This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
This paper presents embedding of data in an image using pixel-value differencing technique. This scheme is used to embed large amount of data by changing the difference between two pixels so that we are able to increase the embedding capacity. There is another technique that is pixel value shifting which also increase the embedding capacity but according to this scheme capacity will increase at edge areas of image.
Gaussian Fuzzy Blocking Artifacts Removal of High DCT Compressed Imagesijtsrd
A new artifact removal method as cascade of Gaussian fuzzy edge decider and fuzzy image correction is proposed. In this design, a highly compressed i.e. low bit rate image is considered. Here, each overlapped block of image is fed to a Gaussian fuzzy based decider to check whether the central pixel of image block needs correction. Hence, the central pixel of overlapped block is corrected by fuzzy gradient of its neighbors. Experimental results shows remarkable improvement with presented gFAR algorithm compared to the past methods subjectively visual quality and objectively PSNR . Deepak Gambhir "Gaussian Fuzzy Blocking Artifacts Removal of High DCT Compressed Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33361.pdf Paper Url: https://www.ijtsrd.com/computer-science/multimedia/33361/gaussian-fuzzy-blocking-artifacts-removal-of-high-dct-compressed-images/deepak-gambhir
This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique.
Effect of Similarity Measures for CBIR using Bins ApproachCSCJournals
This paper elaborates on the selection of suitable similarity measure for content based image retrieval. It contains the analysis done after the application of similarity measure named Minkowiski Distance from order first to fifth. It also explains the effective use of similarity measure named correlation distance in the form of angle ‘cosè’ between two vectors. Feature vector database prepared for this experimentation is based on extraction of first four moments into 27 bins formed by partitioning the equalized histogram of R, G and B planes of image into three parts. This generates the feature vector of dimension 27. Image database used in this work includes 2000 BMP images from 20 different classes. Three feature vector databases of four moments namely Mean, Standard deviation, Skewness and Kurtosis are prepared for three color intensities (R, G and B) separately. Then system enters in the second phase of comparing the query image and database images which makes of set of similarity measures mentioned above. Results obtained using all distance measures are then evaluated using three parameters PRCP, LSRR and Longest String. Results obtained are then refined and narrowed by combining the three different results of three different colors R, G and B using criterion 3. Analysis of these results with respect to similarity measures describes the effectiveness of lower orders of Minkowiski distance as compared to higher orders. Use of Correlation distance also proved its best for these CBIR results.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
This paper presents embedding of data in an image using pixel-value differencing technique. This scheme is used to embed large amount of data by changing the difference between two pixels so that we are able to increase the embedding capacity. There is another technique that is pixel value shifting which also increase the embedding capacity but according to this scheme capacity will increase at edge areas of image.
Gaussian Fuzzy Blocking Artifacts Removal of High DCT Compressed Imagesijtsrd
A new artifact removal method as cascade of Gaussian fuzzy edge decider and fuzzy image correction is proposed. In this design, a highly compressed i.e. low bit rate image is considered. Here, each overlapped block of image is fed to a Gaussian fuzzy based decider to check whether the central pixel of image block needs correction. Hence, the central pixel of overlapped block is corrected by fuzzy gradient of its neighbors. Experimental results shows remarkable improvement with presented gFAR algorithm compared to the past methods subjectively visual quality and objectively PSNR . Deepak Gambhir "Gaussian Fuzzy Blocking Artifacts Removal of High DCT Compressed Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33361.pdf Paper Url: https://www.ijtsrd.com/computer-science/multimedia/33361/gaussian-fuzzy-blocking-artifacts-removal-of-high-dct-compressed-images/deepak-gambhir
This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique.
Effect of Similarity Measures for CBIR using Bins ApproachCSCJournals
This paper elaborates on the selection of suitable similarity measure for content based image retrieval. It contains the analysis done after the application of similarity measure named Minkowiski Distance from order first to fifth. It also explains the effective use of similarity measure named correlation distance in the form of angle ‘cosè’ between two vectors. Feature vector database prepared for this experimentation is based on extraction of first four moments into 27 bins formed by partitioning the equalized histogram of R, G and B planes of image into three parts. This generates the feature vector of dimension 27. Image database used in this work includes 2000 BMP images from 20 different classes. Three feature vector databases of four moments namely Mean, Standard deviation, Skewness and Kurtosis are prepared for three color intensities (R, G and B) separately. Then system enters in the second phase of comparing the query image and database images which makes of set of similarity measures mentioned above. Results obtained using all distance measures are then evaluated using three parameters PRCP, LSRR and Longest String. Results obtained are then refined and narrowed by combining the three different results of three different colors R, G and B using criterion 3. Analysis of these results with respect to similarity measures describes the effectiveness of lower orders of Minkowiski distance as compared to higher orders. Use of Correlation distance also proved its best for these CBIR results.
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...mmjalbiaty
full details about Spatial and Intensity Resolution , optical and digital zoom concepts and the common three interpolation algorithms for implementing zoom in image processing
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...ijistjournal
In this paper, we have proposed an extended version of Absolute Moment Block Truncation Coding (AMBTC) to compress images. Generally the elements of a bitplane used in the variants of Block Truncation Coding (BTC) are of size 1 bit. But it has been extended to two bits in the proposed method. Number of statistical moments preserved to reconstruct the compressed has also been raised from 2 to 4. Hence, the quality of the reconstructed images has been improved significantly from 33.62 to 38.12 with the increase in bpp by 1. The increased bpp (3) is further reduced to 1.75in multiple levels: in one level, by dropping 4 elements of the bitplane in such a away that the pixel values of the dropped elements can easily be interpolated with out much of loss in the quality, in level two, eight elements are dropped and reconstructed later and in level three, the size of the statistical moments is reduced. The experiments were carried over standard images of varying intensities. In all the cases, the proposed method outperforms the existing AMBTC technique in terms of both PSNR and bpp.
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
We intend to make a 3D model using a stereo pair of images by using a novel method of local matching in pixel domain for calculating horizontal disparities. We also find the occlusion ratio using the stereo pair followed by the use of The Edge Detection and Image SegmentatiON (EDISON) system, on one the images, which provides a complete toolbox for discontinuity preserving filtering, segmentation and edge detection. Instead of assigning a disparity value to each pixel, a disparity plane is assigned to each segment. We then warp the segment disparities to the original image to get our final 3D viewing Model.
K-means Clustering Algorithm with Matlab Source codegokulprasath06
K-means algorithm
The most common method to classify unlabeled data.
Also Checkout: http://bit.ly/2Mub6xP
Any Queries, Call us@ +91 9884412301 / 9600112302
Fuzzy Encoding For Image Classification Using Gustafson-Kessel AglorithmAshish Gupta
This paper presents a novel adaptation of fuzzy clustering and
feature encoding for image classification. Visual word ambiguity
has recently been successfully modeled by kernel codebooks
to provide improvement in classification performance
over the standard ‘Bag-of-Features’(BoF) approach, which
uses hard partitioning and crisp logic for assignment of features
to visual words. Motivated by this progress we utilize
fuzzy logic to model the ambiguity and combine it with clustering
to discover fuzzy visual words. The feature descriptors
of an image are encoded using the learned fuzzy membership
function associated with each word. The codebook built
using this fuzzy encoding technique is demonstrated to provide
superior performance over BoF. We use the Gustafson-
Kessel algorithm which is an improvement over Fuzzy CMeans
clustering and can adapt to local distributions. We
evaluate our approach on several popular datasets and demonstrate
that it consistently provides superior performance to the
BoF approach.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
Steganography is the science of secret message delivery using cover media. The cover carriers can be image, video, sound or text data. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Chang method of Secret Reference Matrix. The data is hidden in 8 bit gray scale image using 256 X 256 matrix which is constructed by using 4 x 4 table with unrepeated digits from 0~15. The proposed method has high hiding capacity, better stego-image quality, requires little calculation and is easy to implement.
ExcelR is considered as the best Data Science training institute in Bangalore which offers services from training to placement as part of the Data Science training program with over 400+ participants placed in various multinational companies including E&Y, Panasonic, Accenture, VMWare, Infosys, IBM, etc.
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study.
A new hybrid steganographic method for histogram preservation IJEEE
This paper presents a histogram preserving data embedding method for grey-scale images which is based on pixel value differencing (PVD) and least-significant-bit (LSB) substitution methods. Various PVD based steganographic methods achieve high data embedding capacity with minimum distortions in stego image at the cost of change in histogram characteristics which is can be detected by histogram based steganalysers. This persistent problem can been taken care off by proposed method of data hiding. The improved performance of the proposed method is verified through extensive simulations.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
New Chaotic Substation and Permutation Method for Image Encryptiontayseer Karam alshekly
New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.
Substitution-diffusion based Image CipherIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the algorithm, image is partitioned into several key based dynamic blocks and further, each block passes through the eight rounds of diffusion as well as substitution process. In diffusion process, sequences of block pixels are rearranged within the block by a zigzag approach whereas block pixels are replaced with another by using difference calculation of row and column in substitution process. Due to high order of substitution and diffusion, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed technique is efficient and has high security features.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionIJERA Editor
A robust watermark scheme for copyright protection is proposed in this paper. The present method selects the
best block of image for watermark embedding by comparing luminance value of colored image and block. The
watermark is embedded in the selected pixel blocks by using block pixel differencing LSB substitution method.
The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial
domain LSB substitution method. Further the watermark extraction does not require the original image as in the
case of many digital watermarking methods. The experimental results indicate that the proposed system is better
in terms of image quality and robustness against various attacks.
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...mmjalbiaty
full details about Spatial and Intensity Resolution , optical and digital zoom concepts and the common three interpolation algorithms for implementing zoom in image processing
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...ijistjournal
In this paper, we have proposed an extended version of Absolute Moment Block Truncation Coding (AMBTC) to compress images. Generally the elements of a bitplane used in the variants of Block Truncation Coding (BTC) are of size 1 bit. But it has been extended to two bits in the proposed method. Number of statistical moments preserved to reconstruct the compressed has also been raised from 2 to 4. Hence, the quality of the reconstructed images has been improved significantly from 33.62 to 38.12 with the increase in bpp by 1. The increased bpp (3) is further reduced to 1.75in multiple levels: in one level, by dropping 4 elements of the bitplane in such a away that the pixel values of the dropped elements can easily be interpolated with out much of loss in the quality, in level two, eight elements are dropped and reconstructed later and in level three, the size of the statistical moments is reduced. The experiments were carried over standard images of varying intensities. In all the cases, the proposed method outperforms the existing AMBTC technique in terms of both PSNR and bpp.
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioCSCJournals
We intend to make a 3D model using a stereo pair of images by using a novel method of local matching in pixel domain for calculating horizontal disparities. We also find the occlusion ratio using the stereo pair followed by the use of The Edge Detection and Image SegmentatiON (EDISON) system, on one the images, which provides a complete toolbox for discontinuity preserving filtering, segmentation and edge detection. Instead of assigning a disparity value to each pixel, a disparity plane is assigned to each segment. We then warp the segment disparities to the original image to get our final 3D viewing Model.
K-means Clustering Algorithm with Matlab Source codegokulprasath06
K-means algorithm
The most common method to classify unlabeled data.
Also Checkout: http://bit.ly/2Mub6xP
Any Queries, Call us@ +91 9884412301 / 9600112302
Fuzzy Encoding For Image Classification Using Gustafson-Kessel AglorithmAshish Gupta
This paper presents a novel adaptation of fuzzy clustering and
feature encoding for image classification. Visual word ambiguity
has recently been successfully modeled by kernel codebooks
to provide improvement in classification performance
over the standard ‘Bag-of-Features’(BoF) approach, which
uses hard partitioning and crisp logic for assignment of features
to visual words. Motivated by this progress we utilize
fuzzy logic to model the ambiguity and combine it with clustering
to discover fuzzy visual words. The feature descriptors
of an image are encoded using the learned fuzzy membership
function associated with each word. The codebook built
using this fuzzy encoding technique is demonstrated to provide
superior performance over BoF. We use the Gustafson-
Kessel algorithm which is an improvement over Fuzzy CMeans
clustering and can adapt to local distributions. We
evaluate our approach on several popular datasets and demonstrate
that it consistently provides superior performance to the
BoF approach.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
Steganography is the science of secret message delivery using cover media. The cover carriers can be image, video, sound or text data. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Chang method of Secret Reference Matrix. The data is hidden in 8 bit gray scale image using 256 X 256 matrix which is constructed by using 4 x 4 table with unrepeated digits from 0~15. The proposed method has high hiding capacity, better stego-image quality, requires little calculation and is easy to implement.
ExcelR is considered as the best Data Science training institute in Bangalore which offers services from training to placement as part of the Data Science training program with over 400+ participants placed in various multinational companies including E&Y, Panasonic, Accenture, VMWare, Infosys, IBM, etc.
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study.
A new hybrid steganographic method for histogram preservation IJEEE
This paper presents a histogram preserving data embedding method for grey-scale images which is based on pixel value differencing (PVD) and least-significant-bit (LSB) substitution methods. Various PVD based steganographic methods achieve high data embedding capacity with minimum distortions in stego image at the cost of change in histogram characteristics which is can be detected by histogram based steganalysers. This persistent problem can been taken care off by proposed method of data hiding. The improved performance of the proposed method is verified through extensive simulations.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
New Chaotic Substation and Permutation Method for Image Encryptiontayseer Karam alshekly
New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.
Substitution-diffusion based Image CipherIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the algorithm, image is partitioned into several key based dynamic blocks and further, each block passes through the eight rounds of diffusion as well as substitution process. In diffusion process, sequences of block pixels are rearranged within the block by a zigzag approach whereas block pixels are replaced with another by using difference calculation of row and column in substitution process. Due to high order of substitution and diffusion, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed technique is efficient and has high security features.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionIJERA Editor
A robust watermark scheme for copyright protection is proposed in this paper. The present method selects the
best block of image for watermark embedding by comparing luminance value of colored image and block. The
watermark is embedded in the selected pixel blocks by using block pixel differencing LSB substitution method.
The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial
domain LSB substitution method. Further the watermark extraction does not require the original image as in the
case of many digital watermarking methods. The experimental results indicate that the proposed system is better
in terms of image quality and robustness against various attacks.
An enhanced difference pair mapping steganography method to improve embedding...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...cscpconf
In a gray scale image the pixel value ranges from 0 to 255. But when we use pixel-value
differencing (pvd) method as image steganographic scheme, the pixel values in the stego-image
may exceed gray scale range. An adaptive steganography based on modified pixel-value
differencing through management of pixel values within the range of gray scale has been
proposed in this paper. PVD method is used and check whether the pixel value exceeds the
range on embedding. Positions where the pixel exceeds boundary has been marked and a delicate handle is used to keep the value within the range. From the experimental it is seen that the results obtained in proposed method provides with identical payload and visual fidelity of stego-image compared to the pvd method
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space IJEEE
Copy-move forgery is applied on an image to hide a region or an object. Most of the detection techniques either use transform domain or spatial domain information to detect the forgery. This paper presents a hybrid method to detect the forgery making use of both the domains i.e. transform domain in whichSVD is used to extract the useful information from image and spatial domain in which L*a*b* color space is used. Here block based approach and lexicographical sorting is used to group matching feature vectors. Obtained experimental results demonstrate that proposed method efficiently detects copy-move forgery even when post-processing operations like blurring, noise contamination, and severe lossy compression are applied.
Ieee a secure algorithm for image based information hiding with one-dimension...Akash Rawat
ieee a secure algorithm for image based information hiding with one-dimensional chaotic systems.It used 1 dimensional chaotic system.ieee paper related for image encryption
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...IJERA Editor
The corpus callosum (CC) is the largest white-matter structure in human brain. In this paper, we take two techniques to observe the results of segmentation of Corpus Callosum. The first one is mean shift algorithm and morphological operation. The second one is k-means clustering. In this paper, it is performed in three steps. The first step is finding the corpus callosum area using adaptive mean shift algorithm or k-means clustering . In second step, the boundary of detected CC area is then used as the initial contour in the Geometric Active Contour (GAC) mode and final step to remove unknown noise using morphological operation and evolved to get the final segmentation result. The experimental results demonstrate that the mean shift algorithm and k-means clustering has provided a reliable segmentation performance.
Similar to An Improved Adaptive Steganographic Method Based on Least Significant Bit Substitution and Pixel-Value Differencing (20)
PCI Express (Peripheral Component Interconnect Express) abbreviated as PCIe or PCI-E, is designed to replace the older PCI, PCI-X, AGP standards. We present a data communication developed system for use the transfer data between the host and the peripheral devices via PCIe. The performance and the available area on the board are effective by using the PCIe. PCIe is a serial expansion bus interconnection method which is use for high speed communication. PCI Express represents the currently fastest and most expensive solution to connect the peripheral devices with general purpose CPU. It provides a highest bandwidth connection in the PC platform. In this paper, we highlight the different types of bus architecture. Here the PCIe architecture is described how data transfer between the CPU to the destination.
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesIOSRJVSP
To achieve the reduction of power consumption, optimizations are required at various levels of the design steps such as algorithm, architecture, logic and circuit & process techniques. This paper considers the two logic level approaches for low power digital design. Optimization techniques are carried to reduce switching activity power of individual logic-gates. we can reduce the power by using either circuit level optimization or logical level optimization. In this paper, the circuit level optimization process is followed to reduce the area and power. In the first approach, Modified gate diffusion input (GDI) logic is used in the proposed parallel asynchronous self time adder (PASTA) technique. Similarly, the structure of XOR gate and half adder is reduced to achieve the low area and low power. In second approach, Multi value logic based digital circuit is designed by increasing the representation domain from the two level (N=2) switching algebra to N > 2 levels. The main advantage of this approach is to compensate the inefficiency of existing integrated circuits that are used to implement the universal set of MVL gates. From the results, the proposed GDL logic based Adder offers less number of transistors (area) and low power consumption than the existing technique. And proposed MVL technique allows designing MVL digital circuit that is set to obtain the values from the binary circuits. Also this technique offers low power and small wiring delay, when compared to binary and three value logic. The simulation process is carried out by tanner toolv14.11 to check the functionality of the PASTA & MVL circuits.
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...IOSRJVSP
This paper presents a new topology to implement MOS current mod logic (MCML) tri-state buffers. In Mos current mode logic (MCML) current section is improves the performance and maintains low power of the circuit. MCML circuits contains true differential operation by which provides the feature of low noise level generation and static power dissipation. So the amount of current drawn from the power supply does not depends on the switching activity. Due to this MOS current mode logic (MCML) circuits have been useful for developing analog and mixed signal IC’s. The implementing of MCML D-flip flop and Frequency divider done by using MCML D-latches. The proposed MCML D-latch consumes less power as it makes use of low power tri-state buffers. Which promotes power saving due to reduction in the overall current flow in the proposed D flip flop topology is verified though Cadence GPDK-180nM CMOS technology parameters.
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
One of the biggest and important issues in the video watermarking is the distortion and attacks. The attacks and distortion affect the digital watermarking. Watermarking is an embedding process. With the help of watermarking, we insert the data into the digital objects. There are few methods are available for authentication of data, securing/protection of data. The watermarking technique also provides the data security, copyright protection and authentication of the data. Watermarking provides a comfortable life to authorized users. In my proposed work, we are working on distorted watermarked video. The distortion is present on the watermarked video is rational 7 th and 8 th order distortion model. In this paper, firstly we are embedding the watermark information into the original video and after that work on the distortion model which may be come into the watermarked video. We are also calculating the PSNR (Peak signal to noise ratio), SSIM (Structural similarity index measure), Correlation, BER (Bit Error Rate) and MSE (Mean Square Error) parameters for distorted watermarked video. We are showing the relationship between correlation and SSIM with BER, MSE and PSNR.
Analyzing the Impact of Sleep Transistor on SRAMIOSRJVSP
Low Power SRAMs have become a critical component of many VLSI chips. Power can be reduced by using either dynamic or static power reduction techniques. Power gating is one of the most effective static leakage reduction methods. In power gating sleep transistors are used. They disconnect the cell from power supply during sleep mode leading to 91.6% less static power dissipation but they also helps in reducing the dynamic power by reducing the power supply to the cell. In this paper the effect of sleep transistor in active mode is implemented and resulting SRAM is found to dissipate 32% less power than conventional SRAM.
Robust Fault Tolerance in Content Addressable Memory InterfaceIOSRJVSP
With the rapid improvement in data exchange, large memory devices have come out in recent past. The operational controlling for such large memory has became a tedious task due to faster, distributed nature of memory units. In the process of memory accessing it is observed that data written or fetched are often encounter with fault location and faulty data are written or fetched from the addressed locations. In real time applications, this error cannot be tolerated as it leads to variation in the operational condition dependent on the memory data. Hence, It is required to have an optimal controlling fault tolerance in content addressable memory. In this paper, we present an approach of fault tolerance approach by controlling the fault addressing overhead, by introducing a new addressing approach using redundant control modeling of fault address unit. The presented approach achieves the objective of fault controlling over multiple fault location in different dimensions with redundant coding.
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...IOSRJVSP
Object tracking is one of the most important components in numerous applications of computer vision. Color can provide an efficient visual feature for tracking non-rigid objects in real-time. The color is chosen as tracking feature to make the process scale and rotation invariant. The color of an object can vary over time due to variations in the illumination conditions, the visual angle and the camera parameters. This paper presents the integration of color distributions into particle filtering. The color feature is extracted using our novel 4D color histogram of the image, which is determined using JND color similarity threshold and connectivity of the neighboring pixels. Particle filter tracks several hypotheses simultaneously and weighs them according to their similarity to the target model. The popular Bhattacharyya coefficient is used as similarity measure between two color distributions. The tracking results are compared on the basis of precision over the data set of video sequences from the website http://visualtracking.net of CVPR13 bench marking paper. The proposed tracker yields better precision values as compared to previous reported results
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...IOSRJVSP
The Advanced Microcontroller Bus Architecture (AMBA) is used as the on-chip bus in system-onchip (SoC) designs. APB is low bandwidth and low performance bus used to affix the peripherals like UART, Keypad, Timer and other segment equipment’s to the bus architecture. The aim of this paper is to design and implement AMBA APB (Advanced Microcontroller Bus Architecture - Advanced Peripheral Bus) Bridge with efficient deployment of system resources. Clock is a major concern in designing of any digital sequential system. Clock skew is introduced when the difference is generated between the arrival times of clock signal. One of the approaches to minimize clock skew is ripple counter. The three bit down ripple counter approach used. APB Bridge with clock skew minimization technique is implemented in the paper using Verilog HDL. For the simulation purpose, Vivado Design Suite ISim has been used. For the synthesization purpose and design utilization summary Vivado Integrated Design Environment (IDE)
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...IOSRJVSP
With ever increasing IC complexity and aggressive technology scaling towards cutting edge technologies, the SOC timing closure is becoming a tedious, time consuming and challenging task. Also in advanced technology nodes one has to consider the effect of PVT variation, temperature inversion, noise effect on delay, which is adding more scenarios for STA to cover. In this work, we have proposed an algorithm for simultaneous usage of data path ECO and clock path ECO for efficient timing closure in SOC. The algorithm here tries to fix multiple failing end points through simple clock path optimization, instead of performing data path optimization across multiple paths, thus reducing area and power overhead. The proposed algorithm is tested on multiple industrial designs and found to achieve 30.98% improvement interms of Worst Negative Slack, 63.63% interms of Total Negative Slack, 58.19% interms of Failing End Points. Also the algorithm is physically aware meaning that the placement blockages, congestions are considered while inserting buffers. The algorithm works under Distributed Multi Scenarios Analysis (DMSA) environment and considers the effect of ECO across multiple corners and modes
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...IOSRJVSP
This paper presents implementation of Arithmetic Logic Unit as it is fundamental building block of various computing circuits. 4 bit ALU is designed using Modified Quasi State Energy Recovery Logic (MQSERL) and CMOS logic. For implementing ALU, circuits which are needed are Multiplexer , Full adder and various basic gates such as Inverter ,XOR, AND and OR are designed using both logic style. Comparative power analysis has been done to validate the Proposed MQSERL logic style which gives less power dissipation compared to conventional logic. The Arithmetic and Logic Unit designed using proposed MQSERL logic is 24.14 % and 33.28% power efficient than CMOS logic . The operating voltages for all the circuits are 1.8V and simulated using 180nm tanner technology. For MQSERL circuits, two sinusoidal power clock which are 1800 phase shifted with each other are used by maintaining frequency at 100MHz and frequency of the input signal maintained at 50 MHz
P-Wave Related Disease Detection Using DWTIOSRJVSP
: ECG conveys information regarding the electrical function of the heart, by altering the shape of its constituent waves, namely the P, QRS, and T waves. ECG Feature Extraction plays a significant role in diagnosing most of the cardiac diseases. This paper focuses on detection of the P-wave, based on 12 lead standard ECG, which will be applied to the detection of patients prone to diseases. The ECG signal contains noise and that noise is removed using Bandpass filter. After elimination of noise, we detect QRS complex which help in detecting the P-Wave. P-wave morphology can be determined in leads II as monophasic and V1 as biphasic during sinus rhythm. DWT provides a value that helps in estimating features of the P-Wave. This detects the diseases that occur when the P-wave is abnormal. The method has been validated using ECG recordings of 250 patients with a wide variety of P-wave morphologies from Database
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...IOSRJVSP
Reversible logic has shown wide applications in emerging technologies such as quantum computing, optical computing, and extremely low power VLSI circuits. Recently, many researchers have focused on the design and synthesis of efficient reversible logic circuits. In this work, as an example of reversible logic sequential circuits, we propose a novel reversible logic design of the Universal Shift Register. Here, we proposed a D-flip-flop whose efficiency is shown in terms of garbage output, constant input and number of reversible gates. Using this D flip-flop, efficient universal shift register is proposed. Universal shift register is a register that has both right and left shifts and parallel load capabilities. The proposed designs were functionally verified through simulations using Verilog Hardware Description Language.Design and Synthesis of Multiplexer based Universal Shift
Register using Reversible Logic
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...IOSRJVSP
This paper represents the design and implementation of Low Noise Amplifier for Ultra wideband application using 0.18μm CMOS Technology. The proposed two stage LNA is for a 3-5 GHz. At supply voltage of 1.8V, for the exceed limit of 50μm of width of each transistor, the power consumption is 7.22mW. Noise figure is 4.33dB, Maximum power gain i.e. S21 is 20.4dB, S12 < -20dB, S11 < -8dB, S22 < -10dB. For the required bandwidth range, LNA is unconditionally stable and have good linearity
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...IOSRJVSP
Brain-computer interface (BCI) is a communication pathway between brain and an external device. It translates human thought into commands to control the external devices.Electroencephalography (EEG) is cost effective and easier way to implement the BCI. This paper presents a novel method for classifying EEG during motor imagery by the combination of common spatial pattern (CSP) and linear discriminant analysis (LDA). In the proposed method, the EEG signal is bandpass-filtered into multiple frequency bands. The CSP features are then extracted from each of these bands. The LDA classifier is subsequently used to classify the CSP features. In this paper, experimental results are presented on a publicly available BCI competition dataset and the performance is compared with existing approaches. The experimental result shows that the proposed method yields comparatively superior cross validation accuracies compared to prevailing methods.
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIOSRJVSP
There is need to develop various new design techniques in order to fulfil the demand of increased speed, reduced area for compactness and reduced power consumption. It is considered that improved other performance specifications such as less delay, high noise immunity and suitable ambient temperature conditions are the prime factors. In this paper two different techniques are used for designing a 4-bit Magnitude Comparator(MC) and then a comparison is made about area and average delay. First one is Transmission Gate (TG) technique and second one is GDI Technique. This paper describes the design of an Integrated Circuit (IC) layout for a 4-bit MC. The layout was designed by use of an open source software namely Electric VLSI Design System which is Electronic Design Automation (EDA) tool. LTspiceXVII is used as simulator to carry out the simulation work.
Design & Implementation of Subthreshold Memory Cell design based on the prima...IOSRJVSP
As there is a demand for portable electronic systems or devices, there is an incremental growth in the technology in the past few decades and also technology is cumulative at a random rate, devices are consuming large amount of power due to this the life of the battery is draining fast. so there must be a alternative devices or circuits which can reduce the power by efficiently maintaining the area and performance, therefore life of battery can be increased. As SRAM is the heart of block in all the electronic design, where the power consumption is maximum there by analyzing, estimating & modifying or changing the logic, will be able to reduce the power and performance can be greatly achieved. This proposal describes under the principle of ultra-low power logic approach which operates under subthreshold voltage operating which leads to lower power and also efficient in functionality along with secondary constraints.
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesIOSRJVSP
Macular Edema affects around 20 million people of the world each year. Optical Coherence Tomography (OCT), a non-invasive eye-imaging modality, is capable of detecting Macular Edema both in its early and advanced stages. In this paper, an algorithm which detects Macular Edema from OCT images has been presented. Initially the images are filtered to de-noise them. Then, the retinal layers - Inner Limiting Membrane (ILM) and Retinal Pigment Epithelium (RPE) are segmented using Graph Theory method. Region splitting is performed on the OCT scan and the thickness between the two layers in the different regions are determined. Area enclosed between the two layers is also estimated. Support Vector Machine, a binary classifier is used to draw a classification between normal and abnormal OCT scans. Region-wise thickness, a few Haralick’s features, area between ILM and RPE and a few wavelet features are used to train the classifier. The classifier yielded an accuracy of 95% and a sensitivity of 100%. Thus, this algorithm can be used by ophthalmologists in early detection of Macular Edema.
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionIOSRJVSP
This paper is aimed to reduce background noise introduced in speech signal during capture, storage, transmission and processing using Spectral Subtraction algorithm. To consider the fact that colored noise corrupts the speech signal non-uniformly over different frequency bands, Multi-Band Spectral Subtraction (MBSS) approach is exploited wherein amount of noise subtracted from noisy speech signal is decided by a weighting factor. Choice of optimal values of weights decides the performance of the speech enhancement system. In this paper weights are decided based on SFM (Spectral Flatness Measure) than conventional SNR (Signal to Noise Ratio) based rule. Since SFM is able to provide true distinction between speech signal and noise signal. Spectrogram, Mean Opinion Score show that speech enhanced from proposed SFM based MBSS possess better perceptual quality and improved intelligibility than existing SNR based MBSS
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...IOSRJVSP
This research addresses the problem inter-symbol interference (ISI) using equalization techniques for time dispersive channels with additive white Gaussian noise (AWGN). The channel equalizer is modelled as a non-linear Multilayer Perceptron (MLP) structure. The Back Propagation (BP) algorithm is used to optimize the synaptic weights of the equalizer during the training mode. In the typical BP algorithm, the error signal is propagated from the output layer to the input layer while the learning rate parameter is held constant. In this study, the BP algorithm is modified so as to allow for the learning rate to be variable at each iteration and this achieves a faster convergence. The proposed algorithm is used to train the MLP based decision feedback equalizer (DFE) for time dispersive ISI channels. The equalizer is tested for a random input sequence of BPSK signals and its performance analysed in terms of the Bit Error Rates and speed of convergence. Simulation results show that the proposed algorithm improves the Bit Error Rate (BER) and rate of convergence.
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...IOSRJVSP
Activation functions are used to transform the mixed inputs into their corresponding output counterparts. Commonly, activation functions are used as transfer functions in engineering and research. Artificial neural networks (ANN) are the preferred choice for most studies and comparisons of activation functions. The Sigmoid Activation Function is the most common and its popularity arise from the fact that it is easy to derive, its boundedness within the unit interval, and it has mathematical properties that work well with the approximation theory. On the other hand, not so common is the Fibonacci Activation Function with similar and perhaps better features than the Sigmoid. Algorithms have a broad range of applications making it plausible to suspect that different problems call for unique activation functions. The aim of this paper is to have a detailed of the role of the activation functions and then analyse the performance of two of them – the Sigmoid and the Fibonacci – in a non-ANN setup using the most basic artificially generated signals. Results show that the Fibonacci activation function performs better with the set of signals applied in the natural gradient algorithm.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxnikitacareer3
Looking for the best engineering colleges in Jaipur for 2024?
Check out our list of the top 10 B.Tech colleges to help you make the right choice for your future career!
1) MNIT
2) MANIPAL UNIV
3) LNMIIT
4) NIMS UNIV
5) JECRC
6) VIVEKANANDA GLOBAL UNIV
7) BIT JAIPUR
8) APEX UNIV
9) AMITY UNIV.
10) JNU
TO KNOW MORE ABOUT COLLEGES, FEES AND PLACEMENT, WATCH THE FULL VIDEO GIVEN BELOW ON "TOP 10 B TECH COLLEGES IN JAIPUR"
https://www.youtube.com/watch?v=vSNje0MBh7g
VISIT CAREER MANTRA PORTAL TO KNOW MORE ABOUT COLLEGES/UNIVERSITITES in Jaipur:
https://careermantra.net/colleges/3378/Jaipur/b-tech
Get all the information you need to plan your next steps in your medical career with Career Mantra!
https://careermantra.net/
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
An Improved Adaptive Steganographic Method Based on Least Significant Bit Substitution and Pixel-Value Differencing
1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
Volume 7, Issue 1, Ver. I (Jan. - Feb. 2017), PP 38-43
e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197
www.iosrjournals.org
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 38 | Page
An Improved Adaptive Steganographic Method Based on
Least Significant Bit Substitution and
Pixel-Value Differencing
Varun sangwan
Sangwan.varun@gmail.com
Abstract: This paper presents a novel technique for improved data embedding in cover images based on
least significant bit and pixel-value differencing. The proposed method is based on the properties of human
visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore,
the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount
of data in smooth areas. The results of the proposed method are verified using extensive simulations.
Keywords: pixel-value differencing (PVD), imperceptibility, steganography, PSNR, HVS, least significant
bit (LSB) substitution.
I. Introduction
Steganography is not a new concept. Although the term steganography was coined at the
end of the 15th
century, it is believed that steganography was first practiced during the Golden Age
in Greece. In ancient times, messages were hidden on the wax tables, written on the stomachs of
rabbits, or tattooed on the messenger‟s head [1]. Modern steganography makes use of the digital
multimedia files such as audio, video, image etc for data hiding. Images are widely used digital
media on the Internet, so most steganographic algorithms are implemented on images. The secret
information is embedded into the cover image to obtain the stego image, which is then used for
transmission via a public channel [2].
This paper focuses on achieving both high embedding capacity of cover image as well as high
image quality. This objective is achieved by making use of two techniques: (i) LSB substitution [3], which
belongs to category one, and (ii) PVD [4], which belongs to category two.
The remaining sections of the paper are organized as follows. In section 2, the literature review is
described. In Section 3, the proposed method is presented. In section 4, several experimental results are
presented to demonstrate the performance of proposed scheme. Finally, conclusions are given in Section 5.
II. Literature Review
2.1 PVD method
In 2003, Wu and Tsai used basic property of HVS system and presented a steganography method
using PVD [4]. This method hides different amount of secret bits in consecutive non-overlapping pixel
pairs by taking the difference value between the pixels of a pixel pair. This method partitions the given
cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1 .Wu and Tsai
designed a range table 𝑅𝑗 with ranges varying from 0 to 255. The range table 𝑅𝑗 has six ranges as 𝑅1=[0,7],
𝑅2=[8,15], 𝑅3=[16,31], 𝑅4=[32,63], 𝑅5=[64,127] and 𝑅6=[128,255]. The lower bound and upper bound
value of each range is given by 𝑙𝑗 and 𝑢𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑢𝑗 − 𝑙𝑗 + 1. The
method of hiding secret data into the non-overlapping blocks is as follows:
1. Calculate the difference value between the two pixels of each block, 𝑑𝑖 = 𝑝𝑖 − 𝑝𝑖+1 .
2. Find the range to which the above calculated 𝑑𝑖 belongs to.
3. Compute how many bits of secret data can be embedded in each block of pixel pair, 𝑡𝑗 = 𝑙𝑜𝑔2 𝑅𝑗 .
4. Read 𝑡𝑗 bits from the binary secret data stream and covert into a decimal value 𝑠𝑖.
5. Calculate the new difference value, 𝑑𝑖
′
= 𝑙𝑗 + 𝑠𝑖.
6. Modify the pixels 𝑝𝑖 and 𝑝𝑖+1 as,
2. An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 39 | Page
𝑝𝑖
′
, 𝑝𝑖+1
′
=
𝑝𝑖 +
𝑧
2
, 𝑝𝑖+1 −
𝑧
2
𝑖𝑓 𝑝𝑖 ≥ 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
> 𝑑𝑖
𝑝𝑖 −
𝑧
2
, 𝑝𝑖+1 +
𝑧
2
𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
> 𝑑𝑖
𝑝𝑖 −
𝑧
2
, 𝑝𝑖+1 +
𝑧
2
𝑖𝑓 𝑝𝑖 ≥ 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
≤ 𝑑𝑖
𝑝𝑖 +
𝑧
2
, 𝑝𝑖+1 −
𝑧
2
𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
≤ 𝑑𝑖
(1)
where𝑧 = 𝑑𝑖 − 𝑑𝑖
′
. This process is repeated for each of the block to obtain the stego image.
2.2 PVD and LSB replacement method
In 2005, Wu et al. proposed a steganographic method inspired by PVD technique [4]. This
method partitions the given cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖
and 𝑝𝑖+1. Here, the range table 𝑅𝑗 with ranges varying from 0 to 255 is divided into „lower level‟ and
„higher level‟. In case of div=15, lower level contains ranges 𝑅1=[0,7] and 𝑅2=[8,15] while higher level
contains ranges 𝑅3 =[16,31], 𝑅4 =[32,63], 𝑅5 =[64,127] and 𝑅6 =[128,255]. The lower bound and upper
bound value of each range is given by 𝑙𝑗 and 𝑢𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑢𝑗 − 𝑙𝑗 + 1.
Now, for each block difference value is calculated as, 𝑑𝑖 = 𝑝𝑖 − 𝑝𝑖+1 .
Case I: If the difference value 𝑑𝑖falls in the range of lower level, then LSB substitution method is used to
embed 6-bits of secret data. The procedure is as follows:
Let the 6-bits secret data is S=𝑎1, 𝑎2, 𝑎3, 𝑎4, 𝑎5, 𝑎6.
1. Replace 3-LSB of 𝑝𝑖 with 𝑎1, 𝑎2, 𝑎3 to obtain 𝑝𝑖
′
.
2. Replace 3-LSB of 𝑝𝑖+1 with 𝑎4, 𝑎5, 𝑎6 to obtain 𝑝𝑖+1
′
.
3. Calculate the new difference value 𝑑𝑖
′
= 𝑝𝑖
′
− 𝑝𝑖+1
′
.
4. If the new difference value falls in the higher level, then perform the readjusting operation.
𝑝𝑖
′
, 𝑝𝑖+1
′
=
𝑝𝑖
′
− 8, 𝑝𝑖+1
′
+ 8 𝑖𝑓 𝑝𝑖
′
≥ 𝑝𝑖+1
′
𝑝𝑖
′
+ 8, 𝑝𝑖+1
′
− 8 𝑖𝑓 𝑝𝑖
′
< 𝑝𝑖+1
′ (2)
Case II: If the difference value 𝑑𝑖 falls in the higher level range then PVD method is used to embed secret
data bits in pixel pairs.
2.2Adaptive PVD and LSB replacement method
Khodaei and Faez proposed a method for data hiding in 2012 based on optimum pixel adjustment
process (OPAP) and PVD [5]. In this method,the cover image is divided into consecutive non-overlapping
blocks of size 1×3 in raster scan manner. Each block 𝐵𝑖has a centre pixel named as base pixel 𝑝𝑖𝑐 . The
following steps perform data embedding in each block:
1. Consider k-rightmost LSBs of 𝑝𝑖𝑐 and transform these three LSBs to a decimal value, say 𝐿𝑆𝐵𝑖. Read
k-bits from binary secret data in continuation and replace the k LSBs of 𝑝𝑖𝑐 with these binary secret
data bits to obtain 𝑝𝑖𝑐
′
. Also, transform these bits to a decimal value, say 𝑠𝑖𝑐 .
2. Compute the difference value 𝑑using 𝑑 = 𝐿𝑆𝐵𝑖 − 𝑠𝑖𝑐 .
3. Modify 𝑝𝑖𝑐
′
using OPAP as follows:
𝑝𝑖𝑐
′
=
𝑝𝑖𝑐
′
+ 2 𝑘
𝑖𝑓 𝑑 > 2 𝑘−1
𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑐
′
+ 2 𝑘
≤ 255
𝑝𝑖𝑐
′
− 2 𝑘
𝑖𝑓 𝑑 < −2 𝑘−1
𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑐
′
− 2 𝑘
≤ 255
𝑝𝑖𝑐
′
𝑜𝑡𝑒𝑟𝑤𝑖𝑠𝑒
(3)
4. Compute the absolute difference values between the base pixel and other pixels of the block by using
𝑑𝑖𝑗 = 𝑝𝑖𝑗 − 𝑝𝑖𝑐
′
; (𝑖, 𝑗) ≠ (1,2) (4)
where𝑖 and 𝑗denotes the location of the pixel in a block.
5. Assign the ranges corresponding to the differences found in Step 4 and obtain the lower bounds too
i.e. 𝑙𝑖𝑗 . Accordingly, calculate 𝑡𝑖𝑗 which denotes the number of bits to be concealed into first and third
pixels of the block.
6. Read tij bits in continuation from the binary secret message and transform these bit-sequences
into decimalvalues, say 𝑠𝑖𝑗 . Now, compute the new difference values using
𝑑𝑖𝑗
′
= 𝑙𝑖𝑗 + 𝑠𝑖𝑗 (5)
7. Calculate the two new values of each pixel of a block using
3. An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 40 | Page
𝑝𝑖𝑗
′′
= 𝑝𝑖𝑐
′
− 𝑑𝑖𝑗
′
𝑝𝑖𝑗
′′′
= 𝑝𝑖𝑐
′
+ 𝑑𝑖𝑗
′
(6)
8. Choose the best new value for these pixels from the values obtained in Step 7 using
𝑝𝑖𝑗
′
=
𝑝𝑖𝑗
′′
𝑖𝑓 𝑝𝑖𝑗 − 𝑝𝑖𝑗
′′
< 𝑝𝑖𝑗 − 𝑝𝑖𝑗
′′′
𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑗
′′
≤ 255
𝑝𝑖𝑗
′′′
𝑜𝑡𝑒𝑟𝑤𝑖𝑠𝑒
(7)
Repeat the above procedure for each block 𝐵𝑖 of the cover image so as to obtain the final stego image.
III. Proposed work
This section presents a method, which utilizes LSB substitution and PVD techniques for data hiding. The
method consists of three phases: (i) range division phase, (ii) embedding phase and (iii) extracting phase.
These phases are presented in next subsections.
3.1 Range division phase
Prior to embedding the secret message, the grey level range [0,255] is divided into five ranges
𝐼𝑅 𝑛 (𝑛 = 1, … ,5) where 𝐼𝑅 𝑛 = [𝑙 𝑛 , 𝑢 𝑛 ] , 𝑙 𝑛 denotes the lower bound of the range 𝐼𝑅 𝑛 and 𝑢 𝑛 denotes the
upper bound of the range 𝐼𝑅 𝑛 . These five ranges can be 𝐼𝑅1 = [0,7], 𝐼𝑅2 = [8,15], 𝐼𝑅3 = [16,31],
𝐼𝑅4 = [32,63] and 𝐼𝑅5 = [64,255]. Fig. 1 shows the dividing case i.e. div=15 for the proposed method. It
divides the range [0,255] into „lower level‟ which consist of ranges 𝐼𝑅1 = [0,7], 𝐼𝑅2 = [8,15] and „higher
level‟ which include ranges𝐼𝑅3 = [16,31],𝐼𝑅4 = [32,63], 𝐼𝑅5 = [64,255]. Let 𝑡 𝑛 are the number of bits to
be embedded in the pixels falling under the range 𝑅 𝑛 . According to HVS, changes in edge areas are less
visible than smooth areas and hence, more data can be embedded in edges. In the proposed
method, first two ranges (𝐼𝑅1, 𝐼𝑅2) fall under the category of smooth regions whereas last threeranges
( 𝐼𝑅3, 𝐼𝑅4, 𝐼𝑅5) falls in the edge regions. Therefore, we propose to embed 3 bits in the lower level and 4
bits in the higher level.
Lower-level Higher-level
𝐼𝑅1=[0,7] 𝐼𝑅2=[8,15] 𝐼𝑅3=[16,31] 𝐼𝑅4=[32,63] 𝐼𝑅5=[64,255]
Fig.1 The dividing case (div=15) of the proposed method with „lower level‟ and higher level‟
3.2 Embedding phase
Initially the cover image is divided into non-overlapping blocks having four consecutive pixels
each, in raster scan manner. So, each block consists of four pixels. The data embedding will be
performed in second and third pixel first and then in third and fourth pixel. The following steps
perform data embedding in each block:
1. The secret data will be embedded into the second and third pixel say, 𝑝𝑖2and 𝑝𝑖3using PVD –LSB
method as described in section 2.2. After data embedding we will get new pixels 𝑝𝑖2
′
and 𝑝𝑖3
′
.
2. Now , data embedding in remaining pixels of the block will take place using adaptive PVD-LSB
replacement method as mentioned in section 2.3. Compute the absolute difference between first pixel
𝑝𝑖1and 𝑝𝑖2
′
say, 𝑑𝑖 and the absolute difference between fourth pixel𝑝𝑖4 and 𝑝𝑖3
′
say, 𝑑𝑖+1.
3. Assign the ranges corresponding to the differences found in Step 2 and obtain the lower bounds too
i.e. 𝑙𝑖 and 𝑙𝑖+1 Accordingly, calculate 𝑡𝑖and 𝑡𝑖+1which denotes the number of bits to be concealed.
4. Read 𝑡𝑖and 𝑡𝑖+1 bits in continuation from the binary secret message and transform these bit-
sequences into decimalvalues, say 𝑠𝑖and 𝑠𝑖+1 . Now, compute the new difference values using
𝑑𝑖
′
= 𝑙𝑖 + 𝑠𝑖
𝑑𝑖+1
′
= 𝑙𝑖+1 + 𝑠𝑖+1 (8)
5. Calculate the two new values of first and fourth pixel of a block using
𝑝𝑖1
′′
= 𝑝𝑖2
′
− 𝑑𝑖
′
𝑝𝑖1
′′′
= 𝑝𝑖2
′
+ 𝑑𝑖
′
𝑝𝑖4
′′
= 𝑝𝑖3
′
− 𝑑𝑖+1
′
𝑝𝑖4
′′′
= 𝑝𝑖3
′
+ 𝑑𝑖+!
′
(9)
6. Choose the best new value from step 5 using
𝑝𝑖1
′
=
𝑝𝑖1
′′
𝑖𝑓 𝑝𝑖1 − 𝑝𝑖1
′′
< 𝑝𝑖1 − 𝑝𝑖1
′′′
𝑎𝑛𝑑 0 ≤ 𝑝𝑖1
′′
≤ 255
𝑝𝑖1
′′′
𝑜𝑡𝑒𝑟𝑤𝑖𝑠𝑒
4. An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 41 | Page
𝑝𝑖2
′
=
𝑝𝑖2
′′
𝑖𝑓 𝑝𝑖2 − 𝑝𝑖2
′′
< 𝑝𝑖2 − 𝑝𝑖2
′′′
𝑎𝑛𝑑 0 ≤ 𝑝𝑖2
′′
≤ 255
𝑝𝑖2
′′′
𝑜𝑡𝑒𝑟𝑤𝑖𝑠𝑒
(10)
Repeat the above procedure for every block of the cover image so as to obtain the final stego image.
3.3 Extracting phase
In this part the secret data is obtained from the stego image. The stego image is partitioned into non-
overlapping block of size 1x4 and then for the complete extraction of the secret message following steps
are executed.
1. The data is extracted from the second and third pixel of the block first. Compute the difference
between the two pixel values say 𝑑𝑖
′
. If the difference lies in lower level of the range table then read
three LSB bits from both pixels and concatenate the data bits and call it 𝑠𝑖𝑐 .
2. If the difference lies in the higher level then find out the difference between the lower bound of
corresponding range and 𝑑𝑖
′
, call it b. Find out t i.e. number of concealed bits and covert b into t
number of bits. This string of bits is say, 𝑠𝑖𝑐 .
3. Calculate the absolute difference valuesbetween the 1st
& 2nd
pixel and 3rd
&4th
pixels of a block and
find the range to which these difference values belong to. Then, obtain the lower bound 𝑙𝑖and 𝑙𝑖+1of
the corresponding range and also determine the number of bits 𝑡𝑖and 𝑡𝑖+1to be extracted from each
pixel.
4. Obtain the secret data sub-streams as 𝑠𝑖1and 𝑠𝑖2 by taking the difference between above calculated
difference values and respective lower bounds. Transform 𝑠𝑖1and 𝑠𝑖2 to binary strings with length
equivalent to𝑡𝑖and 𝑡𝑖+1.
Finally, concatenate 𝑠𝑖𝑐 ,𝑠𝑖1and 𝑠𝑖2to obtain the original bit sequence of the secret message.
IV. Experimental Results
This section presents the experimental results of the proposed method. The test images used for
verifying the results are greyscale images of size 512X512, namely „Lena‟, „Baboon‟, „Boat‟ and
„Peppers‟. For the performance evaluation of any steganography method, the three main criteria can be
used:
(i) Capacity: Capacity is defined as the maximum amount of secret message that can be stored in a cover
image [6].
(ii) Imperceptibility: It defines the similarity between the cover image and the stego image. The value of
PSNR is used to define imperceptibility and is given by:
𝑀𝑆𝐸 =
1
𝑀×𝑁
2
1 1
( ( , ) ( , ))
M N
i j
I i j Y i j
(11)
𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10
𝑀𝑎𝑥 2
𝑀𝑆𝐸
(12)
where MxN denotes the size of the cover image I and stego image Y. A high PSNR value means good
quality of stego image whereas a low PSNR means the opposite[7] [8][9].
(iii) Robustness: Robustness is the property that provides the resistance against elimination of secret
information from the stego image. It can be examined through steganalysis. Various steganalytic methods
have been developed to detect the hidden message from the cover media [10][11][12][13].
Fig. 2 shows the changes are unobservable even after large data embedding in the cover image.
Hence, the proposed method provides good image quality. Imperceptibility of the proposed method is
governed by Table 1, which shows the good PSNR value in comparison to PVD-LSB method. Also, the
embedding capacity is higher as compared to PVD-LSB method.The graph in Fig 3.shows the changes that
occur in histogram due to data embedding [9]. It is clear from the fig. 3 that proposed method induces less
uncompensated change in the histogram and therefore is more secure than PVD-LSB method.
5. An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 42 | Page
(a) (b)
Fig. 2. (a) standard cover images (b) stego images embedded with data using proposed method.
Cover images Method Embedding capacity (bits) PSNR (db) Robustness
Lena PVD-LSB 766,040 36.16 Less
Proposed 777,255 36.5076 More
Peppers PVD-LSB 770,248 35.34 Less
Proposed 77,8591 35.2305 More
Baboon PVD-LSB 717,848 32.63 Less
Proposed 768,538 33.1523 More
Boat PVD-LSB 756,768 33.62 Less
Proposed 776,904 33.9226 More
Table 1. Comparison of the results between PVD-LSB and proposed method.