enhance the security of the watermark before the embedding phase. The PSNR value shows
the difference between original cover and embedded cover is minimal. Similarly, NC values
show the robustness and resistance capability of the proposed technique from the common
attacks such as scaling, Gaussian noise etc. Thus, this combined version of 2D Logistic map
and Elliptic curve cryptosystem can be used in case of higher security requirement of the
watermark signal.
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
Steganography is the science of secret message delivery using cover media. The cover carriers can be image, video, sound or text data. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Chang method of Secret Reference Matrix. The data is hidden in 8 bit gray scale image using 256 X 256 matrix which is constructed by using 4 x 4 table with unrepeated digits from 0~15. The proposed method has high hiding capacity, better stego-image quality, requires little calculation and is easy to implement.
Chaos Image Encryption using Pixel shuffling cscpconf
This document proposes a chaos-based image encryption algorithm using pixel shuffling. It uses elements from a chaotic map like the Henon map or Lorentz map to shuffle the pixel positions of an image. The chaotic elements are divided into blocks corresponding to the RGB channels. Pixel positions are reordered according to the sorted indices of each block. Encryption scrambles the pixel positions, while decryption restores the original positions using the same chaotic map. Experimental results on brain and Lena images show the encrypted images have very low correlation with the originals. Slight key changes also result in completely different decryptions, demonstrating key sensitivity of the algorithm.
This document proposes a new digital image encryption technique based on multi-scroll chaotic delay differential equations (DDEs). The technique uses a XOR operation between separated binary planes of a grayscale image and a shuffled attractor image from a DDE. Security keys include DDE parameters like initial conditions, time constants, and simulation time. Experimental results using a 512x512 Lena image in MATLAB demonstrate the DDE dynamics, encryption/decryption security through histograms, power spectrums, and image correlations. Wrong key decryption is also shown. The technique offers potential for simple yet secure image transmission applications.
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcscpconf
Most watermark methods use pixel values or coefficients as the judgment condition to embed or
extract a watermark image. The variation of these values may lead to the inaccurate condition
such that an incorrect judgment has been laid out. To avoid this problem, we design a stable
judgment mechanism, in which the outcome will not be seriously influenced by the variation.
The principle of judgment depends on the scale relationship of two pixels. From the observation
of common signal processing operations, we can find that the pixel value of processed image
usually keeps stable unless an image has been manipulated by cropping attack or halftone
transformation. This can greatly help reduce the modification strength from image processing
operations. Experiment results show that the proposed method can resist various attacks and
keep the image quality friendly.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document proposes a new algorithm to reduce blocking artifacts in compressed images using a combination of the SAWS technique, Fuzzy Impulse Artifact Detection and Reduction Method (FIDRM), and Noise Adaptive Fuzzy Switching Median Filter (NAFSM). FIDRM uses fuzzy rules to detect noisy pixels, while NAFSM uses a median filter to correct pixels based on local information. Experimental results on test images show the proposed approach achieves better PSNR than other deblocking methods.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Steganographic Scheme Based on Message-Cover matchingIJECEIAES
Steganography is one of the techniques that enter into the field of information security, it is the art of dissimulating data into digital files in an imperceptible way that does not arise the suspicion. In this paper, a steganographic method based on the FaberSchauder discrete wavelet transform is proposed. The embedding of the secret data is performed in Least Significant Bit (LSB) of the integer part of the wavelet coefficients. The secret message is decomposed into pairs of bits, then each pair is transformed into another based on a permutation that allows to obtain the most matches possible between the message and the LSB of the coefficients. To assess the performance of the proposed method, experiments were carried out on a large set of images, and a comparison to prior works is accomplished. Results show a good level of imperceptibility and a good trade-off imperceptibility-capacity compared to literature.
The document summarizes a proposed user-friendly image sharing scheme that uses JPEG-LS prediction and LSB matching functions. The scheme encodes a secret image into meaningful shadow images using different prime numbers for different blocks, as determined by JPEG-LS prediction. It hides the prime number indicators in the least significant bits of pixels using LSB matching to prevent image degradation. The experimental results showed the reconstructed image quality was higher than previous schemes, making it suitable for applications requiring high quality images like medicine, military, or art.
This document summarizes a research paper that proposes a novel scheme for scalable coding of encrypted gray images. The key steps are:
1) In the encryption phase, pixel values are concealed using pseudorandom numbers to prevent statistical analysis of the original image.
2) The encrypted image is decomposed into multiple parts and each part is compressed into a bitstream.
3) At the receiver, higher resolution images can be reconstructed when more bitstreams are received, with the cryptographic key allowing decryption and principal content reconstruction.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by
another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis
etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its
large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This document proposes a novel color image encryption scheme based on multiple chaotic systems. The scheme utilizes the ergodic properties of chaotic systems to perform pixel permutation and applies a substitution operation to achieve diffusion. In the permutation stage, two generalized Arnold maps are used to generate hybrid chaotic sequences to permute pixel positions. In the diffusion stage, four pseudo-random gray value sequences generated by another generalized Arnold map are used to diffuse the permuted image via bitwise XOR operations. Security analysis shows the scheme has a large key space and is highly secure against statistical attacks, differential attacks, and chosen/known plaintext attacks.
Similar to International Journal of Computational Engineering Research(IJCER) (20)
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
WeTestAthens: Postman's AI & Automation Techniques
International Journal of Computational Engineering Research(IJCER)
1. International Journal of Computational Engineering Research||Vol, 03||Issue, 11||
Appm: A Narrative Data Embedding Method Using Adaptive
Pixel Pair Matching
1
P.Ramesh Babu Y.Chitti Babu2 Dr.P.Harini3
1
II Year M.Tech, St.Ann’s College Of Engineering And Technology,
Chirala, Prakasam(Dt), Andhra Pradesh, India
2
Associate Professor , Dept Of CSE , St.Anns’s College Of Engineering & Technology,
Chirala, Prakasam(Dt), Andhra Pradesh, India
3
Professor And HOD Dept Of CSE , St.Anns’s College Of Engineering & Technology,
Chirala, Prakasam(Dt), Andhra Pradesh, India
ABSTRACT
Here We Proposed A New Data-Hiding Method Based On Pixel Pair Matching (PPM). In
This Paper The Basic Idea Of PPM Is To Use The Values Of Pixel Pair As A Reference Coordinate,
And Coordinate Search In The Neighborhood Used To Set Of This Pixel Pair According To A Given
Message Digit. The Pixel Pair Is Then Replaced By The Searched Coordinate To Conceal The
Digit.(EMD)Exploitedmodificationdirection(EMD) And Diamond Encoding (DE) Are Two DataHiding Methods Proposed Recently Based On PPM. Then The Maximum Capacity Of EMD Is 1.161
Bpp And DE Extends The Payload Of EMD By Embedding Digits In A Larger Notational System.This
Is The Proposed Method Offers Lower Distortion Than DE By Having High Compact Neighborhood
Sets And It Will Also Accepting Embedded Digits In Any Representative System. Then It Will Be
Compared With The (OPAP)Optimal Pixel Adjustment Process Method, Then This Method Always
Has Lower Distortion For Various Payloads. Experimental Results Reveal That The Proposed Method
Does Not Only Provides Performance Better Than Those Of OPAP And DE, But Also Is Secure Under
The Detection Of Some Well-Known Steganalysis Techniques.
INDEX TERMS: (ADPPM)Adaptive Pixel Pair Matching,(DE) Diamond Encoding , Exploiting
Modification Direction (EMD), Least Significant Bit (LSB), Optimal Pixel Adjustment Process
(OPAP), Pixel Pair Matching (PPM).
I.
INTRODUCTION
In digital image processing, while processing images here we need to follow certain criteria.
Combining data into a carrier for conveying secret messages that should be confidentially is the technique of
data hiding [1], [2]. After embedding, pixels of cover images will be modified and deformation occurs. The
distortion caused by data embedding is called the embedding distortion [3]. A good data-hiding method must be
capable of evading visual and statistical detection [4] while providing an adjustable payload [5].Many
approaches of information hiding have been proposed for diverse applications, such as patent protection, top
secret transmission, tampering exposure, and figure authentication. large amount well-known data hiding
format is the least significant bits (LSBs) replacement process. This process embeds fixed-length covert bits into
the least significant bits of pixels by directly replacing the LSBs of cover picture with the secret message bits.
Although this process is simple, it generally effects noticeable deformation when the number of embedded bits
for each pixel exceeds three. Several methods have been proposed to decrease the distortion induced by LSBs
replacement. Another approach of improving LSBs scheme is to decrease the amount of alterations required to
be introduced into the cover image for data hiding when the numeral of secret bits is significantly less than that
of available cover pixels. The method proposed by Tseng et al. [6] can cover up as many as log2(mn+1) bits of
data in a binary image block sized m X n by changing, at most, two bits in the block. Matrix encoding, on the
other hand, uses less than one change of the least significant bit in average to embed w bits into2w - 1cover
pixels.Diamond Encoding(DE)method is the extension of the exploiting modification direction (EMD)
embedding scheme [2]. The main idea of the EMD embedding scheme is that each (2n +1)-ary notational secret
digit is carried by n cover pixels, and only one pixel worth increases or decreases by 1 at most. For each block
of n cover pixels, there are 2n possible states of only one pixel value plus 1 or minus 1. The 2n states of
alteration plus the case in which no pixel is modified form (2n + 1) different cases.
||Issn 2250-3005 ||
||November||2013||
Page 1
2. Appm: A Narrative Data Embedding Method…
Therefore, the (2n + 1)-ary notational secret digit is embedded into the cover pixels by changing the
state. Before the data embedding method, the pre-process can convert the secret data into sequences of digits
with (2n + 1)-ary notational representation
II .RELATED WORK
OPAP effectively reduces the image distortion compared with the traditional LSB method. DE
enhances the payload of EMD by embedding digits in a B-ary notational system. These two methods offer a
high payload while preserving an acceptable stego image quality. In this section, OPAP and DE will be briefly
reviewed. The OPAP method proposed by Chan et al. in 2004 greatly improved the image distortion problem
resulting from LSB replacement.
Diamond Encoding (DE)
The EMD scheme embeds(2n + 1)-ary digit into n cover pixels, but the diamond encoding scheme can conceal
(2k2 + 2k + 1)-ary digit into a cover pixel pair where k is the embedding parameter. The detail of this scheme is
described as
follows.
f ( x , y ) ( ( 2 k 1) x y ) m o d ( 2 k
2
2 k 1)
k 2, ( x, y ) (0, 0 )
f ( x , y ) ( 5 x y ) m o d (1 3 )
f ( 0 , 0 ) ( 5 0 0 ) m o d (1 3 ) 0
f (1, 0 ) ( 5 1 0 ) m o d (1 3 ) 5
f ( 2 , 0 ) ( 5 2 0 ) m o d (1 3 ) 1 0
f ( 0 , 1) ( 5 0 1) m o d (1 3 ) 1
f ( 0 , 2 ) ( 5 0 2 ) m o d (1 3 ) 2
f ( 0 , 1) ( 5 0 ( 1) ) m o d (1 3 ) 1 2
Assume that a, b, p, and q are pixel values, and k is a positive integer. The neighborhood set Sk (p, q)
represents the set that contains all the vectors (a, b) with the distance to vector (p, q) smaller than k, and Sk(p, q)
is defined as the above.Let the absolute value |Sk| denote the number of elements of the set Sk, and each
member in Skis called neighboring vector of (p, q). We calculate the value of |Sk| to obtain the embedding base
and embedded base with a parameter k. Diamond encoding method uses a diamond function f to compute the
diamond characteristic value (DCV) in embedding and extraction procedures. The DCV of two pixel values p
and q can be defined as above:where l is the absolute value of Sk. The DCV have two important properties: the
DCV of the vector (p, q) is the member of Sk belongs to {0, 1, 2, . . ,l-1}and any two DCVs of vectors in Sk(p,
q) are distinct. Assume that Ek represents the embedded digit and Ek belongs to{0, 1, 2, . . . ,l − 1}. For secret
data embedding, we replace the DCV of the vector (p, q) with the embedded secret digit. Therefore, the modulus
distance between f (p, q) and Sk is dk= f (p, q)−Ek mod l. For each k, we can design a distance pattern Dk to
search which neighboring pixel owns the modulus distance dk. Then, the vector (p, q) is replaced with the
neighboring vector (p’, q’) by dk. The vector (p’, q’) is the member of Sk(p, q) and the DCV of (p’, q’) equals to
the embedded secret digit Ek. The vector (p’, q’) can extract the correct secret digit by above formulas The
diamond encoding scheme promises that the distortion of vector (p, q) is no more than k after embedding a
secret digit Ek. Therefore, this minimal distortion scheme can be employed to embed large amount of data.
||Issn 2250-3005 ||
||November||2013||
Page 2
3. Appm: A Narrative Data Embedding Method…
Fig. 1. Neighborhood set for .ⱷ(12,10) for k=3.
III.PROCEDURE AND ALGORITHM:
ADAPTIVE PIXEL PAIR MATCHING (APPM)
The basic idea of the PPM-based data-hiding method is to use pixel pair (x,y) as the coordinate and
thorough a coordinate(x1,y1), surrounded by a predefined locality set ⱷ(x,y) such that f(x,y)=Sb, where f is the
drawing out function and Sb, is the message digit in a -ary notational structure to be covered. Data embedding is
done by replacing(x,y) with (x1,y1). For a PPM-based process, suppose a digit Sb is to be covered. The range
of Sb is between 0 and B-1 , and a coordinate(x1,y1)€ ⱷ(x,y). has to be found such that f(x1,y1)=Sb.Therefore,
the range f(x,y) of must be integers between 0 and B-1, and each integer must occur at least once. In addition ,to
reduce the distortion, the number of coordinates in ⱷ(x,y) should be as small as possible.
Fig: Neighborhood set ⱷ16 (0, 0) and f(x,y)
, where . 0<=i<B-1.
The best PPM metbhod shall satisfy the following three requirements:
1) There are exactly B coordinates in ⱷ(x,y).
2) The values of extraction function in these coordinates are mutually exclusive.
3) The design of ⱷ(x,y) and f(x,y) should be capable of embedding digits in any notational structure so that
the best B can be selected to achieve junior embedding deformation.
DE is a data-hiding method based on PPM. DE greatly enhances the payload of EMD though
preserving acceptable stego image quality. but, there are several problems. First, the payload of DE is
determined by the selected notational structure, which is restricted by the bound ; therefore, the notational
system cannot be arbitrarily selected. For example, when is 1, 2, and 3, then digits in a 5-ary, 13-ary, and 25-ary
notational structure are used to surround data, respectively. However, embedding digits in a 4-ary or 16-ary (i.e.,
2 bits per pixel) notational system are not supported in DE. Second, ⱷ(x,y) in DE is defined by a diamond shape,
which may lead to some unnecessary distortion when k>2 . In fact, there exists ⱷ(x,y) a better other than
diamond shape resulting in a smaller embedding deformation The wished-for method not only allows
concealing digits in any notational structure, but also provides the same or even smaller embedding deformation
than DE for various payloads.
||Issn 2250-3005 ||
||November||2013||
Page 3
4. Appm: A Narrative Data Embedding Method…
Embedding Procedure:
Consider the cover image is of size M×M, then each of R, G, B channels will be of size M×M. S is the
message bits to be concealed for each channel image and the size of S is |S|. First we calculate the minimum B
such that all the message bits can be embedded. Then, message digits are sequentially concealed into pairs of
pixels.
[1] First minimum B satisfying |M×M / 2| ≥|SB|, and convert S into a list of digits with a B-ary notational
system SB.
[2] The discrete optimization problem is solved to find cB and ØB(x, y).
[3] In the region defined by ØB(x, y), record the coordinate (x’, y’) such that f(x’, y’) = i, 0 ≤ i ≤ B-1.
[4] Construct a nonrepeating random embedding sequence Q using a key Kr.
[5] To embed a message digit sB, two pixels (x, y) in the cover image are selected according to the embedding
sequence Q, and calculate the modulus distance between sB and f(x, y), then repace (x, y) with (x + x’, y +
y’) [7].
[6] Repeat step 5, until all the message bits are embedded To avoid any distortion because of replacing pixels
right under each other in different layers, the regions Ø(x, y) for each layer are taken distinct subsets.
Figure 1. Embedding respective watermarks for different Channel Images
.
||Issn 2250-3005 ||
||November||2013||
Page 4
5. Appm: A Narrative Data Embedding Method…
. Extraction Procedure:
To extract the embedded message digits, pixel pairs are scanned in the same order as in the embedding
procedure. The embedded message digits are the values of extraction function of the scanned pixel pairs.
1. The watermarked image is split into respective R, G, B layers and each is considered as a Channel Image.
2. Construct the embedding sequence Q using a key Kr.
3. Select two pixels (x’, y’) according to the embedding sequence Q.
4. Calculate f(x’, y’), the result is the embedded digit.
5. Repeat Steps 2 and 3 until all the message digits are extracted.
6. Finally, the message bits can be obtained by converting the extracted message digits into a binary bit
stream.
IV. EXPERIMENTS AND EVALUTION
Performance
To evaluate the performance of the proposed scheme, a high definition image is taken. The simulation
is run using MATLAB. First, LSB, DE, APPM and EAPPM are evaluated for Mean Square Error (MSE) with
different payloads. Table 1 presents the obtained MSEs. It is observed that APPM outperforms APPM, DE and
LSB.
Table2 presents the maximum payload supported by the four embedding methods at an MSE of 0.092. EAPPM
is able to support 300% more than APPM. As the data is embedded in all the three layers, for EAPPM, the
payload support will be more than 3 times that of APPM.
Max Payload supported with MSE at
0.092
LSB
0.025431
DE
0.025431
APPM
0.114441
EAPPM
0.772476
Table1. MSE Comparison
Payload
(bpp)
0.02543
1
LSB
DE
APPM
0.1686
76
0.143649
0.09492
7
0.07629
4
0.11444
1
0.15767
EAPPM
0.16867
6
0.16432
6
0.16876
6
0.16897
3
0.16924
0.14364 0.09492 0.09149
9
7
7
0.14372 0.09177 0.09560
7
1
4
0.14390 0.09480 0.09149
1
7
7
0.20345
0.14382 0.09497 0.09149
1
6
1
7
0.25749
0.14400 0.09537 0.09149
2
3
4
7
Table2. Max Payload support Comparison
||Issn 2250-3005 ||
||November||2013||
Page 5
6. Appm: A Narrative Data Embedding Method…
V.
CONCLUSION
proposed a simple and efficient data embedding process based on PPM. Two pixels are scanned as an
embedding element and a specially designed neighbourhood set is employed to insert message digits with a
smallest notational structure. APPM allows users to select digits in any notational structure for data embedding,
and thus achieves a enhanced image quality. The proposed process not only resolves the low-payload trouble in
EMD, but also offers smaller MSE compared with OPAP and DE. Moreover, because APPM produces no
artifacts in stego images and the steganalysis results are comparable to those of the cover images, it offers a
secure communication below variable embedding Capacity.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
J. Fridrich, Steganography in Digital Media: Principles, Algorithms,and Applications. Cambridge, U.K.: Cambridge Univ. Press,
2009.
N. Provos and P. Honeyman, “Hide and seek: An Introduction to steganography,” IEEE Security Privacy, vol. 3, no. 3, pp. 32–
44,May/Jun. 2003.
A. Cheddad, J. Condell, K. Curran, and P. McKevitt, “Digital image
steganography: Survey and analysis of current methods,” Signal Process., vol. 90, pp. 727–752, 2010.
T. Filler, J. Judas, and J. Fridrich, “Minimizing embedding impact in steganography using trellis-coded quantization,” in Proc.
SPIE, Media Forensics and Security, 2010, vol. 7541, DOI: 10.1117/12.838002.
S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,”IEEE Trans. Inf. Forensics Security, vol. 1, no. 1, pp.
111–119, Mar.2006.
Y.-C. Tseng, Y.-Y.Chen, and H.-K. Pan, “A secure data hiding scheme for binary images,” IEEE Transactions on
Communications, vol. 50, no. 8, pp. 1227–1231, 2002.
W. Zhang, X. Zhang, and S. Wang, “A double layered plus-minus one data embedding scheme,” IEEE Signal Process. Lett., vol.
14, no. 11,pp. 848–851, Nov. 2007.
AUTHORS:
Dr. P. Harini is presently working as a professor and HOD,Dept of Computer Science and
Engineering,in St.Ann’s College of Engineering and Technology, Chirala.She obtained Ph.D
in distributed and Mobile Computing from JNTUA, Ananthapur. She Guided Many UG and
PG Students. She has More than 15 Years of Excellence in Teaching and 2 Years of Industry
Experience. She published more than 20 International Journals and 25 Research Oriented
Papers in Various Areas. She was awarded Certificate of Merit by JNTUK, Kakinada on
the University Formation Day on 21 - August - 2012. . from JNTUk, Kakinada.
Y.Chitti babu is presently working as an Associate professor ,Dept of Computer Science and
Engineering ,in St.Ann’s College of Engineering and Technology,Chirala.He Guided Many
UG and PG Students. He has More than 10 Years of Teaching Experience.He published more
than 5 International Journals and 7 Research Oriented Papers in Various Areas.
P.Ramesh babu is presently Studying the M.Tech (CSE) in St.Ann’s College Of
Engineering
a
and Technology, Chirala affiliated to Jawaharlal Nehru Technological University,Kakinada.
||Issn 2250-3005 ||
||November||2013||
Page 6