Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
This document summarizes a research paper that proposes a new technique for data embedding and extraction in high resolution AVI videos. The technique encrypts a secret message before embedding it by alternately changing the LSB and LSB+3 bits of alternate bytes in the cover video file. An index is also created for the secret information and placed in a video frame to aid extraction. This technique aims to provide higher security, capacity and robustness compared to typical data embedding methods. The paper discusses related work on digital steganography techniques and the proposed video steganography algorithm in more detail.
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
This document proposes a method for enhancing cloud data security using combined encryption and steganography. The method involves encrypting data using RSA encryption, hiding the encrypted data within an image using discrete wavelet transform steganography, and uploading the stego image to the cloud. When needed, the image can be downloaded from the cloud and decrypted to extract the original data file. Encrypting and hiding the data provides augmented security compared to storing data directly in the cloud. The system design incorporates RSA encryption to encrypt files, DWT steganography to hide the encrypted data within an image, and a cloud platform for file storage.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
This document summarizes a research paper that proposes a new data embedding technique called adaptive pixel pair matching (APPM) for digital image steganography. The APPM technique hides secret data by replacing pairs of pixels in the cover image with coordinates that represent the hidden data. This allows data to be hidden in any numerical system. The document outlines existing steganography techniques including least significant bit replacement and transform domain methods. It then describes the proposed APPM technique in more detail, asserting it offers lower distortion than other methods by providing more compact pixel neighborhoods and flexible numerical representation of hidden data.
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
I-frames, P-frames, and B-frames are the three major picture types or frame types used in video compression algorithms. I-frames are fully specified frames that do not require other frames to decode but are the least compressible. P-frames store only the changes from previous frames and are more compressible than I-frames but require previous frames to decode. B-frames can use both previous and forward frames for reference and achieve the highest compression but require both previous and forward frames to decode. I-frames are used as random access points and references for decoding other frames.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
This document summarizes a research paper that proposes a new technique for data embedding and extraction in high resolution AVI videos. The technique encrypts a secret message before embedding it by alternately changing the LSB and LSB+3 bits of alternate bytes in the cover video file. An index is also created for the secret information and placed in a video frame to aid extraction. This technique aims to provide higher security, capacity and robustness compared to typical data embedding methods. The paper discusses related work on digital steganography techniques and the proposed video steganography algorithm in more detail.
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
This document proposes a method for enhancing cloud data security using combined encryption and steganography. The method involves encrypting data using RSA encryption, hiding the encrypted data within an image using discrete wavelet transform steganography, and uploading the stego image to the cloud. When needed, the image can be downloaded from the cloud and decrypted to extract the original data file. Encrypting and hiding the data provides augmented security compared to storing data directly in the cloud. The system design incorporates RSA encryption to encrypt files, DWT steganography to hide the encrypted data within an image, and a cloud platform for file storage.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
This document summarizes a research paper that proposes a new data embedding technique called adaptive pixel pair matching (APPM) for digital image steganography. The APPM technique hides secret data by replacing pairs of pixels in the cover image with coordinates that represent the hidden data. This allows data to be hidden in any numerical system. The document outlines existing steganography techniques including least significant bit replacement and transform domain methods. It then describes the proposed APPM technique in more detail, asserting it offers lower distortion than other methods by providing more compact pixel neighborhoods and flexible numerical representation of hidden data.
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
I-frames, P-frames, and B-frames are the three major picture types or frame types used in video compression algorithms. I-frames are fully specified frames that do not require other frames to decode but are the least compressible. P-frames store only the changes from previous frames and are more compressible than I-frames but require previous frames to decode. B-frames can use both previous and forward frames for reference and achieve the highest compression but require both previous and forward frames to decode. I-frames are used as random access points and references for decoding other frames.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
Utilizing distributed storage administrations, clients can store their Information in the cloud to maintain a strategic distance from
the consumption of neighborhood information stockpiling support. To guarantee the uprightness of the information put away in
the Cloud, numerous information, honesty examining plans have been proposed. A client needs to Utilize his private key to
produce the information authenticators for Understanding the information respectability reviewing. In this way, the client needs to
have an equipment token to store his private Key and retain a secret phrase to enact this private key. In the event that this
Equipment token is lost or this secret phrase is overlooked, the majority of the Current information, trustworthiness inspecting
plans would be notable work. We propose another worldview Called information uprightness inspecting without private key
stockpiling and Plan such a plan. In this plan, we use biometric informationas the client's fluffy private key to Abstain from
utilizing the equipment token. In the interim, the plan can at present Successfully complete the information respectability
auditing. We use a direct Sketch with coding and blunder revision procedures to affirm The personality of the client. We use
another mark Conspire which supports blacklist certainty. The security evidence and the Execution examination demonstrates that our proposed plan accomplishes Attractive security andeffectiveness.
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
The document proposes a new method for securing image steganography using visual cryptography and integer wavelet transform. The method embeds a secret image into a cover image in the following steps: 1) Apply (2 out of 2) visual cryptography to the secret image to generate two secret shares. 2) Apply a two-level integer wavelet transform to the blue channel of the cover image, resulting in four sub-bands. 3) Embed each secret share into one of the four sub-bands. 4) Combine the channels to generate the stego-image. Extraction requires applying the same transforms to the stego-image to recover the secret shares and reconstruct the secret image, without needing the original cover image. The method
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
This document discusses a new image steganography method that uses zero order hold (ZOH) zooming and reversible data hiding techniques to hide secret messages in cover images. The proposed method aims to improve on existing techniques by introducing less noise and allowing for lossy image compression schemes. It uses ZOH and least significant bit (LSB) techniques to embed data in the encrypted cover image. Experimental results showed the proposed ZOH method achieved higher peak signal-to-noise ratios than other methods, indicating improved stego image quality. The goal is to hide secret messages in cover images in a way that is difficult for humans to detect visually.
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
The document discusses hiding confidential text data within an encrypted image using reversible data hiding techniques. It begins by introducing the concepts of reversible data hiding and meaningful image encryption. The proposed method first encrypts an original image using AES to create a pre-encrypted image. It then applies discrete wavelet transform to the pre-encrypted image to transform it into a visually meaningful encrypted image. Finally, reversible data hiding is used to hide confidential text data within the meaningful encrypted image while still allowing lossless retrieval of both the image and hidden data. The method aims to provide effective data protection with low computational cost.
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
This paper proposes reversible data hiding in encrypted images for secure missile launching. The work is presented in two stages: one involves encryption of cover image by block cipher algorithm and other is embedding secure data related to missile launching. For embedding data, vacant pixels are identified by Slepian-Wolf encoding method along with embedding key to hide the data. At the other end by using decryption algorithm the original cover image is recovered and the secret data is extracted. The performance analysis is presented by calculating parameters MSE, PSNR and SSIM.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Automated Input Data Management Approach for Discrete Event Simulation App...IJERA Editor
Slipforming operation’s linearity is a source of planning complications, and operation is usually subjected to bottlenecks at any point, so careful planning is required in order to achieve success. On the other hand, Discrete-event simulation concepts can be applied to simulate and analyze construction operations and to efficiently support construction scheduling. Nevertheless, preparation of input data for construction simulation is very challenging, time consuming and human prone-error source. Therefore, to enhance the benefits of using DES in construction scheduling, this study proposes an integrated module to establish a framework for automating the generation of time schedules and decision support for Slipform construction projects, particularly through the project feasibility study phase by using data exchange between project data stored in an Intermediate database, DES and Scheduling software. Using the stored information, proposed system creates construction tasks attribute [e.g. activities durations, material quantities and resources amount], then DES uses all the given information to create a proposal for the construction schedule automatically. This research is considered a demonstration of a flexible Slipform project modeling, rapid scenario-based planning and schedule generation approach that may be of interest to both practitioners and researchers.
This document discusses supply chain challenges among BRICS (Brazil, Russia, India, China, South Africa) countries. It summarizes key supply chain challenges for each BRICS country, including currency volatility and protectionist policies in Brazil, unreliable data and customs delays in Russia, a lack of integrated logistics in India, challenges with information sharing and cultural values in China, and high transport costs, skills shortages, and forecasting difficulties in South Africa. The document concludes that understanding these individual country challenges is important for integrating supply chains across the BRICS countries to achieve shared goals of prosperity and stability.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
Utilizing distributed storage administrations, clients can store their Information in the cloud to maintain a strategic distance from
the consumption of neighborhood information stockpiling support. To guarantee the uprightness of the information put away in
the Cloud, numerous information, honesty examining plans have been proposed. A client needs to Utilize his private key to
produce the information authenticators for Understanding the information respectability reviewing. In this way, the client needs to
have an equipment token to store his private Key and retain a secret phrase to enact this private key. In the event that this
Equipment token is lost or this secret phrase is overlooked, the majority of the Current information, trustworthiness inspecting
plans would be notable work. We propose another worldview Called information uprightness inspecting without private key
stockpiling and Plan such a plan. In this plan, we use biometric informationas the client's fluffy private key to Abstain from
utilizing the equipment token. In the interim, the plan can at present Successfully complete the information respectability
auditing. We use a direct Sketch with coding and blunder revision procedures to affirm The personality of the client. We use
another mark Conspire which supports blacklist certainty. The security evidence and the Execution examination demonstrates that our proposed plan accomplishes Attractive security andeffectiveness.
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
The document proposes a new method for securing image steganography using visual cryptography and integer wavelet transform. The method embeds a secret image into a cover image in the following steps: 1) Apply (2 out of 2) visual cryptography to the secret image to generate two secret shares. 2) Apply a two-level integer wavelet transform to the blue channel of the cover image, resulting in four sub-bands. 3) Embed each secret share into one of the four sub-bands. 4) Combine the channels to generate the stego-image. Extraction requires applying the same transforms to the stego-image to recover the secret shares and reconstruct the secret image, without needing the original cover image. The method
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
This document discusses a new image steganography method that uses zero order hold (ZOH) zooming and reversible data hiding techniques to hide secret messages in cover images. The proposed method aims to improve on existing techniques by introducing less noise and allowing for lossy image compression schemes. It uses ZOH and least significant bit (LSB) techniques to embed data in the encrypted cover image. Experimental results showed the proposed ZOH method achieved higher peak signal-to-noise ratios than other methods, indicating improved stego image quality. The goal is to hide secret messages in cover images in a way that is difficult for humans to detect visually.
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
The document discusses hiding confidential text data within an encrypted image using reversible data hiding techniques. It begins by introducing the concepts of reversible data hiding and meaningful image encryption. The proposed method first encrypts an original image using AES to create a pre-encrypted image. It then applies discrete wavelet transform to the pre-encrypted image to transform it into a visually meaningful encrypted image. Finally, reversible data hiding is used to hide confidential text data within the meaningful encrypted image while still allowing lossless retrieval of both the image and hidden data. The method aims to provide effective data protection with low computational cost.
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...CSCJournals
This paper proposes reversible data hiding in encrypted images for secure missile launching. The work is presented in two stages: one involves encryption of cover image by block cipher algorithm and other is embedding secure data related to missile launching. For embedding data, vacant pixels are identified by Slepian-Wolf encoding method along with embedding key to hide the data. At the other end by using decryption algorithm the original cover image is recovered and the secret data is extracted. The performance analysis is presented by calculating parameters MSE, PSNR and SSIM.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Automated Input Data Management Approach for Discrete Event Simulation App...IJERA Editor
Slipforming operation’s linearity is a source of planning complications, and operation is usually subjected to bottlenecks at any point, so careful planning is required in order to achieve success. On the other hand, Discrete-event simulation concepts can be applied to simulate and analyze construction operations and to efficiently support construction scheduling. Nevertheless, preparation of input data for construction simulation is very challenging, time consuming and human prone-error source. Therefore, to enhance the benefits of using DES in construction scheduling, this study proposes an integrated module to establish a framework for automating the generation of time schedules and decision support for Slipform construction projects, particularly through the project feasibility study phase by using data exchange between project data stored in an Intermediate database, DES and Scheduling software. Using the stored information, proposed system creates construction tasks attribute [e.g. activities durations, material quantities and resources amount], then DES uses all the given information to create a proposal for the construction schedule automatically. This research is considered a demonstration of a flexible Slipform project modeling, rapid scenario-based planning and schedule generation approach that may be of interest to both practitioners and researchers.
This document discusses supply chain challenges among BRICS (Brazil, Russia, India, China, South Africa) countries. It summarizes key supply chain challenges for each BRICS country, including currency volatility and protectionist policies in Brazil, unreliable data and customs delays in Russia, a lack of integrated logistics in India, challenges with information sharing and cultural values in China, and high transport costs, skills shortages, and forecasting difficulties in South Africa. The document concludes that understanding these individual country challenges is important for integrating supply chains across the BRICS countries to achieve shared goals of prosperity and stability.
Improving Data Storage Security in Cloud using HadoopIJERA Editor
The rising abuse of information stored on large data centres in cloud emphasizes the need to safe guard the data. Despite adopting strict authentication policies for cloud users data while transferred over to secure channel when reaches data centres is vulnerable to numerous attacks .The most widely adoptable methodology is safeguarding the cloud data is through encryption algorithm. Encryption of large data deployed in cloud is actually a time consuming process. For the secure transmission of information AES encryption has been used which provides most secure way to transfer the sensitive information from sender to the intended receiver. The main purpose of using this technique is to make sensitive information unreadable to all other except the receiver. The data thus compressed enables utilization of storage space in cloud environment. It has been augmented with Hadoop‟s map-reduce paradigm which works in a parallel mode. The experimental results clearly reflect the effectiveness of the methodology to improve the security of data in cloud environment.
The Mechanical Behavior Of A Nylon Seat Belt Exposed To Cyclical Loads: A Num...IJERA Editor
This work aims to study the mechanical behavior of a nylon seat belt when it is exposed to cyclical loads through
the Finite Element Methods. This work used as base the brazilian regulamentoy standard ABNT NBR 7337:2011
to create the virtual model of the seat belt, with the following dimensions: 1.20mm thick, 48mm width and
250mm length. The next step was to import this CAD model to ANSYS 14.5 software, to create the correct
material model for this case and apply the correct boundary conditions in order to analyze its behavior under a
load that varies from 0 to 2000 N at a 10 Hz frequency. The final step was to analyze this numerical results that
referring to this component under these conditions.
Turbulent Heat Transfer from a Flat Plate Placed Downstream of a FenceIJERA Editor
This document presents an experimental study on heat transfer from a flat plate placed downstream of a fence in a subsonic wind tunnel. A rectangular brass plate is heated inside the wind tunnel test section. Non-metallic fences of varying heights are placed upstream of the plate to promote turbulence. Experiments are conducted to examine the effects of fence height to plate length ratio (H/L), distance between fence and plate relative to plate length (S/L), and Reynolds number (1.5×105 ≤ ReL≤ 4.5×105). Results show the Nusselt number and friction factor strongly depend on H/L and S/L. A maximum 1.7 times enhancement in Nusselt number was
Parallel Processing Technique for Time Efficient Matrix MultiplicationIJERA Editor
The document proposes a parallel-parallel input single output (PPI-SO) design for matrix multiplication that reduces hardware resources compared to existing designs. It uses fewer multipliers and registers than existing designs, trading off increased completion time. Simulation results show the PPI-SO design uses 30% less energy and involves 70% less area-delay product than other designs.
SPSDC - To the Cloud! Using IaaS as a Hosting Provider for SharePointScott Hoag
To the cloud! This phrase seems to come up more and more often for organizations looking to reduce their SharePoint footprint and operational expenses in their on premise data centers. In this session Scott will give a brief overview of a few of the premier Infrastructure as a Service hosting providers for SharePoint, how SharePoint in the cloud stacks up against Office 365 and how to quickly get your SharePoint system built in a repeatable fashion for development environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses using fuzzy logic to optimize the placement of Thyristor Controlled Series Capacitors (TCSC) devices for congestion management in deregulated electricity markets. TCSC devices can control power flows and enhance transmission capacity. The document models TCSC devices and transmission lines. It develops fuzzy logic rules based on bus voltage and power loss to determine the optimal bus to place TCSC devices. The method was tested on the IEEE 14-bus system to demonstrate its effectiveness for static congestion management.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Nowadays, cyber-attacks from botnets are increasing at a faster rate than any other malware spread. Detecting the botmaster who commands the tasks has become more difficult. Most of the detecting methods are based on the features of any communication protocol or the history of the network traffic. In this paper, a rational approach is brought for the live detection of the botmaster in the internal network. The victim machine monitors its packets and compromises the bots in the network and finds the traces to the botmaster. This approach works independent of the structure of the botnet, and will be a better option for online detection of the botmaster.
This document discusses error-correcting codes that can be used to protect encoder and decoder circuitry in memory from soft errors. It introduces Euclidean Geometry Low-Density Parity-Check (EG-LDPC) codes that have fault-secure detector capabilities and can tolerate high bit or nanowire defect rates. Using some smaller EG-LDPC codes, the entire memory system failure-in-time rate can be kept at or below one for memory blocks of 10Mb or larger, with a memory density of 1011 bit/cm and 10nm nanowire pitch. Larger EG-LDPC codes can achieve even higher reliability and lower area overhead.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
REVIEW: Previous Deception detection methods and New proposed method using in...IJERA Editor
Deception detection has important legal and medical applications, but the reliability of methods for the differentiation between truthful and deceptive responses is still limited. Deception detection can be more accurately achieved by measuring the brain correlates of lying in an individual. For the evaluation of the method, several participants were gone through the designed concealed information test paradigm and their respective brain signals were recorded. The electroencephalogram (EEG) signals were recorded and separated into many single trials. To enhance signal noise ratio (SNR) of P3 components, the independent component analysis (ICA) method was adopted to separate non-P3 (i.e. artifacts) and P3 components from every single trial. Then the P3 waveforms with high SNR were reconstructed. And then group of features based on time, frequency, and amplitude were extracted from the reconstructed P3 waveforms. Finally, two different class of feature samples were used to train a support vector machine (SVM) classifier because it has higher performance compared with several other classifiers. The method presented in this paper improves the efficiency of CIT and deception detection in comparison with previous reported methods.
This document summarizes a research paper on using bilateral symmetry analysis to detect brain tumors from MRI images. It begins by introducing the problem of brain tumor detection and importance of asymmetry analysis. It then describes the proposed algorithm which involves defining a bilateral symmetry axis between the two brain hemispheres and detecting any regions of asymmetry that could indicate a tumor. The algorithm uses edge detection techniques to find the symmetry axis. Performance is evaluated on sample patient data and results show the method can successfully identify tumor locations and sizes. In conclusion, analyzing bilateral symmetry is an effective approach for automated brain tumor detection from MRI images.
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...IJERA Editor
In this paper, with the aim of developing a nondestructive evaluation technique using piezoelectric signals in
wooden materials, we theoretically study the electroelastic field in a semi-infinite body with D∞ symmetry
subjected to surface friction parallel to the ∞-fold rotation axis. By applying the analytical technique previously
proposed by us, we formulate expressions for electroelastic field quantities, including electric potential, electric
field, electric displacement, elastic displacement, strain, and stress by using two “elastic displacement potential
functions” and two “piezoelastic displacement potential functions.” These potential functions and, consequently,
the electroelastic field quantities are formulated using Fourier transforms in order to satisfy electroelastic
boundary conditions. We carried out numerical calculations to correctly evaluate field quantities inside the body
and at its surface. As a result, we were successful in quantitatively elucidating the surface electric displacement
in response to the elastic stimulus of surface friction and suggested the possibility of a nondestructive evaluation
technique using piezoelectric signals.
This document presents a study on the design and structural analysis of high speed helical gears using ANSYS. Helical gears with different numbers of teeth were modeled in Pro/Engineer and imported into ANSYS for finite element analysis. Bending stresses were calculated using the modified Lewis beam method and AGMA equations, and compared to ANSYS results which had around 6% error. Contact stresses calculated using AGMA equations were also compared to ANSYS results, with around 1% error. The study found that gear design with minimum teeth and maximum helix angle is preferred based on material strength considerations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Understanding Image Steganography with Practical ApproachIRJET Journal
This document summarizes an article on image steganography. It begins by defining steganography and cryptography, noting that steganography conceals data by hiding messages within cover files, while cryptography encrypts messages. It then discusses different types of steganography, focusing on image steganography. The document outlines the process of encoding a hidden message within an image and decoding the message from the encoded image. It finds the encoded image is slightly larger than the original due to the hidden message. In conclusion, the document notes that while steganography and cryptography have different approaches, combining the two can increase security for hidden communications.
IRJET- Low Band Width High Secured Image Transmission in Robust ChannelsIRJET Journal
This document presents a method for low bandwidth, high security image transmission using steganography and cryptography techniques. The secret image is first scrambled using Arnold transform and decomposed using discrete wavelet transform. Referable values from the frequency components are embedded into the least significant bits of frames in a cover video. The secret key used for embedding is then encrypted with a second key using a Twisted Exchange algorithm and hidden in a cover audio file. At the receiver, the encrypted key is extracted from the audio and decrypted to recover the secret key, which is used to extract the secret image values from the video frames. Image compression using Haar wavelet transform is also used to reduce bandwidth. The proposed method aims to provide secure, robust and imper
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
1. The document presents a method for secure data transfer using delta steganography.
2. Delta steganography embeds secret data by replacing the differences between pixel values in the cover image, rather than the pixel values themselves.
3. This provides improved security over traditional LSB steganography as the secret data is scattered throughout the cover image in a non-sequential manner.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
1) The document proposes using spread spectrum image steganography (SSIS) to securely store data in the cloud by hiding data within digital images. SSIS spreads a message across a digital image as low-power noise to make the hidden data imperceptible.
2) When a user uploads data to the cloud, SSIS software would encrypt the data multiple times within an image. Even if hackers access the encrypted image, they cannot decrypt the data without knowing how many times the user encrypted it.
3) This provides double security by encrypting data within an image format and ensuring hackers cannot decrypt without the encryption key information known only to the authorized user.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
This document discusses securing data by combining JPEG2000 compression, RSA encryption, and discrete wavelet transform (DWT) steganography. It describes how the data is first substituted using a 14 square algorithm and then encrypted with RSA. The encrypted message is compressed with JPEG2000 before being hidden within an image using DWT steganography. At the receiver end, the reverse process is performed to decrypt the original message. Combining encryption, compression, and steganography makes the secured information more robust and difficult to hack within a feasible time frame.
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
This document proposes a hybrid approach to text and image steganography using AES encryption and LSB substitution. It begins with background on cryptography, steganography, and image steganography techniques. It then reviews related work that uses direct hiding, XOR encryption, AES encryption with LSB nibble substitution, and techniques requiring pre-agreed cover images. The proposed system first encrypts a text or image using AES before embedding it in a cover image using an improved LSB technique that can store more data while maintaining image quality. It presents the methodology, sample screenshots and concludes the technique provides improved security while being user friendly. Future work could extend it to other file types and formats.
Image Encryption-Then-Compression System via Prediction Error Clustering and ...AM Publications,India
The images have to be encrypted before compression to give high level security. We design a highly efficient image encryption-the –compression system using lossless and lossy compression. The image encryption design to operate in the prediction error domain to provide in a sensible way to give high level security. An arithmetic coding based approach can be exploited to efficiently compress the encrypted images. The proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency than the disambiguation lossless/lossy image coders which take original unencrypted images as inputs. In existing Encryption then compression induced the significant penalty on compression efficiency. The password generation and encryption are all done by the system itself after clicking the encryption button with transparency to the user. The same encryption password is also used to decrypt the encrypted binary file. The application uses simple key generation methods of random number generation and combination.
Implementation for Data Hiding using Visual Cryptography IRJET Journal
The document proposes a method for implementing data hiding using visual cryptography and boundary steganography to improve data security. It involves dividing an original image into multiple unnoticeable parts, hiding data in the boundary of the image by representing it as decimal numbers, and using Shamir cryptography with an n,k threshold to encrypt and decrypt the data. Simulation results show this approach increases the security of hidden data transfer by making the full image difficult for hackers to decode without obtaining all parts.
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
This document proposes a secure image hiding algorithm using cryptography and steganography. It first encrypts an image using the Blowfish encryption algorithm. Then, it hides the encrypted image in a video file using least significant bit (LSB) steganography. Blowfish was chosen for encryption due to its strong security and fast processing compared to other algorithms. LSB steganography in BMP images provides high invisibility and payload capacity. The proposed method provides two layers of security by encrypting the image before hiding it, making it difficult for unauthorized users to detect or extract the hidden information.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
This document presents a literature review and proposed system for implementing steganographic techniques to conceal and retrieve secret information hidden in digital files like images. The proposed system would allow users to hide messages in images, videos and documents using an interface. It would also include a classifier trained to detect common steganography techniques to identify if hidden information is present in images. The system aims to provide a secure communication method and could be used for applications like digital watermarking, covert communication and detecting media piracy. It would use techniques like LSB substitution and AES encryption to hide data in bit planes of images selected by the user. An activity log and user profiles with private keys are also proposed to manage operations and provide additional security.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Similar to DCT Based Secret Image Hiding In Video Sequence (20)
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
1. M. Suresh Kumar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.05-09
www.ijera.com 5 | P a g e
DCT Based Secret Image Hiding In Video Sequence M. Suresh Kumar, G. Madhavi Latha Department of Electronics & Comm Engg. Sree Vidyaniketan Engineering College. Tirupati, Andhra Pradesh, India Department of Electronics & Comm Engg Sree Vidyaniketan Engineering College. Tirupati, Andhra Pradesh, India Abstract Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software. Keywords: Image, Steganography, DCT, Video Data Hiding
I. INTRODUCTION
There is a need of transmitting data in securing manner as the popularity of internet and digital media going higher day by day. Even though there are numerous good techniques some of them already in practice .Without disturbing the perceptual Quality assigning the secret information within the data source are nothing but data hiding. The main intention is to hide a message in such a manner that only sender and respective recipient only having knowledge that there is an hidden message. In general, in data hiding ,actual information is converted into a relevant multimedia files such as image, video or audio which is undergoes hiding within another object So the actual information will not exists in its original format. The original message is departed from it and the recipient gets the supposed message via the network. Based on application the hiding of information varies .Sometimes it might be a company logo or else some secret message that indicates some important information. Even though there is need of higher security as internet is an open environment.
Cryptography and Information hiding are the two main methods of information security. In cryptography, it converts the data into inscrutable form [2]. This has capability to build back original data without any loss. Its main intention is to avoid unauthorized receivers from decryption. Steganography and digital watermarking are the two ways to conceal information. Steganography is the method of binding message, image or file within another message, image or file . Steganography and cryptography are alike and their main purpose is to provide the security for important information. The main variation between stenography and digital watermarking is, in stenography it will hide the information by which it shows there is no hidden information. At present word information hiding implies Stenography and digital watermarking [3]. Where as in digital watermarking it will conceals data within digital objects such as audio, video or image by which information is becomes robust for alterations and adjustments [2] [3]. Watermarking is the method in which mark itself is invisible and unnoticeable to human vision. Along with this it is impractical to remove watermark without downgrading the quality of digital object [5].
In other words stenography intended to conceal secret information within other cover media such as audio, video or image . In order to make persons insensible from the presence of information. Even though stenography is different form of cryptography but the both of them are employed to provide security to important data. In stenography carrier medium is termed as an object which carries the concealed information. Stego-object is the output of the stenography that is sent to intended destination. Now the concealed information from Stego-object can be extracted using a key called Stego-key. Data is encapsulated in different practical carriers such as audio files, document, file headers, digital images
RESEARCH ARTICLE OPEN ACCESS
2. M. Suresh Kumar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.05-09
www.ijera.com 6 | P a g e
and video [1-5]. The embedded data is the message that one wishes to send secretly. It is usually hidden in an innocuous message referred to as a cover-text, or cover-image or cover-audio as appropriate, producing the stego-text or other stego-object. A stego-key is used to control the hiding process so as to restrict detection and/or recovery of the embedded data to parties who know it (or who know some derived key value). As the purpose of Steganography is having a covert communication between two parties whose existence is unknown to a possible attacker, a successful attack consists in detecting the existence of this communication [1].
Fig1: A Technical Survey of Steganography Methods
II. PROPOSED SYSTEM
An AVI (Audio Video Interleave) is a file which consists of an array of high resolution images know as frames. All the frames can be collected in the form of bitmap images. Each and every frame contains 3 channels RGB. There after collecting frames it is possible to perform DCT (8x8 blocks) on any channel (Say R channel) of the frames. And it encloses the Secret information within selected higher order coefficients. AS Shown in Fig 6. Each Frame is handled by Inverse DCT block processing and it is merged to get AVI with hidden Image.
Fig:2 Data3AHiding Let us consider input as video which in AVI format. There after extract frames from the video. Each from consists of three frames namely R, G, B- Channels. Among three channels one channel will be considered (say R-channel).consider any one of the frame among all frames. Now apply 8x8 DCT block processing to that frame. Higher order coefficients will be selected after processing 8x8 DCT block operation. Now convert the secret image which you want to hide, into binary values. The converted binary values of the secret image will be embedded with higher order coefficients of the selected video frame using multiplier. The secret image data will be hidden among that frames. In order to get the reconstructed AVI video combine all frames together. A number of computer programs are available that will embed information in an image. Some of them just set the least significant bits of the image pixels to the bits of the embedded information. Embedded in this way may be invisible to the human eye but is trivial for an alert third party to detect and remove. Provide the high security here we can also use the secret keys system [6].
Input video
Frame separation
Bit conversion
Discrete cosine transform
Image encoding
Secret image
Encoded video
3. M. Suresh Kumar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.05-09
www.ijera.com 7 | P a g e
Fig: 3 Data Reconstruction And Decryption is vice versa of Encryption as shown in fig 5. From creating each frame is extracted one by one. Implement 8x8 DCT Block Processing on Where the secret information was embedded previously (here R-channel). To obtain concealed bit information by subtracting from original DCT block Processed values. Now reconstructed AVI video consists secret image in it. The video which consists of secret image in it is called as Stego video. Now extract the frames from the reconstructed video. Each frames consists R, G, B channels .now consider any one the channel among them (here say R-channel).the secret image will be hidden among those frames. Now apply 8x8 block inverse DCT to those frames. Now separate the binary values and higher order coefficients by de-Multiplexing. Based on resultant binary values we will get back the secret image [6].
III. SYSTEM WORKING FLOW
A. Secret Message Acquisition In this context let image be our secret message (imported from mat lab library) which is grey scale image. It is representing pixel value 8x8 of 297 x169 size images. After that the intensity of pixel values converted into equivalent binary values. As the size of car image is 297 x169 hence 297x169x8 401544 bits will be hidden in video frame.
Fig: 4 Input secret image
Shows conversion of original secret image into binary value. The intensity pixel values converted into binary value. For each 8x8 block produces 64x8 matrixes along with 1 and -1 in it .Now converting 0’s to -1 which gives binary values. Now multiply each bit with α (α=0.01).In order to reduce its strength there by the amount of distortions goes down... B. Frame separation and hiding Secret data In this scenario traffice.avi is considered as a cover or host video and all frames were extracted (31 frames).324x244 is the resolution of original AVI. For encoding secret message made use of R-channel. There after performing DCT on frames. But the original size is of the image is 297x169 so 297x169x8 bit should be encoded in this video frames per 8x8 DCT Higher order coefficients we can embed max of 16 bits. And in intended frame we can embed. Here we taken input AVI video pixel size is 324x244 is divided by 8x8 block size and after multiplied by 16 will get 1264896 bits. The secret image size is 297x169 x8 is divided by 1264896 and hence nearly will be getting 31 frames.
Fig: 5 Input Video Sequences There after the frames which are extracted, each and every R-channel frame is block processed by 8x8 DCT. Now higher order DCT coefficient of each block consists of 16-bit secret message which are embedded into it. To achieve the AVI video file along with secret message embedded in it by combining R-channels of frames after Encoding. As we can see from figure 8.It represents the frames of video frame after embedding secret message. And it clear that there is not much more distortions in the video.
The JPEG process is a widely used form of lossy image compression that centers on the Discrete Cosine Transform. The DCT works by separating images into parts of differing frequencies. During a step called quantization. Where part of compression actually occurs, the less important frequencies are
Stego video
Video to Frame separation
Discrete cosine transform
Image decoding
Secret image
4. M. Suresh Kumar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.05-09
www.ijera.com 8 | P a g e
discarded, hence the use of term “lossy”. Then, only the most important frequencies that remain are used retrieve the image in the decompression process. As a result, reconstructed images contain some distortion; but as we shall soon see, these levels of distortion can be adjusted during the compression stage. The JPEG method is used for both color and black and white images, but the focus of this article will be on compression of the latter. The JPEG Process
1. The image is broken into 8x8 blocks of pixels.
2. Working from left to right, top to bottom, the DCT is applied to each block.
3. Each block is compressed trough quantization.
4. The array of compressed blocks that constitute the image is stored in a drastically reduced amount of space.
5. When desired, the image is reconstructed through decompression, a process that uses the Inverse Discrete Cosine Transform (IDCT).
Doing the DCT on An 8x8 Block Before we begin, it should be noted that the pixel values of a black and white image range from 0 to 255 in steps of one, where pure black is represented by 0,and pure white by 255.Thus it can be seen how a photo, illustration, etc. Can be accurately represented by these 256 shades of gray. Since an image comprises hundreds or even thousands of 8x8 of pixels, the following description of what happens to one 8x8 block is a microcosm of the JPEG process. what is done to one block of image pixels is done to all of them. Now, let’s start with a block of image pixel values. This particular block was chosen from the very upper left hand corner of an image. Because the DCT is designed to work on pixel values ranging from -128 to 127, the original block is leveled off by subtracting 128 from each entry. We are now ready to perform the Discrete Cosine Transform, which is accomplished by matrix multiplication.
Fig: 6 DCT Transformation & Data Hided Video
C. Data Extraction from the Stego Video
1. Extraction of video frames.
2.8x8 blocks DCT processes the R-channel Frames 3. In order to get secret message the 8x8 block processed R-channel original frame values are subtracted. 4. The image will be reconstructed from the extracted secret message. As we can see from figure 7 the construction of secret image which is embedded within the host video is reconstructed with fewer amounts of distortions.
Fig: 7 Recovered Secret Image
IV. CONCLUSION
So far we saw how can the data concealing method is applied on AVI video which is intended to insert a picture confidentially along with more perceptually lose of info to the cover media. By the making use of input video and discrete cosine transformation applying for frames and input image binary conversion then adding the image binary values to the video frames But as of now we used it is experimented for 31 frames only by embedding 297x169 image. Even though if there is much more information to hide, we can make use other channel of frame which is more capable of hiding data. Not discussed much more about robustness of a scheme here. The original signal and the quality of the video after encoding is almost similar perceptually. REFERENCES
[1] F.A.P Peticolas, R.J. Anderson and M.G. Kuhn, “Information Hiding – A Survey”, in proceeding of IEEE, pp. 1062-1078, July 1999.
[2] A.A.Zaidan, B.B.Zaidan, Fazidah Othman, “New Technique of Hidden Data in PE-File with in Unused Area One”, International Journal of Computer and Electrical Engineering (IJCEE), Vol.1, No.5, ISSN: 1793-8198, 2009, pp 669-678.
[3] Framework for Hidden Data in the Image Page within Executable File Using Computation between Advance Encryption Standared and Distortion Techniques”, International Journal of Computer Science
5. M. Suresh Kumar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 8( Version 1), August 2014, pp.05-09
www.ijera.com 9 | P a g e
and Information Security (IJCSIS), Vol. 3, No 1 ISSN: 1947-5500, 2009, P.P73-78.
[4] G. Sahoo and R. K. Tiwari, “ Designing an embedded Algorithm for Data Hiding using Steganographic Techniques by File Hybridization International Journal of Computer Science and Network Security (IJCSNS),Vol.8,No.1,January 2008.
[5] S. Katzenbeisser, F. Petitcolas, “Information Hiding Techniques for Steganography and digital watermarking”, 2000, pp 17-76.
[6] Saurabh Singh and Gaurav Agarwal, "Hiding image to video: A new approach of LSB Replacement", International Journal of Engineering Science and Technology, Vol. 2(12), pp. 6999-7003, 2010.
[7] Balaji R, Naveen G, "Secure data transmission using video Steganography", 2011 IEEE International Conference on Electro/Information Technology (EIT), pp. 1-5, 15-17 May 2011. [8] Amr A. Hanafy, Gouda I. Salama and Yahya Z. Mohasseb, "A Secure Covert Communication Model Based On Video Steganography", Military Communications Conference .(MILCOM), pp. 1-6, 16-19 November IEEE 2008. [9] R.Kavitha, A. Murugan, "Lossless Steganography on AVI File using Swapping Algorithm", International conference on Computational Intelligence and Multimedia Applications, pp. 83-88, 2007 IEEE. [10] AshishT.Bhole Rachna Patel, "Design and Implementation of Steganography Over Video File", the Indian Journal of Technical Education, Special Issue for NCEVT' 12, pp. 69-72, April 2012.
[11] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Attacks on copyright marking systems." In Aucsmith [148], pp. 218{238, ISBN 3-540-65386-4.