The document discusses applying data hiding in audio-video files using anti-forensics techniques for authentication and data security. It proposes using steganography, which is hiding secret information in carrier files like audio and video, combined with anti-forensics techniques. The system would hide encrypted data in the least significant bits of frames in audio-video files. Parameters like PSNR and histograms would be analyzed at the transmitter and receiver ends to authenticate the data and ensure security. Common steganography algorithms like LSB and AES encryption would be used. The system aims to provide a more secure way of transferring data between client and server compared to traditional passwords or encryption alone.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
Now-a-days many encryption algorithms have been proposed for network security. In this
paper, a new cryptographic algorithm for network security is proposed to assist the
effectiveness of network security. Here symmetric key concept instead of public key is
considered to develop the encryption – decryption algorithm. Also, to give more security in the
algorithm, the idea of one way function alongwith Newton’s method is applied as a secret key to
the proposed work as well as Digital Signature Standard (DSS) technology is used to send the
key. Moreover, steganography is used to hide the cipher within a picture in encryption
algorithm. In brief, a numerical method based secret key encryption – decryption algorithm is
developed using steganography to enhance the network security.
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
Now-a-days many encryption algorithms have been proposed for network security. In this
paper, a new cryptographic algorithm for network security is proposed to assist the
effectiveness of network security. Here symmetric key concept instead of public key is
considered to develop the encryption – decryption algorithm. Also, to give more security in the
algorithm, the idea of one way function alongwith Newton’s method is applied as a secret key to
the proposed work as well as Digital Signature Standard (DSS) technology is used to send the
key. Moreover, steganography is used to hide the cipher within a picture in encryption
algorithm. In brief, a numerical method based secret key encryption – decryption algorithm is
developed using steganography to enhance the network security.
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
Several developments in the transfer of data through the internet make it easier to transfer the data faster and accurately to the destination. But in this, anyone can misuse and modify the critical information through hacking. Video steganography is a technique which is used to hide the message and to transfer the message inside a video. Video is an application of many frames of audio, text, and images. The segmentation is known as the advanced technology that provides rich information of an image. The purpose of this paper is to propose a new technique to hide the data using video steganography with the help of artificial intelligence and DWT. This paper focuses on analyzing the various video steganography techniques which were proposed for securing the data transmission. In this paper, artificial intelligence is applied in order to improve the integrity and security of data transfer. The performance of the proposed method is evaluated on the basis of Bit error, mean square error, and PSNR metrics. Shivani Gupta | Gargi Kalia | Preeti Sondhi ""Video Steganography using Discrete Wavelet Transform and Artificial Intelligence"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25067.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/25067/video-steganography-using-discrete-wavelet-transform-and-artificial-intelligence/shivani-gupta
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Since so many years a problem occurs in KSB Pump Va mbori for casting process i.e. cracks occurs in the castings & it is repeated one. Therefore the compan y has given opportunity to me to solve this problem . In case of steel casting there are mainly cracks & also blo w holes induced due to the casting procedure. There are many factors for the casting defects .The factor is unev en material feeding in casting & also due to the mo uld material & also the core material. These cracks finally brea k directly the component of the casting i.e. in cas e of pump the casting component is like Impeller,Volute casing & casing cover. At the time of feeding of steel material in to the casting the material is in liquid us form i.e. it i s hot material & this material is feeding into casting at the time o f feeding it develop different region of heat. At o ne side the temp is high &at other side the temp is low this also pr oduce cracks. To simulate that casting we use the M AGMA SOFTWARE for simulation & validate it using NDT.
A COMPARATIVE STUDY OF DESIGN OF SIMPLE SPUR GEAR TRAIN AND HELICAL GEAR TRAI...ijiert bestjournal
In recent times,the gear design has become a highl y complicated and comprehensive subject. A designer of modern gear drive system must have to r emember that the main objective of gear drive is to transmit higher power with comparatively smaller overall dim ensions of the driving system which can be construc ted with minimum possible manufacturing cost,runs reas onably free of noise and vibration and which requir es little maintenance. In this paper single stage spur gear t rain and helical gear train with a idler gear are d esigned by American Gear Manufacturing Association (AGMA) stan dard. A idler gear is placed between two gearwheel to obtained the same direction of rotation. AGMA stres s equation is used to determined the tooth bending strength and surface contact strength. As a result,dimensio ns of gears are find out and comparative study is c arried out to select the optimum design of gear train for a give n input parameter
COMPARATIVE ANALYSIS OF CONVENTIONAL LEAF SPRING AND COMPOSITE LEAFijiert bestjournal
A leaf spring is a simple form of spring,commonly used for the suspension in wheeled vehicles. It is also one of the oldest forms of spring. Sometimes referred to as a semielliptical l eaf spring (SELS) it takes the form of a slender ar c-shaped length of spring steel of rectangular cross section. The centre of the arc p rovides location for the axle,while tie holes are provided at either end for attaching to the vehicle body. In the present work,a seven-leaf steel spring use d in passenger cars is replaced with a composite mu lti leaf spring made of glass/epoxy composites. The dimensions sand the num ber of leaves for both steel leaf spring and compos ite leaf springs are considered to be the same. The primary objective is to compare their load carrying capacity,stiffness and weight savings of composite leaf spring. Finally,fatigue life of steel and com posite leaf spring is also predicted using life dat a
Brimmed diffuser is collection�acceleration device which shrouds a wind turbine.For a given turbine di ameter,the power augmentation can be achieved by brimmed diffuser,p opularly known as wind lens. The present numerical investigation deals with the effect of low pressure region created by wind l ens and hence to analyze the strong vortices formed by a brim attached to the shroud diffuser at exit. Also in this analysis,a c omparative numerical prediction of mass flow rates through the wind turbine has been carried out with various types of wind lens wh ich in turn helps to optimize the torque augmentati on. It has been numerically proved that there is significant increase in the wa ke formation & vortex strength when brimming effect is added to a diffuser
FINITE ELEMENT ANALYSIS OF CONNECTING ROD OF MG-ALLOY ijiert bestjournal
The automobile engine connecting rod is a high volume production,critical component. It co nnects reciprocating piston to rotating crankshaft,transmitting the thrust of the piston to the crankshaft. Every vehicle that uses an internal combustion engine requires at least one connecting rod depending upon the number of cylinders in the engine. As the purp ose of the connecting rod is to transfer the reciprocating motion of the piston into rotary motion of the crankshaft. Connecting ro ds for automotive applications are typically manufactured by forging from either w rought steel or powdered metal. the material used f or this process is Mg-Alloy and also finite element analysis of connecting rod
REVIEW ON CRITICAL SPEED IMPROVEMENT IN SINGLE CYLINDER ENGINE VALVE TRAINijiert bestjournal
The purpose of valve train is to operate the inlet and outlet valves of the engine. The valve train m ainly consists of rocker arm,push rod,cam,poppet valve and spring for kee p the valves closed position. The Greaves G400WG en gine valve train is operated at the maximum speed of 3600 rpm. The main objective of this project is to improve the valve train speed up to safe speed limit that is up to 5000 rpm. The valve spring parameters are optimized based on space availability,stress limit,stiffness,buckl ing of pushrod and natural frequency of the system. The optimized valv e spring configuration is used in the push rod type valve train and the valve train dynamics for different engine speed is studie d using commercially available multi-body dynamic A DMAS software. A comparative valve train dynamics analysis is also c arried out with the existing and optimized valve sp ring combinations. It is observed that valve jump engine speed with respect to optimized valve spring is enhanced to considerab le amount when compared to the existing valve spring configuration. Design improvements include detail study on following topi cs:1. Valve Spring Stiffness. 2. Push rod buckling. 3. Valve closing Velocity. 4. Contact stress between cam and follower
ENERGY CONVERSION PHENOMENON IN IMPLEMENTATION OF WATER LIFTING BY USING PEND...ijiert bestjournal
This paper consist of working of reciprocating pump which is driven by a compound pendulum. It provide s the energy required to lift the water from a tank placed approximately several meter below the ground level. Basic application of the mechanism will be for watering the garden which will be operated by means of operation opening and closing of entrance gate. Paper consists of basic concept,design of pump and compound pendulum mecha nism and fabricationed model. The concept can also be implemented in the rural areas,having the problem of electric supply. We aim at making a prototype for providing some me an for pumping of water by the pump which requires less human efforts,conside ring cost effectiveness,easy to operate and portab le mechanism.
The IC engine has seen numerous revolutionary and e volutionary modifications in technology and design over the past few decades. The sole motto behind the modifications wa s to increase the overall efficiency of the IC Engi ne including volumetric and thermal efficiency. Recently few benchmarking techn ologies like the CRDI,MPFI,HCCI,etc. in the Otto cycle and Diesel cycle engines have created an enormous revolution in the automobile industry. In spite of these technologica l and design advances,the efficiencies are not being more than a particular l imit. However,the concept of split cycle engines has dra stically increased the overall performance in all respect. The split cycle concept basically separates the fou r strokes of the conventional cycle. The Scuderi engine one of the best-in-class engine desi gns based on the split cycle concept. The Scuderi engine works on the split cycle and gives higher efficiency than the previous split cycle engines resulting overall high perform ance. It also eliminates the problems faced by previous engines based on the spl it cycle in terms of breathing (volumetric efficien cy) and thermal efficiency. This paper throws light on the greater volumetric,thermal and overall efficiency key points related t o the Scuderi Engines.
EXPERIMENTAL EVALUATION OF TEMPERATURE DISTRIBUTION IN JOURNAL BEARING OPERAT...ijiert bestjournal
The excessive rise of temperature in the journal be aring operating at boundary/mixed lubrication regim es. Journal bearing test set- up is used to measure the temperature along the cir cumference of the bearing specimen for different lo ading conditions. Here in this journal bearing of l/d ratio 1,diameter of jo urnal is 60mm and the bearing length is 60mm,clear ance is .06mm has been designed and tested to access the temperature rise of the bearing. The result shows that as the load o n the bearing is increasing temperature also increasing. Temperature analysis o f journal bearing is also done by the Ansys workben ch software
STUDY OF SOLAR THERMAL CAVITY RECEIVER FOR PARABOLIC CONCENTRATING COLLECTOR ijiert bestjournal
Energy is one of the building blocks of the country . The growth of the country has been fueled by chea p,abundant energy resources. Solar energy is a form of renewable ener gy which is available abundantly and collected unre servedly. The parabolic concentrator reflects the direct incident solar rad iation onto a receiver mounted above the dish at it s focal point. The conversion of concentrated solar radiation to heat takes place in receiver. The heat transfer characteristics of the receiver changes during the rotation of the receiver which affects thermal performance. The working temperature may also influence the ther mal performance and overall efficiency of the system. Thermal as well as optica l losses affect the performance of a solar paraboli c dish-cavity receiver system. The thermal losses of a solar cavity receiver include c onvective and radiative losses to the air in the ca vity and conductive heat loss through the insulation used behind the helical tube surface. Convective and radiative heat losses form the major constituents of the thermal losses. The convection heat loss from cavit y receiver in parabolic dish solar thermal power sy stem can significantly reduce the efficiency and consequently the cost effectiveness of the system. It is important to assess this heat loss and subsequently improve the thermal performance of the receiver.
DESIGN, OPTIMIZATION AND FINITE ELEMENT ANALYSIS OF CRANKSHAFTijiert bestjournal
Crankshaft is a crucial component in an engine asse mbly. Crankshaft is consisting of two web sections and one crankpin,which converts the reciprocating displacement of the pist on to a rotary motion with a four link mechanism. G enerally crankshafts are manufactured using cast iron and forged steel mater ial. In this work to design and finite element anal ysis of crankshaft of 4 cylinder petrol engine of Maruti swift Vxi. of 1200 cubic capacity. The finite element analysis in ABA QUS software by using six materials based on their composition viz. Cast iron,EN30B,SAE4340,Structural steel,C70 Alloy steel and Aluminium based composite material reinforced with silicon carbide & fly ash. The parameter like von misses stress,deformation;maximum and minimum principal stress & strain were obtained from analysis software. The results of Finite element show that t he Aluminium based composite material is best mater ial among all. Compare the result like weight and Stiffness parameter. It is resulted of 65.539 % of weight,with reduction i n deformation.
ELECTRO CHEMICAL MACHINING AND ELECTRICAL DISCHARGE MACHINING PROCESSES MICRO...ijiert bestjournal
Nowadays,necessity of small components is a common trend. These requirements encourage the researcher s to develop very minutest size components to fulfill the demand. The manufact uring of these type of components is a difficult ob ligation and for that various machining methods are develop to manufacture such c omponents. In this article the Electro Chemical mac hining and Electrical Discharge Machining is reviewed. We tried to summar ize the work of various researchers. The study show s that this type of machining processes gives good alternative.
HEAT TRANSFER ENHANCEMENT BY USING NANOFLUID JET IMPINGEMENTijiert bestjournal
An experimental investigation was carried out for s tudying the heat transfer performance of the water-Al2O3 (28nm average particle size) nanofluid inside a liquid evacuated impinging jet system dest ined to the cooling of circular target surface. Results have shown that th e surface heat transfer coefficient increases consi derably when the mass flow rate is increased,but is relatively insensitive to the nozzle-to heated-surface distance. It was foun d that the use of a nanofluid can provide a heat transfer enhancement when compared t o water. Thus most practical applications of jet im pingement occur in industries where the heat transfer requirements hav e exceeded capacity of ordinary heating and cooling techniques. This work presents and discusses the results of an experiment al investigation of heat transfer between the horiz ontal smooth plate of impinged jets.
MODIFICATION AND OPTIMIZATION IN STEEL SANDWICH PANELS USING ANSYS WORKBENCH ijiert bestjournal
The demand for bigger,faster and lighter moving ve hicles,such as ships,trains,trucks and buses has increased the importance of efficient str uctural arrangements. In principle two approaches exist to develop efficient structures:e ither application of new materials or the use of new structural design. A proven and well-establi shed solution is the use of composite materials and sandwich structures. In this way high strength to weight ratio and minimum weight can be obtained. The sandwich structures have potential to offer a w ide range of attractive design solutions. In addition to the obtained weight reduction,these so lutions can often bring space savings,fire resistance,noise control and improved heating and cooling performance. Laser-welded metallic sandwich panels offer a number of outstand ing properties allowing the designer to develop light and efficient structural configuratio ns for a large variety of applications. These panels have been under active investigations during the last 15 years in the world.
IMPACT ANALYSIS OF ALUMINUM HONEYCOMB SANDWICH PANEL BUMPER BEAM: A REVIEW ijiert bestjournal
Bumper is a energy absorbing protective element whi ch absorb the energy in front collision and protect valuable parts like radiator etc. Bumper is act like protect ive shield generally made of steel material. As eco nomic point of view and to reduce consumption of fuel manufacturin g of light weight vehicle is requirement of current situation. Application of composite material in automobile sec tor is now day common thing. Aluminum honeycomb san dwich panel is basically material from aerospace industri es and known for its high strength to weight ratio. Sandwich structure basically having its properties due to ge ometry. To determine various properties of sandwich structure conducting experiments is expensive,so generally F EA is used .However complex geometry is hurdle so t here are various theories are available for simplification o f model. These theories convert 3D model in to homo genous model .As far as concerning India manufacturing rate of s andwich structure is very less,so generally cost i s more. Greatest giant manufacturer is china we can observe their bu llet train and metro transport facility constructio n. Recently in march 2014 largest selling Indian cars are failed in NCap test in 100% frontal crash test. So requirement of more energy absorbing material with economy cons ideration is important.
Robotic welding requires specialized fixtures to ac curately hold the work piece during the welding operation. Despite the large variety of welding fix tures available today the focus has shifted in maki ng the welding arms more versatile,not the fixture. T he new fixture design reduces cycle time and operat or labor while increasing functionality;and allows co mplex welding operations to be completed on simple two axis welding arms
ADVANCED TRANSIENT THERMAL AND STRUCTURAL ANALYSIS OF DISC BRAKE BY USING ANS...ijiert bestjournal
In these paper structural fields of the solid disc brake during short and emergency braking with four different materials is studied. The distribution of the tempe rature depends on the various factors such as frict ion,surface roughness and speed. The effect of the angular velo city and the contact pressure induces the temperatu re rise of disc brake. The finite element simulation for three -dimensional model was preferred due to the heat fl ux ratio constantly distributed in circumferential direction . Here value of temperature,friction contact power,nodal displacement and deformation for different pressure condition using analysis software with four materi als namely cast iron,cast steel,aluminium and carbon fibre reinforced plastic are taken. Presently the D isc brakes are made up of cast iron and cast steel. With the v alue of simulation result best suitable material fo r the brake drum with higher life span is determined.
REVIEW ON MECHANICAL PROPERTIES OF NON-ASBESTOS COMPOSITE MATERIAL USED IN BR...ijiert bestjournal
Metallic matrix composites are combinations of two or more different metals inter metallic compounds or second phases in which dispersed phases are embe dded within the metallic matrix. They are produced by controlling the morphologies of the constituents to achieve optimum combination of properties. Properties of the composites depend on the properti es of the constituent phases,their relative amount,and dispersed phase geometry including particle siz e,shape and orientation in the matrix. In this pap er,The mechanical properties,behaviour and micro stru ctural evolution of aluminium metal matrix metallic composites fabricated under various process conditi ons were investigated to understand their process- structure�property relations by optimization proces s. Addition of silicon carbide to aluminum has show n an increase in its mechanical properties.
PERFORMANCE EVALUATION OF TRIBOLOGICAL PROPERTIES OF COTTON SEED OIL FOR MULT...ijiert bestjournal
A lubricant is a substance that reduces friction an d wear by providing a protective film between two moving surfaces. Good lubricants possess the proper ties such as low toxicity,high viscosity index,hi gh load carrying capacity,excellent coefficient of fr iction,good anti-wear capability,low emission int o the environment,high ignition temperature. So tribolog y related problems can be minimized by proper selection of lubricant from wear consideration. Tod ay,the depletion of reserves of crude oil,the gro wing prices of crude oil and concern about protecting th e environment against pollution have developed the interest towards environment-friendly lubricants. B ecause of these the purpose of this work is to eval uate the anti-wear characteristics of cottonseed oil and to check the suitability of cottonseed oil as a lu bricant for multi-cylinder engine. Four ball testing machin e is used for anti-wear testing as per ASTM D 4172. The wear preventive characteristic of cottonseed oi l is obtained by measuring wear scar diameter. The present study shows the potential of cotton seed oi l as an alternating lubricant.
Magnetic abrasive finishing is a machining process where the tooling allowance is remove by media wi th both magnetic and abrasive properties,with a magnetic f ield acting as a binder of a grain. Such machining falls into the category of erosion by abrasive suspension and lend itself to the finishing of any type of surface . The possibility of finishing complex surfaces is a spec ial benefit of this machining. Magnetic abrasive fi nishing process is most suitable for obtaining quality fini sh on metallic and non-metallic surfaces. Magnetic abrasive finishing used for complicated product finishing & Roughness and tolerance band achieved that is diffi cult using conventional machine process. The product dimension al requirement easily possible with taking trial wi th MAF parameters.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR AUTHENTICATION AND DATA SECURITY
1. Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
1 | P a g e
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN
FORENSICS TECHNIQUE FOR AUTHENTICATION AND DATA
SECURITY.
Mr.Wagh Rahul S.
Department of computer Department, SCSCOE, Rahuri Factory
Mr. Bagul Kunal S.
Department of computer Department, SCSCOE, Rahuri Factory
Mr. Shinde Dinesh R.
Department of computer Department,SCSCOE,Rahuri Factory.
Mr. Vathare Mahesh S.
Department of computer Department, SCSCOE,Rahuri Factory
ABSTRACT
Steganography is the art of covered or hidden text message. The purpose of steganography is covert communication-
to hide the existence of a secret message from a third party. This paper is intnded as a high-level technical
introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who
need a practical understanding of steganography without study into the mathematical, although references are
provided to many of the ongoing research for the person who needs or wants additional detail covered by audio-
video file. Although in this paper gives a historical context for steganography, the significance is on digital
applications use anti Forensics technique, focusing on hiding information in online audio and video files. Examples
for tools of software that employ steganography to hide data inside of audio-video file as well as software to detect
such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganography suitable
parameter of security and authentication is like PSNR, histogram are obtained at transmittersende and receiver side
which are exactly identical, hence data security can be increased. This paper focus on the idea of computer anti
forensics technique and its use of video steganography in both investigative and security manner.
KEYWORDS: 4LSB; Data Hiding; Steganography; Histogram; PSNR; Computer anti Forensics; Authentication
INTRODUCTION
Steganography is the art of covered or hidden information. The purpose of steganography is covert communication
to hide a secret message from a third party. This differs from cryptography, the art of secret message, which is
intended to make a message unreadable by a third party but does not hide the existence of the secret communication.
Although steganography is distinct and separate from cryptography, there are many analogies between the both, and
some authors categorize steganography as a form of cryptography since hidden communication is a form of secret
writing. Nevertheless, this paper will treated steganography as a separate field[5].
Steganography hides the covert data but not the fact that two transactions are communicate with each other. The
steganography process generally involves placing a hidden information in some transport medium like audio-video
file, called the carrier[4]. The secret message is embedded in the carrier to form the steganography medium. The use
of a steganography key may be employed for encryption of the hidden message and/or for randomization in the
steganography scheme. In summary[4].
steganography_medium = (hidden_data + carrier + steganography_secrate key.)
The proposed system is provides audio-video cryptostegnography which is the combination of audio-video
steganography using anti Forensics Technique as a tool to authentication. Stenography is the method of hiding any
secret message like password, text and image, audio behind original cover file[2]. Original message is converted into
cipher text by using secret key and then hide into the LSB of original file. The proposed system is provides audio-
video cryptostegnography which is the combination of image steganography and audio steganography using anti
Forensics Technique as a software tool to authentication. The main aim is to hide secret data behind image and
audio of video file[1]. As video is the tool of many still frames of audio and video, we can select any frame of video
for hiding our secret information. Suitable algorithm such as LSB is used for frame of video steganography suitable
parameter of security and authentication like PSNR, histograms are obtained at transmittersender and receiver side
2. Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
2 | P a g e
which are exactly identical , hence data security can be increased. This paper focus the idea of computer anti
forensics technique and its use of video steganography in both investigative and security manner[2].
LITERATURE SURVEY:
COMPARISON OF EXISTING SYSTEM
In existing system for any site we use password and username in textual format .When we use this format to any site
there is changes getting hacking of the data when sending data from client to server for validating. If we use text
format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of the data. Now a
days there are deferent encryption algorithms are used. This technique is not scent to now a days. So now we
develop new technique for securing data when we transferring data for client to server we use the video
steganography. Which is more powerful technique for transferring? data for client to server.
PRESENT SYSTEM IN USE
The most basic form of user authentication, particularly on the Web, is the password authentication protocol. This
method of authentication forces you to remember username/password combinations to access accounts or special
sections of a website. While elective and in some ways fundamentally a part of online security, password
authentication protocols fail when you don't address them seriously. This means constructing complex passwords
and maintaining secrecy. This also means that entities implementing password authentication must safeguard
passwords in some way. Next use to Storage and Encryption When you use pass- word authentication, you must
store passwords and usernames in a database to authenticate users. If you don't have strong server security, someone
can break into the database and read the passwords. One way to address this is to use password "hashing," which
involves running the password through a hash algorithm that produces a unique value based on the password and
stores the hash value instead of the password itself. If the database is breached, the attacker can read only the hashes
and have no idea what the passwords are. However, hashing
in this sense exists only due to the inherent weakness of plain text password authentication. The glory of Internet
and its merits are being highly masked by the drawback associated with it. Of them the prime issue is Internet
vulnerability, leading to data modi_cation and data thefts. Many Web applications store the data in the data base and
retrieve and update information as needed. To overcome this type of disadvantages developed an video
stegnography.
FLAWS IN CURRENT SYSTEM
In the _rst and second step, program we accept cover audio and convert it into samples.Then we apply spread
spectrum stenographic algorithm and hide the encrypted data in audio frame. In third and fourth step we hide
authentication logo in _xed frame and recombine frames to from stego-audio. At receiver end above steps are
repeated in reverse manner.
BUSINESS CONTEXT
Nowadays, users can access the Internet and get the information globally spread on the websites. Upon receiving a
request for information, the server requests the user ID and password to prove whether the user intends to be
authenticated is a legitimate user or not. However, there are several malicious activities that could possibly make the
authentication scheme vulnerable. One of those is a web phishing, in which an attacker attempts to acquire sensitive
information such as usernames, passwords, and personal information such as credit card number or registration
number. So provide an audio-video cryptography is used for data hiding stegnography for transferring data from
source to destination.
Table: Literature survey
Paper Name Author Method Algorithm Addvantage Disadvantage
Image Encryption And
Decryption
(2003)
Prof.shen
chen,ron-gjian
chen
Scan Method Encryption
Decryp-
tion Algo-
rithm
Loss less En-
cryption Of
Image,Security
can be incre-ased using
more
encryption loop
It can not used
Any multimedia
system.
Data hiding binary
image for Authonti-
cation and annota-
tion(2006)
Prof.min
wu,Prof.
bede liu
Digital Wa-
termarking & Data
Hiding
Technique
Data Hid-
ing of Bi-
nary Image
It Can Stored
data in digital
form
Low Secu-
rity.Digital Data
can be easly
access.
Data Hiding in Prof. P. watermarkig, data hid- It iS used To It cant be used
3. International Journal of Innovation in Engineering, Research and Technology [IJIERT]
Image and Video Part
IFundamental
Issues and
Solutions(2008)
Diaco-
nis,Profs.
B. Dick-
inson, E.
Cinlar,
and S.
Kulkarni
modulation and
multiplexing,
shuffe.
Application Of data
Hiding in Audio Video
using Anti-
Forensics tech
For Authentica
-tion and
Dasecrity 2014
Prof.Sunil
kmoon,
Prof.
Rajeshree D
Raut
Steganography,
Authentication
of Frames
PROPOSED SYSTEM:
In existing system for ay site we use password and username in textual format .When we use this format to any
site there is changes getting hacking of the data when sending data from client to server for validating. If we
use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of
the data. Now a days there are different encryption algorithms a
a day. So now we develop new technique for securing data when we transferring data for client to server we
use the video steganography. Which is more powerful technique for transferring data for client to se
SYSTEM ARCHITECTURE:
The main aim is to hide secret information behind image and audio of video le. As video is the application of many
still frames of images and audio, we can select any frame of video and audio for hiding our secret information.
Suitable algorithm such as LSB is used for image steganography suitable parameter of security and authentication
like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security
can be increased. This paper focus the idea of computer
both investigative and security manner.
ALGORITHMS:
1)Least Signi_cant Bit (LSB) based steganography:
The simplest and most common type of steganography is LSB (least signi_cant bit).
encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the
following 8 bytes of a carrier file.
01011101 11010000 00011100 10101100
11100111 10000111 01101011 11100011
Becomes
01011100 11010001 00011100 10101100
11100110 10000110 01101010 11100011
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No
modulation and
multiplexing,
shuffe.
ing algo-
rithms.divied
framework sys-
tem.It used Lay-ered
structure of
data hiding.
Steganography,
Authentication
of Frames
LSB
Algo,AES
Algo,RLSB
Algo
High Security
provided.Secure
Data transfer
for _nancial
purpose.
In existing system for ay site we use password and username in textual format .When we use this format to any
hacking of the data when sending data from client to server for validating. If we
use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of
the data. Now a days there are different encryption algorithms are used. This technique is not sufficient to now
a day. So now we develop new technique for securing data when we transferring data for client to server we
use the video steganography. Which is more powerful technique for transferring data for client to se
Fig 1.System Architecture
The main aim is to hide secret information behind image and audio of video le. As video is the application of many
still frames of images and audio, we can select any frame of video and audio for hiding our secret information.
B is used for image steganography suitable parameter of security and authentication
like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security
can be increased. This paper focus the idea of computer forensics technique and its use of video steganography in
both investigative and security manner.
1)Least Signi_cant Bit (LSB) based steganography:
The simplest and most common type of steganography is LSB (least signi_cant bit). The one's bit of a byte is used to
encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the
01011101 11010000 00011100 10101100
11100111 10000111 01101011 11100011
01011100 11010001 00011100 10101100
11100110 10000110 01101010 11100011
Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
3 | P a g e
audio _les.It
Can Not Men-
sion Size of
hidden data.
Future work Not
Mentioned
In existing system for ay site we use password and username in textual format .When we use this format to any
hacking of the data when sending data from client to server for validating. If we
use text format then it readable to anyone. Next time encryption algorithm used for to prevent the hacking of
re used. This technique is not sufficient to now
a day. So now we develop new technique for securing data when we transferring data for client to server we
use the video steganography. Which is more powerful technique for transferring data for client to server?
The main aim is to hide secret information behind image and audio of video le. As video is the application of many
still frames of images and audio, we can select any frame of video and audio for hiding our secret information.
B is used for image steganography suitable parameter of security and authentication
like PSNR, histogram are obtained at receiver and transmitter side which are exactly identical , hence data security
forensics technique and its use of video steganography in
The one's bit of a byte is used to
encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the
4. Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
4 | P a g e
2)AES ALGORITHM FOR ENCRYPTION:
AES is based on a design principle known as a substitution-permutation network, and is fast in both software and
hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES operates on a 44 column-major
order matrix of bytes, termed the state, although some versions of Rijndael have a larger block size and have
additional columns in the state. Most AES calculations are done in a special finite field. We use 128 bit key for an
AES cipher which specifies the number of repetitions should be 10 cycles' transformation rounds that convert the
input, called the plaintext, into the final output, called the cipher text. Each round consists of several processing
steps, each containing four similar but di_erent stages, including one that depends on the encryption key itself. A set
of reverse rounds are applied to transform cipher text back into the original plaintext using the same encryption key.
Random Least Signi_cant Bit(RLSB)
Image steganography, is one kind of steganographic system where the secret message is hidden in a digital image
with some kind of hiding strategy. The conventional image steganographic algorithm is the Least Signi_cant Bit
(LSB) algorithm, the advantage of LSB is its simplicity to embed the bits of the message directly into the LSB plane
of the cover image and many applications use this method. The storage of information bits in the least signi_cant
bits of the image does not a_ect the image in a greater scale and hence the change is not perceived by the Human
Visual System (HVS). LSB embedding when applied to the pixels of an image sequentially make it easy for any
intruder to uncover the information, hence the bits can be embedded in a random fashion to present a more secured
way of information hiding.
FLOW OF EXISTING SYSTEM :
AT THE SENDER SIDE:
Choose Audio-Video file:
Following are the steps for selecting a specific audio-video file and the separation of audio and video part are
explained.
1.Select any available format audio-video file in which user wants to hide data.
2.Apart the video and audio from the Video file using specific software.
3.Then save the give audio files and video files isolation separately.
Hiding Frame in Video (Sender)
Following are the steps for insert a secret image in one of the selected video frame are give below
1. Choose the video file and read the videofile.
2. Now play the video.
3.We See No Any change in the Give Video File.
4 Choose the random frame in which the user want to hide Image in it.
5. Choose the encrypted image in which the user want to hide
6. We use data encryption Using AES Algorithm
7.Then extract the most significant bit MSB of the frame by bitand frame with 240 using “bitand” function.
8.Now extract the givemsb of the encrypted image byBitand image with 240 using “bitand” function.
9. Reverse the give place of msb to lsb by dividing by 16.
10. The given reshaped row vector of Real image data is to be embedded on the given frame
matrix in which addition of each row vector bit’s by two last 4 bits of the given frame bit.
11.FinallyStego Video is created.
12.Then check Either Stego video is played or Not.
13. Close the given file.
Now Hiding data in Audio
Following are the steps for Hiding data in Audiofile are to be explained.
1. First step is Encrypted message is take.
2. Then it convert to ASCII format
3. Supply the hiding key.
4. Translate eachan every audio sample into 8 bits sequences.
5. From each sample read first two MSBbits and convert it to decimal.
6. Addthe given secret bits into a specific position refer using the last method.
7. Same Process will be conducted until the secret bits are changed.
Creating stego Audio-Video file
Combine stego audio and stegovideo file by using specific software. then we get Stego audio-video file is the
combination of Data and original file at the transmitter side.
5. Novateur Publication’s
International Journal of Innovation in Engineering, Research and Technology [IJIERT]
ICITDCEME’15 Conference Proceedings
ISSN No - 2394-3696
5 | P a g e
AT THE RECIVER SIDE
Recovering data from Audio(Reciver)
1.Read the stego audio file from the given stego audio-video at receiver.
2. Select the frame number(the frame number should be same at transmitter at receiver side then only the
authentication process start else it gets terminated)
3.To recover the authentication image from the selected frame bit AND the frame data with 15.
4.Authentication image data is available at LSB of frame is recovered.
5.Select the authentication image at receiver side compare recovered authenticated image with the selected image.
6.If both the images matched , then only user can recover the text behind audio else process is terminated.
7.Audio Recovery
8.Read audio File.
9.Open this stego audio file in read mode.
10.Read wave file's first 40 bytes of header.
11.Then read all its data after 40th byte and close file.
12.Recover the size of identity key from LSB of .wav file. Recover identity key from further LSB bits of .WAV
file.message to the end user
message to the end user
CONCLUSION:
Data hiding in audio-video file with the help of computer forensic technique provide better hiding and security for
the secret information. We are working on hiding image and text behind video and audio file and extracted from an
any video file at sender side and computer forensic techniques at receiver side.
REFERENCES
[1] Sunil K.Moon And Rajashree D.Raut”Application Of Data Hiding In Audio Video Using Anti Forensic
Technique For Authen- Tication And Data Security”Ijeec:International Journal Of Electrical Electronics And
Communication 2014ieee.
[2]Yugeshwarikakde And Priyankagonnade, Audio Video Steganography For Authentication Anddata Security”Ieee
International Journal On Recent And Inno- Vation Trends In Computing And Communication Vol: 1 Issue: 4, April
2013.
[3]Ms. M. Sujana[M.Tech] And Mr. K.L.L. Lokesh,[M.Tech] Application Of Data Hiding In Audio-Image Using
Anti Forensics Technique For Authentication And Data Security In Linux Platform”Ijeec : International Journal Of
Electrical Elec- Tronics And Communication
[4]Athiramohananand And Dr. Sasidharbabusuvanam," Audio - Video Steganography Using Forensictechniquefor
Data Security”International Journal Of Engineering And Computer Technology(Ijcet)Issn 09766367volume 5, Issue
12, December (2014), Pp. 154-157
[5] P. Srilatha And J. Vijaya Lakshmi, Anti Forensic Techniques Used For Data Security By Using Audio Video
Files”International Journal Of- Scientic Engineering And Technologyissn 2319-8885vol.04,Issue.35,August-
2015,Pages:6949-6952