The document summarizes an adaptive image steganography technique that embeds secret messages into digital images. It proposes using adaptive quantization embedding, where quantization steps for image blocks are optimized to guarantee more data can be embedded in busy image areas with high contrast. The technique embeds adaptive quantization parameters and message bits into the cover image using a difference expanding algorithm. Simulation results showed the proposed scheme can provide a good balance between imperceptibility and embedding capacity.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in
the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an
adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a
learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image. The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth
safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are
discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in
the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an
adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a
learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image. The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth
safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are
discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
The aim of this paper is to implement a Multilayer Perceptron (MLP) Neural Network to recognize and predict handwritten digits from 0 to 9. A dataset of 5000 samples were obtained from MNIST. The dataset was trained using gradient descent back-propagation algorithm and further tested using the feed-forward algorithm. The system performance is observed by varying the number of hidden units and the number of iterations. The performance was thereafter compared to obtain the network with the optimal parameters. The proposed system predicts the handwritten digits with an overall accuracy of 99.32%.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
Technical analysis of content placement algorithms for content delivery netwo...IJECEIAES
Content placement algorithm is an integral part of the cloud-based content de-livery network. They are responsible for selecting a precise content to be re-posited over the surrogate servers distributed over a geographical region. Although various works are being already carried out in this sector, there are loopholes connected to most of the work, which doesn't have much disclosure. It is already known that quality of service, quality of experience, and the cost is always an essential objective targeting to be improved in existing work. Still, there are various other aspects and underlying reasons which are equally important from the design aspect. Therefore, this paper contributes towards reviewing the existing approaches of content placement algorithm over cloud-based content delivery network targeting to explore open-end re-search issues.
Efficient Reversible Data Hiding Algorithms Based on Dual Predictionsipij
In this paper, a new reversible data hiding (RDH) algorithm that is based on the concept of shifting of
prediction error histograms is proposed. The algorithm extends the efficient modification of prediction
errors (MPE) algorithm by incorporating two predictors and using one prediction error value for data
embedding. The motivation behind using two predictors is driven by the fact that predictors have different
prediction accuracy which is directly related to the embedding capacity and quality of the stego image. The
key feature of the proposed algorithm lies in using two predictors without the need to communicate
additional overhead with the stego image. Basically, the identification of the predictor that is used during
embedding is done through a set of rules. The proposed algorithm is further extended to use two and three
bins in the prediction errors histogram in order to increase the embedding capacity. Performance
evaluation of the proposed algorithm and its extensions showed the advantage of using two predictors in
boosting the embedding capacity while providing competitive quality for the stego image.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
The aim of this paper is to implement a Multilayer Perceptron (MLP) Neural Network to recognize and predict handwritten digits from 0 to 9. A dataset of 5000 samples were obtained from MNIST. The dataset was trained using gradient descent back-propagation algorithm and further tested using the feed-forward algorithm. The system performance is observed by varying the number of hidden units and the number of iterations. The performance was thereafter compared to obtain the network with the optimal parameters. The proposed system predicts the handwritten digits with an overall accuracy of 99.32%.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
Technical analysis of content placement algorithms for content delivery netwo...IJECEIAES
Content placement algorithm is an integral part of the cloud-based content de-livery network. They are responsible for selecting a precise content to be re-posited over the surrogate servers distributed over a geographical region. Although various works are being already carried out in this sector, there are loopholes connected to most of the work, which doesn't have much disclosure. It is already known that quality of service, quality of experience, and the cost is always an essential objective targeting to be improved in existing work. Still, there are various other aspects and underlying reasons which are equally important from the design aspect. Therefore, this paper contributes towards reviewing the existing approaches of content placement algorithm over cloud-based content delivery network targeting to explore open-end re-search issues.
Efficient Reversible Data Hiding Algorithms Based on Dual Predictionsipij
In this paper, a new reversible data hiding (RDH) algorithm that is based on the concept of shifting of
prediction error histograms is proposed. The algorithm extends the efficient modification of prediction
errors (MPE) algorithm by incorporating two predictors and using one prediction error value for data
embedding. The motivation behind using two predictors is driven by the fact that predictors have different
prediction accuracy which is directly related to the embedding capacity and quality of the stego image. The
key feature of the proposed algorithm lies in using two predictors without the need to communicate
additional overhead with the stego image. Basically, the identification of the predictor that is used during
embedding is done through a set of rules. The proposed algorithm is further extended to use two and three
bins in the prediction errors histogram in order to increase the embedding capacity. Performance
evaluation of the proposed algorithm and its extensions showed the advantage of using two predictors in
boosting the embedding capacity while providing competitive quality for the stego image.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Investigación Plan educativo de la secretaria distrital 2014Nany Hernandez
Puntos de investigación:
1) Diseño y componentes básicos para el plan de mejoramiento , propósito u objetivo
2) Estrategias metodológicas que propone el plan en su gestión
3) Con que recursos: humano, didáctico y financiero cuenta además como están organizados estos.
4) Cuál es el criterio de evaluación con el que se evalúa dicho proyecto.
Documento base: Guia 34, Plan de mejoramiento 2014 Santa Marta, paginas 154. Guía para el mejoramiento institucional DE LA AUTOEVALUACIÓN AL PLAN DE MEJORAMIENTO.
O FAST é um tecnologia única no mundo com equipamentos mecânicos e eletromecânicos em 3D onde podemos montá-los, desmontá-los e etc. O objetivo é atingir as instituições de ensino técnico e superior, empresas e indústrias.
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
In this paper, a new steganography algorithm has been suggested to enforce the security of data hiding and to increase the amount of payloads. This algorithm is based on four safety layers; the first safety layer has been initiated through compression and an encryption of a confidential message using a set partition in hierarchical trees (SPIHT) and advanced encryption standard (AES) mechanisms respectively. An irregular image segmentation algorithm (IIS) on a cover-image (Ic) has been constructed successfully in the second safety layer, and it is based on the adaptive reallocation segments' edges (ARSE) by applying an adaptive finite-element method (AFEM) to find the numerical solution of the proposed partial differential equation (PDE). An intelligent computing technique using a hybrid adaptive neural network with a modified ant colony optimizer (ANN_MACO) has been proposed in the third safety layer to construct a learning system. This system accepts entry using support vector machine (SVM) to generate input patterns as features of byte attributes and produces new features to modify a cover-image.
The significant innovation of the proposed novel steganography algorithm is applied efficiently on the forth safety layer which is more robust for hiding a large amount of confidential message reach to six bits per pixel (bpp) into color images. The new approach of hiding algorithm works against statistical and visual attacks with high imperceptible of hiding data into stego-images (Is). The experimental results are discussed and compared with the previous steganography algorithms; it demonstrates that the proposed algorithm has a significant improvement on the effect of the security level of steganography by making an arduous task of retrieving embedded confidential message from color images.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
Steganography is a vital technique for transferring confidential information via an insecure network. In addition, digital images are used as a cover to communicate sensitive information. The Least Significant Bit (LSB) method is one of the simplest ways to insert secret data into a cover image. In this paper, the secret text is compressed twice by an Arithmetic coding algorithm, and the resulting secret bits are hidden in the cover pixels of the image corresponding to the pixels of each of the following three methods, one of three methods is used in each experiment: The first method, the edges of the image are modified to increase the number of edges, in the second method the lighter-colored regions are selected, and in the third method, the two methods are combined together to increase security and keep the secret message unrecognized. Hiding in each of the previous methods is done by using the LSB technique in the last 2-bit. The correction approach is used to increase the stego image's imperceptibility. The experimental results show that with an average message size of 29.8 kb, the average Peak Signal-to-Noise Ratio (PSNR) for the second proposed (Light regions) method equals 62.76 dB and for the third proposed (Edge and region) method equals 62.72 dB, which is a reasonable result when compared to other steganographic techniques.
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
Steganography is a vital technique for transferring confidential information via an insecure network. In
addition, digital images are used as a cover to communicate sensitive information. The Least Significant
Bit (LSB) method is one of the simplest ways to insert secret data into a cover image. In this paper, the
secret text is compressed twice by an Arithmetic coding algorithm, and the resulting secret bits are hidden
in the cover pixels of the image corresponding to the pixels of each of the following three methods, one of
three methods is used in each experiment: The first method, the edges of the image are modified to increase
the number of edges, in the second method the lighter-colored regions are selected, and in the third
method, the two methods are combined together to increase security and keep the secret message
unrecognized. Hiding in each of the previous methods is done by using the LSB technique in the last 2-bit.
The correction approach is used to increase the stego image's imperceptibility. The experimental results
show that with an average message size of 29.8 kb, the average Peak Signal-to-Noise Ratio (PSNR) for the
second proposed (Light regions) method equals 62.76 dB and for the third proposed (Edge and region)
method equals 62.72 dB, which is a reasonable result when compared to other steganographic techniques.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
Recent research has demonstrated the effectiveness of utilizing neural networks for detect tampering in images. However, because accessing a database is complex, which is needed in the classification process to detect tampering, reference-free steganalysis attracted attention. In recent work, an approach for least significant bit (LSB) steganalysis has been presented based on analyzing the derivatives of the histogram correlation. In this paper, we further examine this strategy for other steganographic methods. Detecting image tampering in the spatial domain, such as image steganography. It is found that the above approach could be applied successfully to other kinds of steganography with different orders of histogram-correlation derivatives. Also, the limits of the ratio stego-image to cover are considered, where very small ratios can escape this detection method unless modified.
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
Adaptive block-based pixel value differencing steganographyOsama Hosam
Steganography is the science of hiding secure data in digital carriers such as images and videos. Pixel value differencing
(PVD) steganography algorithms embed data into images depending on pixel neighborhood differences. We have pro-
posed PVD scheme for embedding secure data into digital images. The image is divided into non-overlapping 33 blocks.
The block’s median pixel is used as a reference for calculating pixel differences. The distance between the minimum and
maximum differences are fine tuned for spreading the secure data on a wide range of image regions with high-intensity
fluctuations. The embedding procedure embeds secure data into the content regions with edges and intensity transitions.
Texture images provide higher embedding size compared with regular images. The results showed that the proposed
algorithm is successfully able to avoid smooth regions in the embedding process. In addition, the proposed algorithm
shows better embedding quality compared with the state of the art PVD approaches especially with low-embedding rates.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
1. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
RESEARCH ARTICLE
www.ijera.com
OPEN ACCESS
A Secure and Lossless Adaptive Image Steganography with Mod4 LSB Replacement Methods Using Image Contrast
K. Devi Lavanya, Nittala. Raviteja, Katta. Mangarao
Department of ECE, GIET Engineering college, Rajahmundry, AP, India
Department of ECE, GIET Engineering college, Rajahmundry, AP, India
Department of ECE, GIET Engineering college, Rajahmundry, AP, India
ABSTRACT
An adaptive Steganography scheme is proposed in this paper. The adaptive quantization embedded is introduced
and employed by block-wised fashion. We also constructed contrast-correlation distortion metric to optimally
choose quantization steps for image blocks to guarantee more data being embedded in busy areas. Deferent form
existing methods, our scheme embeds the AQE parameters together with message bits into the cover image by
deference expanding algorithm. Simulation experiments show the proposed scheme can provide a good tradeo® between the perceptibility and the capacity.
Keywords-Steganography, Adaptive quantization embedded, Construct-correlation distortion, Deference
expanding
I.
INTRODUCTION
1.1 Steganography
Steganography means to hide secret
information into innocent data. Digital images are
ideal for hiding secret information. An image
containing a secret message is called a cover image.
First, the difference of the cover image and the stego
image should be visually unnoticeable. The
embedding itself should draw no extra attention to the
stego image so that no hackers would try to extract the
hidden message illegally. Second, the message hiding
method should be reliable. It is impossible for
someone to extract the hidden message if she/he does
not have a special extracting method and a proper
secret key. Third, the maximum length of the secret
message that can be hidden should be as long as
possible.
“Steganography is the art of hiding
information in ways that prevent the detection of
hidden messages,”
Imperceptibility and capacity are the two
important properties of any Steganography schemes,
the former ensures that the embedding is
imperceptible (can not be detected by human eyes),
and the latter indicates the efficiency of covert
communication. There have been lots of techniques
proposed to balance the trade-o® between them.
Wang et al. [6] developed a technique to hide secret
data by LSB substitution and a genetic algorithm
(GA). Chang et.al. [1] used dynamic programming
strategy to replace GA in [6]. In [2], Chan et. al.
proposed a simple LSB substitution with an optimal
pixel adjustment process(OPAP). These techniques
can all be concluded as LSB-like methods, which
www.ijera.com
realized optimal data embedding in meanings of mean
square error(MSE).
It is known for us that MSE is not a good
metric for measuring the image degradation caused by
information hiding, so the above methods cannot
provide famous performance. Therefore lots of en
devours have been made for performance
improvements. Wu [4] proposed a Steganography
method for images by pixel-value differencing, which
divided the image into two-pixels block, and embed
ded information into the deference value of each two
pixels. BPCS [5] divided the image into regions and
performed complexity measurement using a binary
complexity measure on the individual bit planes to
embed data in these regions. In [8], Zhangn proposed
to convert data into a series of symbols in a notation
system with multiple bases, and the speci¯c bases
were obtained by the degree of local variations of the
neighboring pixels in the stego image. In [3], Yang
and Lin proposed a base-oriented hiding algorithm,
which classed each block of the host image according
to the base value, and make data embedding according
some pre determinative parameters. After reviewing
them, we can ¯nd it without hard that different from
LSB-like methods, they all adopt the adaption
mechanism(i.e. different quantization steps for
different pixels). Despite that the adaption mechanism
can achieve good per formance in experimental
meanings, there is not a proper framework to tell us
why those chosen quantization steps are suitable and
how to obtain them. In this paper, we propose a new
Steganography method to hide data in gray images via
adaptive quantization-embedded(AQE). In the
350 | P a g e
2. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
scheme, we construct a new distortion metric called
contrast- correlation distortion, the message bits are
embed ded into image blocks via an optimally
searched quantization step under a given distortion
con strain. The remainder of the paper is organized as
following. Section 2 introduces the principles of
adaptive quantization-embedded. Section 3 discusses
the new construct distortion metric. Section 4 discuss
the application of reversible data hiding algorithm in
our scheme. Section 5 details the im plementation of
the whole algorithm. Section 6 gives the simulation
experiments. Section 7 con cludes the whole paper.
1.2 Existing Techniques Introduction to LSB
Maintaining the secrecy of digital
information when being communicated over the
Internet is presently a challenge.
Given the amount of cheap computation
power available and certain known limitations of the
encryption methods it is not too difficult to launch
attacks on cipher-text. An ideal Steganography
technique embeds message information into a carrier
image with virtually imperceptible modification of the
image. Adaptive Steganography comes closer to this
ideal since it exploits the natural variations in the pixel
intensities of a cover image to hide the secret message.
The objective of steganography is a method of
embedding an additional information into the digital
contents, that is undetectable to listeners. We are
investigating its embedding, detecting, and coding
techniques. The idea behind the LSB algorithm is to
insert the bits of the hidden message into the least
significant bits of the pixels. As the application
domain of embedding data in digital multimedia
sources becomes broaden, several terms are used by
various
groups
of
researchers,
including
steganography, digital watermarking, and data hiding.
This paper introduces a new, principled approach to
detecting least significant bit (LSB) steganography in
digital signals such as images and audio. It is shown
that the length of hidden messages embedded in the
least significant bits of signal samples can be
estimated with relatively high precision. The new
steganalytic approach is based on some statistical
measures of sample pairs that are highly sensitive to
LSB embedding operations. The resulting detection
algorithm is simple and fast. To evaluate the
robustness of the proposed steganalytic approach,
bounds on estimation errors are developed.
Furthermore, the vulnerability of the new approach to
possible attacks is also assessed, and counter measures
are suggested A detailed algorithm is presented along
with results of its application on some sample images.
www.ijera.com
www.ijera.com
BlockDiagram
Fig.1 Block Diagram of BSLDCT Embedding
Technique
II.
PROPOSED ADAPTIVE
STEGANOGRAPHY
Cover data, steganography key and the
embedding function are basic components of
steganographic algorithms. In order to achieve an
adaptive steganographic algorithm, the following
features of the embedding function are considered
Pixel selection
Message bits representation
Cover modification
Franz and Schneidewind proposed an
algorithm called Condith which selects the pixels for
embedding based on their characteristics [1]. The
algorithm calculates the difference between a pixel
and its neighbors. If the difference exceeds a
minimum threshold then pixel can be used to embed a
message bit.
To select the areas with greater diversity of
grayscale levels, Dulce et al. analyze the grayscale
space distribution of regions and proposed the
ConText algorithm [2]. In our method, we employ an
adaptive mechanism in both pixel selection and
message bits representation. We use 4 pixels to
represent two bit of the message.
2.1 Adaptive Steganography Using Filtering
Adaptive
Steganography
reduces
modifications to the image, and adapts the message
embedding technique to the actual content and
features of the image. In general, to keep a good
degree of stealth ness, Adaptive methods embed
message bits into certain random clusters of pixels
(avoiding areas of uniform color) selecting pixels with
large local standard deviation or image blocks
containing a number of different colors. The main
advantage of adaptive steganography is that the
changes made to the cover image take into account the
sensitivity of the human visual system and also
various statistical parameters generally being used by
steg-analysis algorithms. The main challenge posed to
existing adaptive steganography techniques [3,4,5,6]
is that the methods so far developed doesn't seem to
have a way to control the amount of information that
351 | P a g e
3. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
is to be hidden, for a given cover image. This problem
is overcome in the method presented in this paper.
The proposed approach utilizes the sensitivity
of the human visual system to adaptively modify the
intensities of some pixels in a high frequency
components spatial image (HFSI) of the cover image.
The modification of pixel intensities depends on the
magnitude of the pixels in HFSI and also on the local
features of the cover image. If the contrast of the
image is large (e.g., an edge), the intensities can be
changed greatly without introducing any distortion to
human eyes. On the other hand, if the contrast is small
(e.g., a smooth), the intensities can only be tuned
slightly. In this method, first the cover image is passed
through a filter to separate the high and low frequency
components of the image. The inverse transform of
both the images is computed. Now the pixels values of
HFSI are modified depending on the magnitude of the
pixel i.e. more the magnitude more the Least
Significant Bits (LSB's) of that pixel are changed and
also the local features of cover image are considered.
Now both the LFSI (Low Frequency components
spatial image of cover image) and HFSI are added to
form the stego - image. At the receiver the reverse
process is to be done to recover the message.
The payload is embedded into the cover
image by segmentation, DCT and coherent bit length
L is shown in the Figure1.
Cover Image:
The cover image is color or gray scale of any
size and format. If the cover image is color then
convert into grayscale image and corresponding pixel
intensity values.
Pixel Management:
The gray scale cover image pixel intensity
vary from zero to 255. During the payload embedding
process the intensity values of cover image may
exceed lower and higher level limits which results in
difficulty to retrieve the payload at the destination.
Hence the cover image pixel intensity values are
limited to lower 15 and upper 240 instead of zero and
255.
Segmentation:
The cover image is segmented into 8x8
matrices. The DCT is applied on each 8x8 block to get
DCT coefficients which are used to hide the payload
Most Significant Bit (MSB) based on the DCT
coefficient values of the cover image
2D-DCT:
Transform each 8x8 matrix into frequency
domain using 2D-DCT. Using DCT on 8*8 sub blocks
has an advantage of less computation time for
embedding as well as security to payload increases
compared to applying DCT to
www.ijera.com
www.ijera.com
2.2 Least Significant Bit Insertion
Usually 24-bit or 8-bit files are used to store
digital images. The former one provides more space
for information hiding; however, it can be quite large.
The colored representations of the pixels are derived
from three primary colors: red, green and blue. 24-bit
images use 3 bytes for each pixel, where each primary
color is represented by 1 byte. Using 24-bit images
each pixel can represent 16,777,216 color values. We
can use the lower two bits of these color channels to
hide data, then the maximum color change in a pixel
could be of 64-color values, but this causes so little
change that is undetectable for the human vision
system. This simple method is known as Least
Significant Bit insertion. Using this method it is
possible to embed a significant amount of information
with no visible degradation of the cover image..
Several versions of LSB insertion exist. It is
possible to use a random number generator initialized
with a stego-key and its output is combined with the
input data, and this is embedded to a cover image. For
example in the presence of an active warden it is not
enough to embed a message in a known place (or in a
known sequence of bits) because the warden is able to
modify these bits, even if he can‟t decide whether
there is a secret message or not, o r he can‟t read it
because it is encrypted. The usage of a stego-key is
important, because the security of a protection system
should not be based on the secrecy of the algorithm
itself, i nstead of the choice of a secret key. Fig. 3
shows this process. The LSB inserting usually
operates on bitmap images. „Steganos for Win dows‟
and „Wbstego‟ are LSB inserting software products
which are able to embed data (in clear or encrypted
format) in a bitmap image. The embedded data cannot
be considered as a watermark, because even if a small
change occurs in a picture (cropping, lossy
compression and color degradation) the embedded
352 | P a g e
4. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
information will be lost – although the change which
is occurred during the embedding process is invisible.
www.ijera.com
Step 3: Now message is embedded into HFSI
image.
The number of bits modified in a pixel is
made to depend up on its magnitude and also on the
local features of the cover image. Let the message is
represented as m(x,y) and the embedding function as
M[].
mlo(x, y) = M[lo(x, y) + m(x, y)]
Step 4: Both the modified HFSI and unmodified
LFSI are added to form stego - image.
Steg(x, y) = mlo(x, y) + lo(x, y)
Step5: At the receiver LFSI is subtracted from
stego image leaving modified HFSI image.
mhi(x, y) = steg(x, y) - hi(x, y)
Step 6: Now the message is decoded from the
Modified HTSI image using the stego - key
m(x, y) + lo(x, y) = M '[mhi(x, y)]
IV.
III.
ALGORITHM
Step 1: Let the cover image is represented by
c(x,y).
It is then passed through a filter with transfer
function h(x,y) to separate high and low frequency
components.
F[c(x, y)] = C(X, Y)
Where C(X, Y) represents Fourier Transform
of the cover image. In this paper capital letters
representation for pixel is used for frequency domain
and small letters for spatial representation.
C(X, Y)H(X, Y) = LO(X, Y) + HI(X, Y)
Where LO(X, Y), HI(X, Y) represent low
frequency and high frequency components of cover
image respectively, obtained after passing through the
filter with cut off as stated above.
Step 2: Inverse transform of both the frequency
Components is found out, known as HFSI
(High Frequency components Spatial Image) and
LFSI (Low Frequency Components Spatial Image)
separately.
F1[LO(X, Y)]= lo(x, y) and
F-1 [HI(X, Y)] = hi(x, y)
Where lo(xy) and hi(x,y) are the spatial components of
low and high frequencies in the cover image
respectively.
www.ijera.com
Spatial domain reversible
steganography
This type of reversible steganography
directly modifies image pixels in the spatial domain to
achieve reversibility. Since this technique is easy to
implement, offer a relatively high hiding capacity, and
the quality of the cover image can be easily controlled,
it has become a popular method for reversible
steganography.
Introduction:
REVERSIBLE data embedding, which is
also called lossless data embedding, embeds invisible
data (which is called a payload) into a digital image in
a reversible fashion. As a basic requirement, the
quality degradation on the image after data embedding
should be low. An intriguing feature of reversible data
embedding is the reversibility, that is, one can remove
the embedded data to restore the original image. From
the information hiding point of view, reversible data
embedding hides some information in a digital image
in such a way that an authorized party could decode
the hidden information and also restore the image to
its original, pristine state. The performance of a
reversible data-embedding algorithm can be measured
by the following.
1) Payload capacity limit: what is the maximal
amount of information can be embedded?
2) Visual quality: how is the visual quality on the
embedded image?
3) Complexity: what is the algorithm complexity?
The motivation of reversible data embedding is
distortion- free data embedding . Though
imperceptible, embedding some data will inevitably
change the original content. Even a very slight change
in pixel values may not be desirable, especially in
sensitive imagery, such as military data and medical
353 | P a g e
5. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
www.ijera.com
data. In such a scenario, every bit of information is
important. Any change will affect the intelligence of
the image, and the access to the original, raw data is
always required. From the application point of view,
reversible data embedding can be used as an
information carrier. Since the difference between the
embedded image and original image is almost
imperceptible from human eyes, reversible data
embedding could be thought as a covert
communication channel. By embedding its message
authentication code, reversible data embedding
provides a true self authentication scheme, without the
use of metadata.
In this paper, we present a high-capacity,
high visual quality, reversible data-embedding method
for digital images. Our method can be applied to
digital audio and video as well. We calculate the
differences of neighboring pixel values, and select
some difference values for the difference expansion
(DE). The original content restoration information, a
message authentication code, and additional data
(which could be any data, such as date/time
information, auxiliary data, etc.) will all be embedded
into the difference values. In this paper we will
consider grayscale images only. For color images,
there are several options. One can decorrelate the
dependence among different color components by a
reversible color conversion transform, and then
reversibly embed the data in the decorrelated
components. Or one can reversibly embed each color
component individually. Please note that reversible
data embedding is a fragile technique When the
embedded image is manipulated and/or lossy
compressed, the decoder will find out it is not
authentic and thus there will be no original content
restoration.
media after the hidden data are retrieved for some
legal considerations. In other applications, such as
remote sensing and high-energy particle physical
experimental investigation, it is also desired that the
original cover media can be recovered because of the
required high-precision nature. The marking
techniques satisfying this requirement are referred to
as reversible, lossless, distortion-free, or invertible
data hiding techniques. Reversible data hiding
facilitates immense possibility of applications to link
two sets of data in such a way that the cover media
can be loss Lesley recovered after the hidden data
have been extracted out, thus providing an additional
avenue of handling two different sets of data.
Obviously, most of the existing data hiding
techniques are not reversible. For instance, the widely
utilized spread-spectrum based data hiding methods
are not invertible owing to truncation (for the purpose
to prevent over/underflow) error and round-off error.
The well-known least significant bit plane (LSB)
based schemes and are not lossless owing to bit
replacement without “memory.” Another category of
data hiding techniques, quantization-index-modulation
(QIM) based schemes and , are not distortion-free
owing to quantization error. Recently, some reversible
marking techniques have been reported in the
literature. The first method is carried out in the spatial
domain. It uses modulo 256 addition (assuming here
that eight-bit grayscale images are considered) to
embed the hash value of the original image for
authentication.
The
embedding
formula
is
4.1 Reversible Data Hiding
DATA HIDING is referred to as a process to
hide data (representing some information) into cover
media. That is, the data hiding process links two sets
of data, a set of the embedded data and another set of
the cover media data. The relationship between these
two sets of data characterizes different applications.
For instance, in covert communications, the hidden
data may often be irrelevant to the cover media. In
authentication, however, the embedded data are
closely related to the cover media. In these two types
of applications, invisibility of hidden data is an
important requirement. In most cases of data hiding,
the cover media will experience some distortion due to
data hiding and cannot be inverted back to the original
media. That is, some permanent distortion has
occurred to the cover media even after the hidden data
have been extracted out. In some applications, such as
medical diagnosis and law enforcement, it is critical to
reverse the marked media back to the original cover
image , and
the secret key. Because of using
modulo 256 addition, the over/underflow is prevented
and the reversibility is achieved. Some annoying saltand-pepper noise, however, is generated owing to
possible grayscale value flipping over between 0 and
255 in either direction during the modulo 256
addition. The second reversible marking technique
was developed in the transform domain, which is
based on a lossless multire solution transform and the
idea of patchwork. It also uses modulo 256 addition.
Note that no experimental results about this technique
have been reported. Another spatial domain technique
was reported in that losslessly compresses some
selected bit plane(s) to leave space for data
embedding. Because the necessary bookkeeping data
are also embedded in the cover media as an overhead,
the method is reversible. Since these techniques aim
at authentication,the amount of hidden data is limited.
The capacity of method, which is based on the idea of
patchwork and modulo 256 addition, is also limited
except that the hidden data exhibit some robustness
www.ijera.com
, in which
the original image,
denotes
the marked image, and
the watermark, where
denotes the hash function operated on the original
354 | P a g e
6. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
against high quality JPEG compression. Since it uses
modulo 256 addition, it also suffers from salt-andpepper noise. As a result, the technique cannot be
utilized in many applications. This observation is
valid to all lossless data hiding algorithms that use
modulo 256 addition to achieve reversibility. The first
reversible marking technique that is suitable for a
large amount of data hiding was presented. This
technique first segments an image into non
overlapping blocks, and then introduces a
discriminating function to classify these blocks into
three
groups:
R(regular),
S(singular),
and
U(unusable). It further introduces a flipping operation,
which can convert an R-block to an S-block and vice
versa. A U-block remains intact after the flipping
operation. By assigning, say, binary 1 to an R-block
and binary 0 to an S-block, all R- and S-blocks are
scanned in a chosen sequential order, resulting in a
biased (meaning that the binary numbers of 1 and 0
are not balanced) binary sequence. This biased binary
sequence is loss lessly compressed to leave space for
data embedding and the compressed bit sequence is
embedded into the cover media as an overhead for
later reconstruction of the original image. In data
embedding, the R- and S-blocks are scanned once
again and the flipping operation is applied whenever
necessary to make the changed R- and S-block
sequence coincident with the to-be-embedded data
followed by the overhead data mentioned above.
While it is novel and successful in reversible data
hiding, the payload is still not large enough for some
applications. Specifically, the embedding capacity
estimated by authors ranges from 3 to 41 kb for a 512
512
8 cover grayscale image when the
embedding amplitude is 4 (the estimated average
PSNR of the marked image versus the original image
is 39 dB) .
Another problem with the method is that
when the embedding strength increases in order to
increase the payload, the visual quality of the marked
image will drop severely due to annoying artifacts. To
increase the payload dramatically, a new lossless data
hiding technique based on integer wavelet transform
(IWT) (a second generation wavelet transform, which
has avoided round-off errors) was developed recently.
Because of the superior de correlation capability of
wavelet transform, the selected bit plane compression
of IWT coefficients in high frequency sub bands
creates more space for data hiding, resulting in a two
to five times payload as large. Specifically, its payload
ranges from 15 to 94 kb for a 512
512
8
grayscale image at the same (39 dB) PSNR of the
marked images compared with the original images. To
achieve reversible data hiding, a histogram
modification is applied in its pre-processing to prevent
over/underflow. This histogram modification causes,
however, a relatively low PSNR of the marked image
www.ijera.com
www.ijera.com
versus the original image though there are no
annoying artifacts. It is noted that reversible data
hiding has attracted increasing attention recently, and
more algorithms are being developed. Then the
authors adopt the CALIC lossless image compression
algorithm, with the quantized values as side
information, to efficiently compress the quantization
residuals to create high capacity for the payload data .
The compressed residual and the payload data are
concatenated and embedded into the host signal via
generalized-LSB modification method. The payload of
this technique is from 15 to 143 kb for a 512
512
8
grayscale image while the PSNR is 38 dB. Even
though the payload is high, the PSNR is still not high
enough. In this paper, we propose a new reversible
data embedding technique, which can embed a large
amount of data (5–80 kb for a 512
512
8
grayscale image) while keeping a very high visual
quality for all natural images, specifically, the PSNR
of the marked image versus the original image is
guaranteed to be higher than 48 dB. It utilizes the zero
or the minimum point of the histogram (defined
below) and slightly modifies the pixel grayscale
values to embed data. This technique can be applied to
virtually all types of images. Up to now, it has been
successfully tested on different types of images,
including some commonly used images, medical
images, texture images, aerial images, and all of the
1096 images in CorelDraw database. The computation
of our proposed technique is quite simple and the
execution time is rather short. Although the proposed
lossless data hiding technique is applied to still
images, it is also applicable to videos which consist of
a sequence of images.
4.2 Drawbacks of Existing Techniques:
1. In LSB Technique only you are going to hide in
least significant only. So, any one can easily retrieve
the secret information.
2. Compressed domain reversible steganography often
suffers from high computational cost, low hiding
capacity, and low stego-image quality.
3. After hiding the data in image by using LSB
algorithm, if someone takes the Image and compress
the image means definitely lsb value will be change.
4. So we can‟t get the original data what we hided
355 | P a g e
7. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
V.
www.ijera.com
EXPERIMENTAL SIMULATION
Using a 512 £ 512 8-bit gray image "lena" as
the cover image and choosing " = 0:02,n = 5, a total
of5:57 £ 105 secret bits are embedded, so the capacity
is equal to 0.25. The stego images are shownin Also
shown is the error image, which has been enhanced by
a 35-time gray-level stretchfor the purpose of display.
The similar experimental results are shown in Fig.2
for the cover image baboon. We can see that the
modification were mainly in busy areas and on edges,
which means less perceptual distortion is achieved.
Three quality metrics are used to measure the
distortion induced by data embedding: wPNSR,the
Watson metric, and SSIM[10]. The wPNSRand
Watson metric are all designed in [7] by using
characteristics of HVS and measure the total
perceptual error. Four standard test images, lena
baboon, peppers and boat are used to make the second
experiment.
Table
1
lists
the
value
of
apcity,wPSNR,Waston metrics and SSIM under " =
0:01and " = 0:03.
It can be seen from Table.1 that the images
with more edges and textures can carry more
information than the °at one, and given the larger ",the
AQE can provides more space to carry message bits.
So the propose method can be daptive with the
different image region and different image
Where A is the area under the ROC curve.
The accuracy is scaled to obtain ρ = 1 for a perfect
detection and ρ = 0 for no detection case. The
detection reliability values for the proposed and the
reference methods are shown in steganography is used
in the covert communication to transport secrete
information.
VI.
.
www.ijera.com
CONCLUSION
The proposed method based on image
contrast has been shown to be capable of improving
the embedding capacity and imperceptibility of stego
images and reducing the detection probability. The
356 | P a g e
8. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
existing adaptive steganographic methods have been
reviewed and compared to the proposed algorithm. Bit
Length
Replacement
Steganography
using
Segmentation and DCT is proposed. The cover image
is segmented into smaller matrix of size 8x8 and
converted to DCT domain. The MSB bits of payload
in spatial domain are embedded into each DCT
coefficients of cover image based on the coherent
length L which is determined by the DCT coefficient
values. The performance results in terms of PSNR for
different kinds of images and dimensions are better in
the proposed algorithm compared to the existing
algorithm. In future the technique can be verified for
robustness. Approach has been verified to be superior
to the selected wellknown steganography methods.
[9]
[10]
[11]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
E. Franz, and A. Schneidewind, “Adaptive
steganography based ondithering,” in
Proceedings of the 2004 workshop on
Multimedia and security, Magdeburg,
Germany, 2004, pp. 56-62.
R. H. M. Dulce, R. C. Raul, and F. U.
Claudia, “Adaptive Steganography based on
textures,” in Proceedings of the 17 th
International Conference on Electronics,
Communications andComputers, 2007, pp.
34-39.
C. H. Yang, C. Y. Weng, S. J. Wang et al.,
“Adaptive Data Hiding in Edge Areas of
Images With Spatial LSB Domain Systems,”
IEEE Transactions on Information Forensics
and Security, vol. 3, no. 3, pp.488-497, 2008.
D. C. Wu, and W. H. Tsai, “A
steganographic method for images bypixelvalue differencing,” Pattern Recognition
Letters, vol. 23, pp.1613–1626, 2003.
H. C. Wu, N. I. Wu, C. S. Tsai et al., “Image
steganographic schemebased on pixel-value
ifferencing and LSB replacement methods,”
in Proc. Inst. Elect. Eng., Vis. Images Signal
Process, 2005, pp. 611–615.
X. Qi, and K. Wong, “An Adaptive DCTBased MOD-4 SteganographicMethod,” in
International
Conference
on
Image
Processing (ICIP'05), Genova, Italy, 2005,
pp. 297-300.
M. Ramezani, and S. Ghaemmaghami,
“Towards Genetic FeatureSelection in Image
Steganalysis,” in 6th IEEE International
Workshopon Digital Rights Management,
Las Vegas, USA, 2010.
Raja K B, C R Chowdary, Venugopal K R, L
M Patnaik. (2005) :“A Secure Steganography
using LSB, DCT and Compression
Techniques on Raw Images,” IEEE
International Conference on Intelligence
www.ijera.com
[12]
[13]
[14]
[15]
[16]
www.ijera.com
Sensing and Information processing, pp.171176.
Kumar V and Kumar D. (2010):
“Performance Evaluation of DWT Based
Image Steganography,” IEEE International
Conference onAdvance Computing, pp. 223228.
Weiqi Luo, Fangjun Huang, and Jiwu Huang.
(2010):
“Edge
Adaptive
Image
Steganography Based on LSB Matching
Revisited,”
IEEE
Transactions
on
Information Forensics and Security, no. 2,
vol. 5, pp. 201-214.
R O El Safy, H H Zayed and A El Dessouki
(2009): “An Adaptive Steganographic
Technique Based on Integer Wavelet
Transform,” International Conference on
Networking and Media Convergence,
pp.111-117.
Mathkour H, Al-Sadoon B and Touir A.
(2008): “A New Image Steganography
Technique. :” International Conference on
Wireless Communications, Networking and
Mobile Computing, pp.1-4.
V Vijaylakshmi,G Zayaraz and V Nagaraj.
(2009):“A
Modulo
Based
LSB
Steganography
Method,”
International
Conference on Control, Automation,
Communication and Energy Conservation,
pp. 1-4.
Wien Hong, Tung-Shou Chen and Chih-Wei.
(2008):“Lossless
Steganography
for
AMBTC-Compressed Images,” Congress on
Image and Signal Processing, pp.13-17.
A W Naji, Teddy S Gunawan, Shihab A
Hameed, B B Zaidan and A A Zaidan.
(2009): “Stego-Analysis Chain, Session
One,” International Spring Conference on
Computer
science
and
Information
Technology, pp. 405-409.
M Hassan Shirali-Shahreza and Mohammad
Shirali-Shahreza. (2008): “A New Synonym
Text
Steganography,”
International
Conference on Intelligent Information Hiding
and Multimedia Signal Processing, pp. 15241526.
AUTHORS
K.devilavanya is currently pursuing
bachelor degree program in Electronics
And Communication Engineering in
GIET
Engineering
college,
Rajahmundry, Andhra Pradesh, India
affiliated to JNTU KAKINADA, INDIA.
357 | P a g e
9. Katta. Mangarao et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 2), January 2014, pp.350-358
www.ijera.com
Nittala. Raviteja is currently pursuing
bachelor degree program in Electronics And
Communication Engineering in GIET Engineering
college, Rajahmundry, Andhra Pradesh, India
affiliated to JNTU KAKINADA, INDIA.
Katta. Managrao is presently working as
Assistant Professor in the department of Electronics &
Communication Engineering in GIET Engineering
college, Rajahmundry, Andhra Pradesh, India
affiliated to JNTU KAKINADA, INDIA. He completed
his Masters degree program in Digital Electronics &
Communication Systems in CIST, Kakinada and
bachelor degree in Electronics & Communication
Engineering in MVGR college of engineering
Vizianagaram
www.ijera.com
358 | P a g e