This document summarizes a research paper that proposes a new methodology for reducing additive distortion in steganography. The paper introduces a method to embed 2 bits of information in a pixel by altering only one bit plane. This is expected to make detection of covert communication more difficult for steganalysis algorithms compared to altering the least significant bit. The method uses Java for implementation and MATLAB to analyze histograms of original and stego images. Experimental results on embedding secret text in images are presented, along with analysis of the distortion levels and security of the proposed approach.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient suspects the existence of the message a form of security through obscurity. The internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. In this paper, we proposed a class of new distortion functions known as uniform embedding distortion function (UED) is presented. By incorporating the syndrome trellis coding, the best code word with undetectable data hiding is achieved. Due to hiding more amounts of data into the intersected area, embedding capacity is increased. Our aim is to hide the secret information behind the image file. Steganography hides the secret message so that intruder’s can’t detect the communication. When hiding data into the intersected area, thus provides a higher level of security with more efficient data mean square error is reduced and embedding capacity is increased.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to IJERD(www.ijerd.com)International Journal of Engineering Research and Development (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
IJERD(www.ijerd.com)International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 12 (July 2012), PP.21-26
www.ijerd.com
A Novel method of Reducing Additive Distortion in
Steganography with Embedding Operation
CH.Sairam1, B.Lakshmi2
1
Dept of CSE, AME, Palavncha, India,
2
Asst.prof, Dept of CSE, AME, Palavncha, India
Abstract––This paper proposes a new methodology for reducing additive distortion in steganography with embedding
operation. In this paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from
one bit plane but the message does not necessarily place in the least significant bit of pixel and second less significant bit
plane and fourth less significant bit plane can also host the massage. In this approach we used a novel syndrome-coding
scheme based on dual convolution codes equipped with the Viterbi algorithm. This fast and very versatile solution
achieves state-of-the-art results in steganographic applications while having linear time and space complexity w.r.t. the
number of cover elements. Security is provided by applying DES (Data Encryption Standard) for encryption and
decryption of embedded message. Practical merit of this approach is validated by constructing and testing adaptive
embedding schemes for digital images in raster and transform domains. Most current coding schemes used in
steganography (matrix embedding, wet paper codes, etc.) and many new ones can be implemented using this framework.
Keywords––STEGO, VITERBI, DES
I. INTRODUCTION
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the Sender
and intended recipient, suspects the existence of the message, a form of security through obscurity[1]. It is often thought that
communications may be secured by encrypting the trac, but this has rarely been adequate in practice. Neas the Tactician, and
other classical Writers, concentrated on methods for hiding messages rather than for enciphering them [2]. There exist two
mainstream approaches to steganography in empirical covers, such as digital media objects steganography designed to
preserve a chosen cover model and steganography minimizing a heuristically-defined embedding distortion today’s least
detectable steganographic schemes for digital images [3]–[6] were designed using this principle. Moreover, when the
distortion is defined as a norm between feature vectors extracted from cover and stego objects, minimizing distortion
becomes tightly connected with model preservation insofar the features can be considered as a low-dimensional model of
covers. This line of reasoning already appeared in [6] and [7] and was further developed in [8]. With the exception of [8],
steganographers work with additive distortion functions obtained as a sum of single-letter distortions. A well-known
example is matrix embedding where the sender minimizes the total number of embedding changes. Near-optimal coding
schemes for this problem appeared in [9] and [10], together with other clever constructions and extensions [11]–[16]. In this
paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from one bit plane but the
message does not necessarily place in the least significant bit of pixel and second less significant bit plane and fourth less
significant bit plane can also host the massage. Since in our method for embedding two bits message we alter just one bit
plane, fewer pixels would be manipulated during embedding message in an image and it is expected for the steganalysis
algorithm to have more difficulty detecting the covert communication. It is clear that in return complexity of the syst em
would increase. In our method there are only three ways that a pixel is allowed to be changed:
1. Its least significant Bit would alter (So the gray level of the pixel would increased or decreased by one level)
2. The second less significant bit plane would alter (So the gray level of the pixel would increase or decrease by two
levels)
3. The fourth less significant bit plane would alter (So the gray level of the pixel would increase or decrease by eight
levels).
For executing the process the code is written in JAVA language. And Simulation is done in MATLAB (for checking
Histogram of Original & Stegno image). The paper is organized as fallows. In section II we described about the
implementation process where in which how the data is taken and embedded and including decryption process is explained.
And in section III about the experimental results showing all the pictorial view of all the results. In section IV analysis is
done on this process and comparison graph is also plotted. And fallowed by conclusion section.
II. IMPLEMENTATION
Hiding information in text is historically the most important method of steganography. An obvious method was to
hide a secret message in every nth letter of every word of a text message. It is only since the beginning of the Internet and all
the different digital file formats that is has decreased in importance. Text steganography using digital files is not used very
often since text files have a very small amount of redundant data. To hide information in audio files similar techniques are
used as for image files. One different technique unique to audio steganography is masking, which exploits the properties of
21
2. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation
the human ear to hide information unnoticeably. A faint, but audible, sound becomes inaudible in the presence of another
louder audible sound. This property creates a channel in which to hide information. Although nearly equal to images in
steganography potential, the larger size of meaningful audio files makes them less popular to use than images. The term
protocol steganography refers to the technique of embedding information within messages and network control protocols
used in network transmission
In this we have 2 modules
A) Steg module
B) UnSteg module
Steg Module:
In this module User need to write any secret information in Text area provided and need to select an Image file to
which User wants to append the Secret Information Text. After Selecting the Image the processing of adding Secret
Information to Image file takes place. In Steg Module only the Secret Text Information and Image to which Secret Text
Information will be selected and the remaining process go on based on the pixels of image and Text given.
UnSteg Module:
In UnSteg module the Encrypted Image will be selected and Steganography Application will start decrypting it
with each and every pixel of the Image and displays the output i.e. Secret Text Information. UnSteg module will be
accepting only the Image which has the hidden text message in it. After decrypting the Image the Secret Text Information
will be displayed from the Image by UnSteg Module.
Data flow diagram
Figure 1: The overall implementation flow
Here in this process take the input image that is to be watermarked. The Input Module is designed as such a way
that the proposed system must be capable of handling any type of data formats, such as if the user wishes to hide any image
format then it must be compatible with all usual image formats such as jpg, gif, bmp, it must be also compatible with video
formats such as avi, flv, wmf etc.And also it must be compatible with various document formats, so that the user can be able
to use any formats to hide the secret data.
The next process is watermarking. Watermarking is a technology for embedding various types of information in
digital content. In general, information for protecting copyrights and proving the validity of data is embedded as a
watermark. Watermarked content can prove its origin, thereby protecting the data. Next is encrypting the data. In this module
we encrypt the data embedded image. The purpose of authenticator watermark of a block is invariant in the watermark
embedding process; hence the watermark can be extracted without referring to the original content .The encryption and
decryption techniques are used in this module. In applications, the method is required to be made robust so that embedded
message can be deducted easily, even when stego images are slightly modified. In digital communications, information is
transmitted bit-by-bit, i.e. as binary signaling. Larger the pulse size of the symbol higher is the probability of detection.
Improvements of performance is due to the fact that for fewer symbols to hide we use more locations per symbol. Each
symbol is represented by a pattern of binary bits.
Next method is we flip an edge pixel in binary images is equivalent to shifting the edge location horizontally one
pixel and vertically one pixel. A horizontal edge exists if there is a transition between two neighboring pixels vertically and a
vertical edge exists if there is a transition between two neighboring pixels horizontally. We use spread spectrum watermark
morphological content. The watermarked content is obtained by computing the inverse for the main processing block to
reconstruct its candidate pixels. Use this module we going to see the original and watermarked content
22
3. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation
III. EXPERIMENTAL RESULTS
Figure1: Figure showing the screen of login page of user
Figures2: Figure showing the user entering the username and password.
Figure 3: User interface picture showing the labels
Figure 4: Inserting an input data for embedding
23
4. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation
Figure 5: Entering the input message to be embedded into the input data and encrypting the final data
Figure 6: Entering the input message to be embedded into the input data and encrypting the final data
Figure 7: Final page after encryption
Figure8: Entering the password for decryption by receiver.
IV. SIMULATION AND STEGANALYSIS RESULTS
We will consider text-in-image embedding to demonstrate the simulation results, but the method can be used for
other messages like binary images too, which was already analysized and given in IETE Technical Review. Fig 3 Output
Results
Visual Precept ion
For any steganography based secure system, the perception of steganos should be as cover image itself so that one
cannot differentiate them and detect the existence of embedded message. From fig 3, the cover image, processed cover
image and stego images look similar and one is not able to distinguish them visually.
24
5. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation
Difference Analysis
The “difference-images “obtained by taking the difference between cover, processed cover and stego images are
not visible. For making the difference visible in “difference-images “ for visual interpretation, we first increase differences
by multiplication of weight factor and then revert the values to get the strengthened “difference-images”. The strengthened
difference-images obtained are shown in fig 4. From analysis of these “difference-images “, on could not say that the
changes are either due to cover processing or message embedding and hence we can say that the method is safe from known
cover-stego attack.
Distortion Analysis
Distortion analysis of stego images is carried out by studying distortion / similarity messages statistically. There
are many methods for measuring distortion that can be used for distortion analysis. Distortion between two different images
is measured by considering Mean Square Error (MSE), Mean Absolute Error (MAE) or Histogram Similarity (HS).
Depth Vs Distortion Analysis
Distortion occurred in different steganos is required by varying the depth of hiding for embedding information in
cover image. The relation between depth of hiding used and distortion occurred in the stego images is shown in Fig 7. That
depth of hiding within some LSB region is most suitable for message embedding as the distortion is very small in this region.
As the depth of hiding increases beyond preferable region, the distortion becomes noticeable and unsuitable for message
hiding.
DISTORTION
(MAE)
DEPTH OF HIDING (D)
Fig.9.Depth Vs Distortion Analysis Security
A method, SBIPM, for providing the security of our important information has been proposed in this paper which
is based on the techniques of signal processing, cryptography, and steganography. The security of information has been
strengthened by applying scanning, coding, and encryption, cover processing and embedding techniques in the method.
Reshaping step of the method provides robustness for detecting message correctly in such situation when stego image is
distorted. The method developed is safe from various attacks. Simulation and steganalysis results shown in this paper shows
that one will not be able to distinguish between cover and stego images.
V. CONCLUSION
Thus we conclude that the strength of security achieved is very high and unauthorized receiver will not be able to
get back the original message using exhaustive without the knowledge of key parameters. Digital Steganography is
interesting field and growing rapidly for information hiding in the area of information security. It has a vital role in defense
as well as civil applications. In future we will more of secure systems based on this technology.
REFERENCES
[1]. Petitcolas, FAP; Anderson RJ; Kuhn MG (1999). Information hiding a survey Proceedings of the IEEE (special issue) 87 (7):
1062–78. . Retrieved 2008-09-02.
[2]. A. Tacticus, How to survive under siege / Aineias the Tactician, pp. 84{90, 183{193. Clarendon ancient history series,Oxford,
England: Clarendon Press, 1990, ISBN 0-19-814744-9,translated with introduction and commentary by David White head
[3]. Y. Kim, Z. Duric, and D. Richards, “Modified matrix encoding technique for minimal istortion steganography,” in Proc. 8th Int.
Workshop Inf. Hiding,J.L.Camenisch,C.S.Collberg,N.F.Johnson,and P. Sallee, Eds., Alexandria, VA, Jul. 10–12, 2006, vol.
4437, Lecture Notes in Computer Science, pp. 314–327.
[4]. R. Zhang, V. Sachnev, and H. J. Kim, “Fast BCH syndrome coding forsteganography,” in Proc. 11th Int. Workshop Inf.
Hiding,,S.Katzen-beisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7–10, 2009,vol. 5806, Lecture Notes in Computer
Science, pp. 31–47.
[5]. V. Sachnev, H. J. Kim, and R. Zhang, “Less detectable JPEG steganography method based on heuristic optimization and BCH
syndrome coding,” in Proc. 11th ACM Multimedia Security Workshop,J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton,
NJ, Sep. 7–8,2009, pp. 131–140.
25
6. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation
[6]. T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in Proc.
12th Int. Workshop Inf. Hiding,P.W.L.Fong,R.Böhme ,andR.Safavi-Naini,Eds., Calgary, Canada, Jun. 28–30, 2010, vol. 6387,
Lecture Notes in Computer Science, pp. 161–177.
[7]. J. Kodovský and J. Fridrich, “On ompleteness of feature spaces in blind steganalysis,” in Proc. 10th ACMMultimedia
SecurityWorkshop,A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U.K., Sep. 22–23,2008, pp. 123–132.
[8]. T. Filler and J. Fridrich, “Gibbs construction in steganography,” IEEE Trans. Inf. Forensics Security, vol. 5, pp. 705–720, Sep.
2010.
[9]. J. Fridrich and T. Filler, “Practical methods for minimizing embedding impact in steganography,” in Proc. SPIE, Electron.
Imag., Security, Steganography, Watermark. Multimedia Contents IX,E.J.Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29–
Feb. 1, 2007, vol. 6505,pp. 02–03.
[10]. T. Filler and J. Fridrich, “Binary quantization using belief propagation over factor graphs of LDGM codes,” presented at the 45th
Annu.Allerton Conf. Commun., Control, Comput., Allerton, IL, Sep. 26–28, 2007.
[11]. X. Zhang, W. Zhang, and S. Wang, “Efficient double-layered steganographic embedding,” Electron. Lett., vol. 43, pp. 482–483,
Apr. 2007.
[12]. W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,”
IEEE Commun Lett., vol. 11, pp. 680–682, Aug. 2007.
[13]. W. Zhang, X. Zhang, and S. Wang , “Maximizing steganographic embedding efficiency by combining Hamming codes and wet
paper codes,” in Proc. 10th Int. Workshop Inf. Hiding, ,K.Solanki,K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun.
19–21, 2008,vol. 5284, Lecture Notes in Computer Science, pp. 60–71.
[14]. T. Filler and J. Fridrich, “Wet ZZW construction for steganography,”presented at the 1st IEEE Int. Workshop Inf. Forensics
security,London, U.K., Dec. 6–9, 2009.
[15]. W. Zhang and X. Zhu, “Improving the embedding efficiency of wetpaper codes by paper folding,” IEEE Signal Process. Lett.,
vol. 16, pp.794–797, Sep. 2009.
[16]. W. Zhang and X. Wang, “Generalization of the ZZW embedding construction for steganography,” IEEE Trans. Inf. Forensics
Security, vol 4, pp. 564–569, Sep. 2009.
Biographies
Ch.Sairam presently pursuing his M .Tech in CSE,in ADAMS Engineering college. His interested areas are networking, data
mining etc.
B.Lakshmi completed her M.Tech in the Dept of CSE, Andhra University. She is presently working as Asst.prof in CSE Dept,
ADAMS Engineering College. Her interested areas are Networking, Web technologies and Image processing etc.
26