Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakness which is a lower capacity. Based on DWT’s problem, proposed Huffman Coding to reduce the total of the message’s bit and increase the capacity. In the implementation, a message will be processed by using AES and compressed by using Huffman Coding then conceal in a cover using DWT. After doing several experiments using a 128x128 pixel message image and a 512x512 pixel of the cover image, achieved the average of MSE is 1.5676 and the average of PSNR result is above 40 db which is 46.1878.
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed to improve
security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for
double protection during data transmission. The selected steganographic algorithm is the use of a
combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very
important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed
method of DCT transformation first, proceed with DWT transformation. From the experimental results
obtained better imperceptibility quality, compared with existing methods. To add OTP message security
applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments
conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and
NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all
images is 1.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document summarizes a research paper that proposes a new technique for data embedding and extraction in high resolution AVI videos. The technique encrypts a secret message before embedding it by alternately changing the LSB and LSB+3 bits of alternate bytes in the cover video file. An index is also created for the secret information and placed in a video frame to aid extraction. This technique aims to provide higher security, capacity and robustness compared to typical data embedding methods. The paper discusses related work on digital steganography techniques and the proposed video steganography algorithm in more detail.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
This document reviews various video steganography methods that use neural networks. It discusses how neural networks can be used for steganalysis to detect hidden data in digital media. The document provides an overview of different neural network approaches that have been used for video watermarking and audio digital watermarking. These include using neural networks to preferentially allocate watermarks to motion coefficients in video and memorizing watermarks in the neurons of a counterpropagation neural network for audio. The conclusion states that neural network techniques can help improve the performance of various video steganography methods.
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed to improve
security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for
double protection during data transmission. The selected steganographic algorithm is the use of a
combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very
important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed
method of DCT transformation first, proceed with DWT transformation. From the experimental results
obtained better imperceptibility quality, compared with existing methods. To add OTP message security
applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments
conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and
NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all
images is 1.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document summarizes a research paper that proposes a new technique for data embedding and extraction in high resolution AVI videos. The technique encrypts a secret message before embedding it by alternately changing the LSB and LSB+3 bits of alternate bytes in the cover video file. An index is also created for the secret information and placed in a video frame to aid extraction. This technique aims to provide higher security, capacity and robustness compared to typical data embedding methods. The paper discusses related work on digital steganography techniques and the proposed video steganography algorithm in more detail.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
This document reviews various video steganography methods that use neural networks. It discusses how neural networks can be used for steganalysis to detect hidden data in digital media. The document provides an overview of different neural network approaches that have been used for video watermarking and audio digital watermarking. These include using neural networks to preferentially allocate watermarks to motion coefficients in video and memorizing watermarks in the neurons of a counterpropagation neural network for audio. The conclusion states that neural network techniques can help improve the performance of various video steganography methods.
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...IDES Editor
This paper proposes a 2-tier data hiding technique
that involves Exploiting Modification Direction (EMD) method
and Huffman Coding. Firstly, a secret message of an arbitrary
plain text is encrypted, compressed and transformed into a
stream of bits. Subsequently, the bits are converted into secret
digits by using the Huffman dictionary table. Secondly, a
cover image is segmented into groups of n pixels and each
group is embedded with one secret digit by modifying one
gray-scale value at most to hide the secret digit in (2n+1)-ary
notational system. The experimental results have shown that
both PSNR and payload of the proposed method are higher
than that of well-known methods namely, OPAP, EMD and
Opt EMD.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
The document summarizes a research paper that proposes a reversible data hiding method using histogram shifting with additional techniques to improve embedding capacity and image quality. It divides the host image into blocks to embed data, uses data compression methods like Huffman coding to compress secret data, and shifts the pixel value histogram to embed the data without causing overflow or underflow. The method uses a binary tree structure to communicate multiple peak points used for embedding and ensures reversibility through a location map recording histogram shifting information. The goal is to provide high embedding capacity with low distortion for applications requiring original image retrieval like medical and military imaging.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
Highly secure scalable compression of encrypted imageseSAT Journals
Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression
Encryption converts plaintext into ciphertext using an algorithm and key. Gaussian elimination with partial pivoting and row exchange is used to encrypt images by converting the image matrix to an upper triangular matrix and generating a decryption key. The encrypted image matrix and key can then be multiplied to recover the original image matrix and decrypt the image. This algorithm allows for faster encryption time while still producing robust encryption to prevent unauthorized access to images.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and detecting sound waves. The steganography system applies compressive sampling (CS) to the process of acquisition and compression of bits in binary images. Rivest, Shamir, and Adleman (RSA) algorithms are used as a system for securing binary image information by generating encryption and decryption key pairs before the process is embedded. The insertion method uses statistical mean manipulation (SMM) in the wavelet domain and low frequency sub-band by dividing the audio frequency sub-band using discrete wavelet transform (DWT) first. The optimal results by using our system are the signal-to-noise ratio (SNR) above 45 decibel (dB) and 5.3833 bit per second (bps) of capacity also our system has resistant to attack filtering, noise, resampling and compression attacks.
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
A 2-tier Data Hiding Technique Using Exploiting Modification Direction Method...IDES Editor
This paper proposes a 2-tier data hiding technique
that involves Exploiting Modification Direction (EMD) method
and Huffman Coding. Firstly, a secret message of an arbitrary
plain text is encrypted, compressed and transformed into a
stream of bits. Subsequently, the bits are converted into secret
digits by using the Huffman dictionary table. Secondly, a
cover image is segmented into groups of n pixels and each
group is embedded with one secret digit by modifying one
gray-scale value at most to hide the secret digit in (2n+1)-ary
notational system. The experimental results have shown that
both PSNR and payload of the proposed method are higher
than that of well-known methods namely, OPAP, EMD and
Opt EMD.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
The document summarizes a research paper that proposes a reversible data hiding method using histogram shifting with additional techniques to improve embedding capacity and image quality. It divides the host image into blocks to embed data, uses data compression methods like Huffman coding to compress secret data, and shifts the pixel value histogram to embed the data without causing overflow or underflow. The method uses a binary tree structure to communicate multiple peak points used for embedding and ensures reversibility through a location map recording histogram shifting information. The goal is to provide high embedding capacity with low distortion for applications requiring original image retrieval like medical and military imaging.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
Highly secure scalable compression of encrypted imageseSAT Journals
Abstract A highly secure scalable compression method for stream cipher encrypted images is described in this journal. The input image first undergoes encryption and then shuffling. This shuffling in the image pixels enhances the security. For shuffling, Henon map is used. There are two layers for the scalable compression namely base layer and enhancement layer. Base layer bits are produced by coding a series of non-overlapping patches of uniformly down sampled version of encrypted image. In the enhancement layer pixels are selected by random permutation and then coded. From all the available pixel samples an iterative multi scale technique is used to reconstruct the image and finally performs decryption. The proposed method has high security. Key Words: Encryption, Decryption, Shuffling, Scalable compression
Encryption converts plaintext into ciphertext using an algorithm and key. Gaussian elimination with partial pivoting and row exchange is used to encrypt images by converting the image matrix to an upper triangular matrix and generating a decryption key. The encrypted image matrix and key can then be multiplied to recover the original image matrix and decrypt the image. This algorithm allows for faster encryption time while still producing robust encryption to prevent unauthorized access to images.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
Imperceptible and secure image watermarking using DCT and random spread techn...TELKOMNIKA JOURNAL
Watermarking is a copyright protection technique, while cryptography is a message encoding
technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking.
Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm
proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of
Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN
Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is
widely used in spread spectrum watermarking technique. Based on the experimental results and testing of
the proposed method proved that imperceptibility and watermark security are increased. Improved
imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness
aspect is also maintained which has been proven by the excellent value of NCC.
DWT-SMM-based audio steganography with RSA encryption and compressive samplingTELKOMNIKA JOURNAL
Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and detecting sound waves. The steganography system applies compressive sampling (CS) to the process of acquisition and compression of bits in binary images. Rivest, Shamir, and Adleman (RSA) algorithms are used as a system for securing binary image information by generating encryption and decryption key pairs before the process is embedded. The insertion method uses statistical mean manipulation (SMM) in the wavelet domain and low frequency sub-band by dividing the audio frequency sub-band using discrete wavelet transform (DWT) first. The optimal results by using our system are the signal-to-noise ratio (SNR) above 45 decibel (dB) and 5.3833 bit per second (bps) of capacity also our system has resistant to attack filtering, noise, resampling and compression attacks.
Hiding data in images using steganography techniques with compression algorithmsTELKOMNIKA JOURNAL
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
Steganography is the science that involves
communicating secret information in an appropriate
carrier so no one apart from the sender and the recipient
even can recognize that there is hidden
information. Steganography is the art of hiding
messages inside unsuspicious medium such as images,
videos, various types of files…etc. It's a method to
establish a secure communication channel between two
parties. The purpose of steganography is to hide the
existence of a message from an eavesdropper or third
parties. Steganalysis is the branch of data processing
that seeks the identification of carrier vessels and
retrieval of message hidden. In this paper we present
enhanced implementation for Steganography algorithm,
an algorithm that we claim to be safe, built over DCT
(Discrete Cosine Transformation) frequency
domain mutation[12], the algorithm uses error reductive
measurements such as pattern matching to obtain
a reasonable a better image quality by reducing number
of changes that steganography algorithm made during
the embedding process.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
Secure image hiding in speech signal by steganography-mining and encryptionnooriasukmaningtyas
Information hiding techniques are constantly evolving due to the increased need for security and confidentiality. This paper proposes a working mechanism in three phases. The first phase includes scrambling the values of the gray image depending on a series of keys that are generated using a quantum chaotic map. The second phase generates hybrid keys by mixing a Zaslavsky and a 3D Hanon map that are used to encrypt the gray image values produced after the scramble. Finally, in the third phase, a new algorithm is suggested to hide the encrypted gray image at random locations within a speech file. This algorithm includes the LSB algorithm to determine the hidden bits and the zero-crossing K-means algorithm in selecting locations mining in a scattered manner so that hackers cannot easily retrieve the hidden data of any hacked person. Also used a fractional fourier transform to choose magnitude value as specific data to hide encoded image data. The measures MSE, PSNR, NSCR, and UACI are using to measure the work efficiency in the encryption algorithm, and in measuring the efficiency of the hidden algorithm, use the measures SNR, PSNR, and MSE. The results of the paper are encouraging and efficient compared to other algorithms that performed the same work. Hence our results show the larger the image dimensions used, the better the values.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
The document proposes an enhanced steganography-based approach to protect secret data by embedding it within audio files using a two-level protection system. Encryption using 3-DES is used as the first level of defense, while hiding data in the least significant bit of the audio samples creates the second level. The proposed approach achieves better performance than similar methods in terms of PSNR, SSIM, and correlation between the original and stego audio files. Experimental results show the system is suitable for hiding secret textual data and increases the bit error rate only slightly even when duplicating the hidden text.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
- Steganography is the art and science of invisible communication as it hides the information message
inside cover image In This paper the cover image is decomposed using multilevel wavelet transform and theses
wavelet coefficients are statistically weighted according to their perceptual importance (CSF weights) to identify
the regions of interest for the embedding. The hiding image is encrypted using secret key based on wavelet
coefficients on the last approximation level. Then the encrypted watermark is embedded using CSF weights in
the wavelet domain into the cover image. Experimental results denote the feasibility of the proposed method as
the stego images has high PSNR and subjective quality which declare that the algorithm gains a good
performance in transparency and robustness against noise attacks.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
Steganography gained significance in the past few years due to the increasing need
for providing secrecy in an open environment like the internet. With almost anyone can
observe the communicated data all around, steganography attempts to hide the very existence
of the message and make communication undetectable. In this paper we propose a modern
technique with Integer Wavelet transform (IWT) and double key to accomplish high hiding
capability, high security and good visual quality. Here cover image is transformed in to
wavelet transform co-efficients and the coefficients are selected randomly by using Key-2 for
embedding the data. Key-1 is used to calculate the number of bits to be embedded in the
randomly selected coefficients. Finally the Optimum Pixel Adjustment Process(OPAP) is
applied to the stego image to reduce the data embedding error.
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
The document summarizes a research paper presented at the National Conference on Emerging Trends in Information and Computing Technologies. The paper proposes a novel steganographic technique that embeds data by altering the least significant bit of low frequency discrete cosine transform coefficients of image blocks. Experimental results showed the technique has a better peak signal-to-noise ratio value and higher data capacity compared to other techniques like least significant bit, modulus arithmetic, and SSB4-DCT embedding. It also maintains satisfactory security as the secret message cannot be extracted without knowing the decoding algorithm.
This document describes an improvement made to the Advanced Encryption Standard (AES) algorithm for encrypting images. The AES algorithm is widely used but suffers from long encryption times, especially when processing large images. The authors implemented an improved version of AES using the VB.NET framework to address these issues. They eliminated the use of an encryption key, which reduced encryption time. Comparisons showed the improved AES encrypted a 1KB image 0.3 milliseconds on average, faster than other recent algorithms. The improvement successfully enhanced AES encryption speed for images.
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
Similar to An improved security and message capacity using AES and Huffman coding on image steganography (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
2. TELKOMNIKA ISSN: 1693-6930 ◼
An improved security and message capacity using AES... (Christy Atika Sari)
2401
algorithm for compressing the message because of its advantage. Utilizing an image
compression, hopefully, can minimize the DWT weakness and increase the capacity. To secure
the message authenticity, a cryptography method can be implemented in the message before
concealing the message. Many popular algorithms that can be applied in cryptography, such as
Data Encryption Standard (DES), 3-DES, Blowfish, Rivest–Shamir–Adleman (RSA), RC4, and
Advanced Encryption Standard (AES) [19, 20]. Comparing to the other algorithms, AES has a
good cryptographic algorithm based on its security and time to process [21]. In this research, a
combination of cryptography and steganography which are using AES and DWT can protect
the message. On the other hand, utilizing Huffman Coding in the message before doing
steganography, hopefully, can increase the payload by decreasing the message bit.
2. Research Method
2.1. Basic Theory
2.1.1. Discrete Wavelet Transform (DWT)
In DWT there are several filters that can be implemented to process the signal and Haar
is the simplest filter that mostly used. The implementation of DWT in the 2D image is by dividing
the image into four subbands, such as LL–LH–HL–HH [10, 22], can be seen in Figure 1.
Figure 1. DWT subbands
To gain the coefficient of every subband can be used the Haar filter calculation
below [22, 23] :
𝐿𝐿(𝑥, 𝑦) =
𝑝(𝑥,𝑦)+𝑝(𝑥,𝑦+1)+𝑝(𝑥+1,𝑦)+𝑝(𝑥+1,𝑦+1)
2
(1)
𝐿𝐻(𝑥, 𝑦) =
𝑝(𝑥,𝑦)+𝑝(𝑥,𝑦+1)−𝑝(𝑥+1,𝑦)−𝑝(𝑥+1,𝑦+1)
2
(2)
𝐻𝐿(𝑥, 𝑦) =
𝑝(𝑥,𝑦)−𝑝(𝑥,𝑦+1)+𝑝(𝑥+1,𝑦)−𝑝(𝑥+1,𝑦+1)
2
(3)
𝐻𝐻(𝑥, 𝑦) =
𝑝(𝑥,𝑦)−𝑝(𝑥,𝑦+1)−𝑝(𝑥+1,𝑦)+𝑝(𝑥+1,𝑦+1)
2
(4)
where, x = number of row, y = number of column, and p = the image pixel.
2.1.2. Advanced Encryption Standard (AES)
AES is the most popular cryptography algorithm that has a good security level and
the fastest encryption [21, 24]. Generally, AES has four actual steps, such as
SubBytes–ShiftRows–MixColumns–AddRoundKey [25, 26]. Visualization of the encryption and
decryption process at AES can be seen in Figure 2 and Figure 3. To understand each process
in AES, the explanation are given as below :
a. AddRoundKey
Implementing the XOR operation between each component of the block message and
each component of the block key, as shown in Figure 4.
b. SubBytes & InvSubBytes
In the SubBytes and InvSubBytes process, it can be performed by looking up in
the SubBytes Box (S-Box) as shown in Figure 5 for the SubBytes Process and Figure 6 for
InvSubBytes.
3. ◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2400-2409
2402
c. ShiftRows & InvShiftRows
In this process, it is used to shift or move each message component as shown in
Figure 7 for the shifting process and Figure 8 for inverse
d. MixColumns & InvMixColumns
Apply the XOR operation between the message block and the MixColumns box for
the MixColumns process shown in Figure 9 and InvMixColumns Box for the InvMixColumns
process that can be displayed in Figure 10.
Figure 2. AES encryption
Figure 3. AES decryption
Figure 4. AddRoundKey process
4. TELKOMNIKA ISSN: 1693-6930 ◼
An improved security and message capacity using AES... (Christy Atika Sari)
2403
Figure 5. SubBytes process Figure 6. InvSubBytes process
Figure 7. ShiftRows process
Figure 8. InvShiftRows process
Figure 9. MixColumns process Figure 10. InvMixColumns process
2.1.3. Huffman Coding
Huffman Coding has several advantages, such as lossless image compression and
easy to implement [27]. In the implementation, Huffman Coding used the occurrence of each
data, then it will be sorted by ascending. Huffman Coding produced Huffman Tree that should
be used to restore the data becomes the original data after being compressed.
2.2. Data Resource
Six images were downloaded from the sipi.usc.edu site used in this experiment,
the image is shown in Figure 11.
(a) (b) (c) (d) (e) (f)
Figure 11. (a) apc.png, (b) baboon.png, (c) boat.png, (d) f16.png, (e) lake.png, (f) lena.png
1 Left Shift
0 Left Shift
2 Left Shift
3 Left Shift
1 Right Shift
0 Right Shift
2 Right Shift
3 Right Shift
5. ◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2400-2409
2404
2.3. Proposed Method
A combination of AES, Huffman Coding, and Haar DWT which aims to reduce the total
of message’s bit in steganography. There are two main processes, which are: embedding
the message process and extracting the message process. The scheme can in Figure 12 for
embedding and Figure 13 for extracting.
Figure 12. Embedding scheme
Figure 13. Extracting scheme
6. TELKOMNIKA ISSN: 1693-6930 ◼
An improved security and message capacity using AES... (Christy Atika Sari)
2405
2.3.1. Embedding The Message Process
In the embedding process, there are several steps that should be done as follow :
− Firstly, a 128x128 pixel message image will be processed by using AES with a key and turns
into an encrypted message image.
− Implementing Huffman Coding in an encrypted message image and producing two different
results which are a compressed encrypted message image and Huffman tree file.
− Next step is decomposing a 512x512 pixel cover image by using DWT to get four subbands
which are LL, LH, HL, and HH.
− From a compressed encrypted message image that already got, embed into the chosen
subbands (LH, HL, and HH) and produce an embedding subbands of the cover image.
− The final step is composing embedding subbands of the cover image by using Inverse DWT
and producing a stego image.
2.3.2. Extracting The Message Process
For the extracting process to gain a message, several steps should be followed :
− A stego image will be processed by using DWT to produce four subbands of stego image.
− Extract a message from the chosen subbands (LH, HL, and HH) and produce a compressed
encrypted message image.
− Next step is by using the Huffman tree file and implementing Huffman Coding, decompress a
compressed encrypted message image and producing an encrypted message image.
− Finally, decrypting an encrypted message image by using AES with a key and producing a
message image.
3. Results and Analysis
3.1. Method Testing
In this research, to test and to measure the quality of stego image will be done
the calculation using MSE and PSNR between an original cover image and a stego image.
The details as follow :
3.1.1. Mean Square Error (MSE)
𝑀𝑆𝐸 =
∑ 𝑚
𝑖=1 ∑ (𝑝(𝑖,𝑗)−𝑞(𝑖,𝑗))
2𝑛
𝑗=1
𝑟∗𝑐
(5)
From (5), according to [28], achieved the smaller value indicated that a stego image is
more closely to be the same as an original cover image.
3.1.2. Peak Signal to Noise Ratio (PSNR)
𝑃𝑆𝑁𝑅 = 10 𝑙𝑜𝑔10(
2552
√𝑀𝑆𝐸
) (6)
According to [14], the higher the PSNR result and achieved more than 40 dB indicated
that a stego image has a good imperceptibility.
3.2. Experiment
In this experiment, used all ten images and divided into two different sections, one
image will be a cover image, and the rest which is nine images will be a message image. Here
is the result of several experiments that have been done as shown in Figure 14.
After implementing Huffman Coding in each message, based on Figure 14, the total of
bits are reducing and achieved the average of the total of bit reached up to 29,255 bits from
131,072 bits or it is about 22.319%. After doing several experiments achieved the average of
MSE result is 1.5711 and the average of PSNR result is 46.1788. As shown in Table 1,
the PSNR value means that image quality is in an excellent category.
7. ◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2400-2409
2406
Figure 14. Total of bits before–after implementing Huffman Coding
Table 1. MSE and PSNR results of implementing the proposed method
Data
Result
With Huffman Coding Without Huffman Coding
Cover Message MSE PSNR MSE PSNR
Apc
Baboon 1.4656 46.4708 1.8775 45.3949
Boat 1.4708 46.4553 1.9052 45.3314
F-16 1.4673 46.4655 1.8833 45.3816
Lake 1.4777 46.4349 1.9035 45.3352
Lena 1.4761 46.4396 1.9050 45.3319
Baboon
Apc 1.4535 46.5066 1.8418 45.4784
Boat 1.4486 46.5213 1.8406 45.4813
F-16 1.4410 46.5442 1.8385 45.4862
Lake 1.4429 46.5385 1.8458 45.469
Lena 1.4361 46.5589 1.8456 45.4694
Boat
Apc 1.5305 46.2825 1.9774 45.1699
Baboon 1.5267 46.2932 1.9502 45.2300
F-16 1.5385 46.2600 1.9744 45.1764
Lake 1.5237 46.3018 1.9558 45.2176
Lena 1.5373 46.2631 1.9643 45.1988
F-16
Apc 1.7460 45.7103 2.2362 44.6358
Baboon 1.7434 45.7167 2.2565 44.5964
Boat 1.7547 45.6888 2.2603 44.5891
Lake 1.7408 45.7233 2.2316 44.6446
Lena 1.7416 45.7214 2.2659 44.5784
Lake
Apc 1.5497 46.2282 2.0239 45.0688
Baboon 1.5702 46.1712 2.0273 45.0616
Boat 1.5684 46.1763 2.0052 45.1091
F-16 1.5476 46.2343 2.0137 45.0909
Lena 1.5640 46.1884 2.0162 45.0854
Lena
Apc 1.6876 45.8582 2.1354 44.8360
Baboon 1.6720 45.8984 2.1312 44.8446
Boat 1.6601 45.9296 2.1320 44.8429
F-16 1.6665 45.9127 2.1025 44.9034
Lake 1.6828 45.8704 2.1243 44.8586
Average 1.5711 46.1788 2.0157 45.0966
Based on Table 2, can be concluded that a few pixel difference that has been achieved
between an original cover image and a stego image. The stego image with Huffman Coding
also gave the effect in decreasing the pixel difference than the stego image without Huffman
Coding, so that in a human visualization, a stego image still looks like an original cover image.
This proposed method that concealed a 128x128 pixel message image into a
512x512 pixel of the cover image is produced a good quality of stego image.
8. TELKOMNIKA ISSN: 1693-6930 ◼
An improved security and message capacity using AES... (Christy Atika Sari)
2407
Table 2. Histogram Difference
Original
Cover
Image
Original Cover Histogram
Stego Image
Message
Histogram
Without Huffman Coding With Huffman Coding
Apc Baboon
Baboon Boat
Boat F-16
F-16 Lake
Lake Lena
Lena Apc
9. ◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2400-2409
2408
4. Conclusion
In this research, a combination of AES–Huffman Coding–DWT to secure a message
image and conceal into a cover image, produced a good stego image quality. Provided a higher
capacity in DWT for steganography by reducing the total of message’s bit up to 22.319% from
the original message’s bit. A good stego image quality is proven by achieving the average of
PSNR result is more than 40db which is 46.1788.
References
[1] Stallings W. Cryptography and network security: principles and practice. 6th
ed. Pearson. 2013.
[2] Damara Ardy R, Indriani OR, Sari CA, Setiadi DRIM, Rachmawanto EH. Digital image signature
using triple protection cryptosystem (RSA, Vigenere, and MD5). In: Proceeding of 2017 International
Conference on Smart Cities, Automation and Intelligent Computing Systems. IEEE. 2018.
[3] Setiadi DRIM. Payload Enhancement on Least Significant Bit Image Steganography Using Edge
Area Dilation. Intl J Electron Telecommun. 2019; 65(2): 295–300.
[4] Nain S, Kumar S. Steganography and Its Various Techniques. Int J Enhanc Res Sci Technol Eng.
2014; 3(6): 241–245
[5] Siper A, Farley R, Lombardo C. The Rise of Steganography. 2005.
[6] Chandran S, Bhattacharyya K. Performance analysis of LSB, DCT, and DWT for digital watermarking
application using steganography. In: 2015 International Conference on Electrical, Electronics,
Signals, Communication, and Optimization (EESCO). IEEE. 2015
[7] Bhattacharyya S, Sanyal G. Computer Network and Information Security. Comput Netw Inf Secur.
2012: 7: 27–40.
[8] Sari WS, Rachmawanto EH, Setiadi DRIM, Sari CA. A Good Performance OTP encryption image
based on DCT-DWT steganography. TELKOMNIKA Telecommunication Computing Electronics and
Control. 2017: 14(4): 1982-1989
[9] Baby D, Thomas J, Augustine G, George E, Michael NR. A Novel DWT Based Image Securing
Method Using Steganography. Procedia Comput Sci. 2015; 46: 612–618.
[10] Setyono A, Setiadi DRIM, Muljono M. StegoCrypt method using wavelet transform and one-time pad
for secret image delivery. In: 2017 4th International Conference on Information Technology,
Computer, and Electrical Engineering (ICITACEE). IEEE. 2017: 203–207.
[11] Budiman G, Novamizanti L, Iwut I. Genetics algorithm optimization of DWT-DCT based image
Watermarking. J Phys Conf Ser. 2017; 795(1): 012039.
[12] Wahab OFA, Hussein AI, Hamed HFA, Kelash HM, Khalaf AAM, Ali HM. Hiding data in images using
steganography techniques with compression algorithms. TELKOMNIKA Telecommunication
Computing Electronics and Control. 2019; 17(3): 1168.
[13] Cheddad A. Steganoflage: A New Image Steganography Algorithm. 2009.
[14] Setiadi DRIM, Jumanto J. An enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel
edge detection. Cybern Inf Technol. 2018; 18(2): 74–88.
[15] Tushara M, Navas KA. Image Steganography Using Discrete Wavelet Transform-A Review. Int J
Innov Res Electr Electron Instrum Control Eng nCORETech. LBS Coll Eng Kasaragod. 2016; 3(1):
2321–5526.
[16] Patel R, Kumar V, Tyagi V, Asthana V. A fast and improved Image Compression technique using
Huffman coding. In: 2016 International Conference on Wireless Communications, Signal Processing,
and Networking. IEEE. 2016: 2283–2286.
[17] Sarkar SJ, Sarkar NK, Banerjee A. A novel Huffman coding based approach to reduce the size of
large data array. In: 2016 International Conference on Circuit, Power and Computing Technologies.
IEEE. 2016: 1–5.
[18] Atoum MS, Ibrahim S, Sulong G, Zamani M. A New Method for Audio Steganography Using Message
Integrity. J Converg Inf Technol. 2013; 8(September): 35–44.
[19] Chandra S, Paira S, Alam SS, Sanyal G. A comparative survey of Symmetric and Asymmetric Key
Cryptography. In: 2014 International Conference on Electronics, Communication and Computational
Engineering. IEEE. 2014: 83–93.
[20] Setiadi DRIM, Rachmawanto EH, Sari CA, Susanto A, Doheir M. A Comparative Study of Image
Cryptographic Method. In: 2018 5th International Conference on Information Technology, Computer,
and Electrical Engineering (ICITACEE). IEEE. 2018: 336–41.
[21] Rao SK, Mahto D, Khan DA. A Survey on Advanced Encryption Standard. Int J Sci Res. 2017; 6(1):
711–724.
[22] Ardiansyah G, Sari CA, Setiadi DRIM, Rachmawanto EH. Hybrid method using 3-DES, DWT and
LSB for secure image steganography algorithm. In: 2017 2nd International conferences on
Information Technology, Information Systems, and Electrical Engineering. IEEE. 2017: 249–54.
10. TELKOMNIKA ISSN: 1693-6930 ◼
An improved security and message capacity using AES... (Christy Atika Sari)
2409
[23] Yasin A, Shehab MN, Sabha M, Yasin M. An Enhanced Steganographic Model Based on DWT
Combined with Encryption and Error Correction Techniques. International Journal of Advanced
Computer Science and Applications. 2015; 6(12).
[24] Rachmawanto EH, Amin RS, Setiadi DRIM, Sari CA. A performance analysis StegoCrypt algorithm
based on LSB-AES 128 bit in various image size. In: Proceedings-2017 International Seminar on
Application for Technology of Information and Communication: Empowering Technology for a Better
Human Life, iSemantic 2017. 2018.
[25] Saraf KR, Jagtap VP, Mishra AK. Text and Image Encryption Decryption Using Advanced Encryption
Standard. Int J Emerg Trends Technol Comput Sci. 2014; 3(3): 118–126.
[26] Prasetyadi G, Refianti R, Mutiara AB. File Encryption and Hiding Application Based on AES and
Append Insertion Steganography. TELKOMNIKA. 2018 Feb 1; 16(1):361.
[27] Dhawale N. Implementation of Huffman algorithm and study for optimization. In: 2014 International
Conference on Advances in Communication and Computing Technologies. IEEE. 2014: 1–6.
[28] Farahani MRD, Pourmohammad A. A DWT Based Perfect Secure and High Capacity Image
Steganography Method. In: 2013 International Conference on Parallel and Distributed Computing,
Applications and Technologies. IEEE. 2013: 314–317.