Steganography is a best method for in secret communicating information during the transference of data. Images are an appropriate method that used in steganography can be used to protection the simple bits and pieces. Several systems, this one as color scale images steganography and grayscale images steganography, are used on color and store data in different techniques. These color images can have very big amounts of secret data, by using three main color modules. The different color modules, such as HSV-(hue, saturation, and value), RGB-(red, green, and blue), YCbCr-(luminance and chrominance), YUV, YIQ, etc. This paper uses unusual module to hide data: an adaptive procedure that can increase security ranks when hiding a top secret binary image in a RGB color image, which we implement the steganography in the YCbCr module space. We performed Exclusive-OR (XOR) procedures between the binary image and the RGB color image in the YCBCR module space. The converted byte stored in the 8-bit LSB is not the actual bytes; relatively, it is obtained by translation to another module space and applies the XOR procedure. This technique is practical to different groups of images. Moreover, we see that the adaptive technique ensures good results as the peak signal to noise ratio (PSNR) and stands for mean square error (MSE) are good. When the technique is compared with our previous works and other existing techniques, it is shown to be the best in both error and message capability. This technique is easy to model and simple to use and provides perfect security with unauthorized.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
In recent time, the Steganography technique is broadly used for the secret data communication. It’s an art of hiding the secret data in another objects like videos, images, videos, graphics and documents to gain the stego or steganographic object so which it’s not affected by the insertion. In this paper, we are introducing a new methodology in which security of stego-image increase by embedding even and odd part secret image into R, G, B plane of cover image using LSB and ISB technique. As we can see from the results session the value of PSNR , NCC are getting increase while the value of MSE is getting decrease.
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
In recent time, the Steganography technique is broadly used for the secret data communication. It’s an art of hiding the secret data in another objects like videos, images, videos, graphics and documents to gain the stego or steganographic object so which it’s not affected by the insertion. In this paper, we are introducing a new methodology in which security of stego-image increase by embedding even and odd part secret image into R, G, B plane of cover image using LSB and ISB technique. As we can see from the results session the value of PSNR , NCC are getting increase while the value of MSE is getting decrease.
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
Lossless image compression is needed in many fields like medical imaging, telemetry, geophysics, remote
sensing and other applications, which require exact replica of original image and loss of information is not
tolerable. In this paper, a near lossless image compression algorithm based on row by row classifier with
encoding schemes like Lempel Ziv Welch (LZW), Huffman and Run Length Encoding (RLE) on color images
is proposed. The algorithm divides the image into three parts R, G and B, apply row by row classification on
each part and result of this classification is records in the mask image. After classification the image data is
decomposed into two sequences each for R, G and B and mask image is hidden in them. These sequences are
encoded using different encoding schemes like LZW, Huffman and RLE. An exhaustive comparative analysis is
performed to evaluate these techniques, which reveals that the pro
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
Abstract Recent advancement in image compression research resulted in reducing the time and cost in image storage and transmission without significant reduction of the image quality. In this paper software algorithms for image compression based on psycho visual and inter pixel redundancy elimination have been developed and implemented. This paper examines the suitability of these two compression techniques over a practical AWGN communication channel and concludes with an experimental comparison on the basis of BER v/s Eb/No ratio. Key Words: Psycho visual redundancy, inter pixel redundancy, lossless and lossy compression, AWGN channel, BER, Eb/No ratio.
Low Complex-Hierarchical Coding Compression Approach for Arial ImagesIDES Editor
Image compression is an extended research area
from a long time. Various compression schemes were
developed for the compression of image in gray scaling and
color image compression. Basically the compression is
focused for lossy or lossless color image compression based
on the need of applications. Where lossy compression are
higher in compression ratio but are observed to be lower in
retrieval accuracy. Various compression techniques such as
JPEG and JPEG-2K architectures are developed to realize
such and method. But with the need in high accuracy
retreivation these techniques[8] are not suitable. To achieve
nearby lossless compression[1] various other coding methods
were suggested like lifting scheme coding. This coding result
in very high retrieval accuracy but gives low compression
ratio. This limitation is a bottleneck in current image
compression architectures. So, there is a need in the
development of a compressing approach where both higher
compression as well as higher retrieval accuracy is obtained.
Reversible Encrypytion and Information ConcealmentIJERA Editor
Recently, a lot of attention is paid to reversible data hiding (RDH) in encrypted pictures, since it maintains the wonderful property that the initial image cover will be losslessly recovered when embedded data is extracted, whereas protects the image content that is need to be kept confidential. Other techniques used antecedently are to embed data by reversibly vacating area from the pictures, that area unit been encryted, may cause some errors on information extraction or image restoration. In this paper, we propose a unique methodology by reserving room before secret writing (i.e reserving room before encryption) with a conventional RDH algorithmic rule, and thus it becomes straightforward for hider to reversibly embed data in the encrypted image. The projected methodology is able to implement real reversibility, that is, information extraction and image recovery area unit free of any error. This methodology embedds larger payloads for constant image quality than the antecedently used techniques, like for PSNR= 40db.
Data Steganography for Optical Color Image CryptosystemsCSCJournals
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
On Text Realization Image SteganographyCSCJournals
In this paper the steganography strategy is going to be implemented but in a different way from a different scope since the important data will neither be hidden in an image nor transferred through the communication channel inside an image, but on the contrary, a well known image will be used that exists on both sides of the channel and a text message contains important data will be transmitted. With the suitable operations, we can re-mix and re-make the source image. MATLAB7 is the program where the algorithm implemented on it, where the algorithm shows high ability for achieving the task to different type and size of images. Perfect reconstruction was achieved on the receiving side. But the most interesting is that the algorithm that deals with secured image transmission transmits no images at all
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
Increased use of electronic communication has given birth to new ways of transmitting information securely. Steganography is a science of hiding information by embedding it in some other data called host message. Images are most known objects for steganography. The host message before steganography and stego message after steganography have the same characteristics. The given work is to be done by evaluating it on MATALAB. While evaluation one can calculate SNR, PSNR and BER for individual information Bit for conceal bit and analysis effect on results.
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
Lossless image compression is needed in many fields like medical imaging, telemetry, geophysics, remote
sensing and other applications, which require exact replica of original image and loss of information is not
tolerable. In this paper, a near lossless image compression algorithm based on row by row classifier with
encoding schemes like Lempel Ziv Welch (LZW), Huffman and Run Length Encoding (RLE) on color images
is proposed. The algorithm divides the image into three parts R, G and B, apply row by row classification on
each part and result of this classification is records in the mask image. After classification the image data is
decomposed into two sequences each for R, G and B and mask image is hidden in them. These sequences are
encoded using different encoding schemes like LZW, Huffman and RLE. An exhaustive comparative analysis is
performed to evaluate these techniques, which reveals that the pro
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
Abstract Recent advancement in image compression research resulted in reducing the time and cost in image storage and transmission without significant reduction of the image quality. In this paper software algorithms for image compression based on psycho visual and inter pixel redundancy elimination have been developed and implemented. This paper examines the suitability of these two compression techniques over a practical AWGN communication channel and concludes with an experimental comparison on the basis of BER v/s Eb/No ratio. Key Words: Psycho visual redundancy, inter pixel redundancy, lossless and lossy compression, AWGN channel, BER, Eb/No ratio.
Low Complex-Hierarchical Coding Compression Approach for Arial ImagesIDES Editor
Image compression is an extended research area
from a long time. Various compression schemes were
developed for the compression of image in gray scaling and
color image compression. Basically the compression is
focused for lossy or lossless color image compression based
on the need of applications. Where lossy compression are
higher in compression ratio but are observed to be lower in
retrieval accuracy. Various compression techniques such as
JPEG and JPEG-2K architectures are developed to realize
such and method. But with the need in high accuracy
retreivation these techniques[8] are not suitable. To achieve
nearby lossless compression[1] various other coding methods
were suggested like lifting scheme coding. This coding result
in very high retrieval accuracy but gives low compression
ratio. This limitation is a bottleneck in current image
compression architectures. So, there is a need in the
development of a compressing approach where both higher
compression as well as higher retrieval accuracy is obtained.
Reversible Encrypytion and Information ConcealmentIJERA Editor
Recently, a lot of attention is paid to reversible data hiding (RDH) in encrypted pictures, since it maintains the wonderful property that the initial image cover will be losslessly recovered when embedded data is extracted, whereas protects the image content that is need to be kept confidential. Other techniques used antecedently are to embed data by reversibly vacating area from the pictures, that area unit been encryted, may cause some errors on information extraction or image restoration. In this paper, we propose a unique methodology by reserving room before secret writing (i.e reserving room before encryption) with a conventional RDH algorithmic rule, and thus it becomes straightforward for hider to reversibly embed data in the encrypted image. The projected methodology is able to implement real reversibility, that is, information extraction and image recovery area unit free of any error. This methodology embedds larger payloads for constant image quality than the antecedently used techniques, like for PSNR= 40db.
Data Steganography for Optical Color Image CryptosystemsCSCJournals
In this paper, an optical color image cryptosystem with a data hiding scheme is proposed. In the proposed optical cryptosystem, a confidential color image is embedded into the host image of the same size. Then the stego-image is encrypted by using the double random phase encoding algorithm. The seeds to generate random phase data are hidden in the encrypted stego-image by a content-dependent and low distortion data embedding technique. The confidential image and secret data delivery is accomplished by hiding the image into the host image and embedding the data into the encrypted stego-image. Experimental results show that the proposed data steganographic cryptosystem provides large data hiding capacity and high reconstructed image quality.
On Text Realization Image SteganographyCSCJournals
In this paper the steganography strategy is going to be implemented but in a different way from a different scope since the important data will neither be hidden in an image nor transferred through the communication channel inside an image, but on the contrary, a well known image will be used that exists on both sides of the channel and a text message contains important data will be transmitted. With the suitable operations, we can re-mix and re-make the source image. MATLAB7 is the program where the algorithm implemented on it, where the algorithm shows high ability for achieving the task to different type and size of images. Perfect reconstruction was achieved on the receiving side. But the most interesting is that the algorithm that deals with secured image transmission transmits no images at all
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
Increased use of electronic communication has given birth to new ways of transmitting information securely. Steganography is a science of hiding information by embedding it in some other data called host message. Images are most known objects for steganography. The host message before steganography and stego message after steganography have the same characteristics. The given work is to be done by evaluating it on MATALAB. While evaluation one can calculate SNR, PSNR and BER for individual information Bit for conceal bit and analysis effect on results.
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
American standard code for information interchange mapping technique for tex...IJECEIAES
One of the significant techniques for hiding important information (such as text, image, and audio) is steganography. Steganography is used to keep this information as secret as possible, especially the sensitive ones after the massive expansion of data transmission through the Internet inside a conventional, non-secret, file, or message. This paper uses the American standard code for information interchange (ASCII) mapping technique (AMT) to hide the data in the color and grey image by converting it in a binary form, also convert the three levels of the red, green, and blue (RGB) image and grey image in the binary form, and then hide the data through hiding every two bits of the text in the two bits of one of the levels from the RGB image and grey image that means the text will be distributed throughout the images and allows hiding large amounts of data. That will send the information in a good securing way.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
We present a new image compression method to improve visual perception of the decompressed images and achieve higher image compression ratio. This method balances between the compression rate and image quality by compressing the essential parts of the image-edges. The key subject/edge is of more significance than background/non-edge image. Taking into consideration the value of image components and the effect of smoothness in image compression, this method classifies the image components as edge or non-edge. Low-quality lossy compression is applied to non-edge components whereas high-quality lossy compression is applied to edge components. Outcomes show that our suggested method is efficient in terms of compression ratio, bits per-pixel and peak signal to noise ratio.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography is the technique of hiding the fact that communication is taking place,by hiding data in other data. Many different carrier file formats such as image, audio, video, DNA etc can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques. In this paper different steganographic techniques are described.
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
2. Int J Elec & Comp Eng ISSN: 2088-8708
"Color image steganography in YCbCr space (Zena Ahmed Alwan)"
203
Images are the most commonly used method to cover items in the steganography approach, with the
aim of securing serious data. Within image steganography, “color image steganography” has been found
more serious than the so-called “grayscale image steganography” due to the fact that a large space is
available to hide data or information in color images. Several color spaces, such as red, green, and blue
(RGB), hue, saturation, and value (HSV), luminance and chrominance (YCbCr), YUV, and YIQ, are widelly
used to display colour images. “Color image steganography” usually be conducted in any colour space
security field. The YCbCr technique is a perfact given way for steganography. The human eye is not
sensitive to changes in chrominance although it is very sensitive to changes in luminance; thus, a littel
changes in the colour spaces of the chrominance band will not cover or change the overall image
quality [10, 11]. The Y and Cb are the luminance components, but the color space of the Cr components
consists of the blue and red chrominance components, respectively.
" We propose a modification to the model proposed by [2-3] together with a set of extensions that are
designed to enhance computational efficiency and data complexity. Using the proposed method, we convert
an RGB image into YCbCr space before employing exclusive-OR (XOR) operations between the color image
and the secret image. XOR operations are then repeated on the result with the green band’s LSB. The data
outputs of this process are subsequently saved in the blue band. As the encrypted data in the 8-bit LSB does
not represent the real data, which is acquired by converting the images to an alternative space and then
executing an XOR. This approach is referred to as the improved least significant bit steganography method
for processing images that are in RGB color format. The proposed method delivers images that are of an
enhanced quality after the information have been concealed within them. The generated message bits are
concealed in three planes of the color image after the plane has been sliced [12]. This process is executed in
such a way that the internal noise in the setgo-image is maintained at a minimum while any changes that are
made are so minor that they cannot be observed by the human eye. The outcomes of the proposed method
indicate that it represents a reliable and secure approach by which the quality of an image can be enhanced."
2. COLOR SPACES
Transform solutions describe a new space coordinate system or source that can eliminate model
requirement and enable scalar quantisation and free model handling. The new source, when well selected, can
lead to additional efficient coding by providing lower distortion at same data rate and vice versa.
2.1. RGB color space
Color space is a mathematical model to exemplify color data as three or four different color
modules. Different color representations are used for different uses such as computer graphics, image
processing, TV broadcasting, and computer vision [2]. Different color space is presented for color image.
They are: RGB constructed color space (RGB, standardized RGB), Hue Produced color space (HSI, HSV,
and HSL), Luminance constructed color space (YCBCr, YIQ, and YUV), and perceptually unbroken color
space (CIEXYZ, CIELAB, and CIELUV).
There are a number of ways of implementing the RGB color model, depending on the capacity of
the system employed for color characterization. Converting the color space means changing the
representation of the color from one form to another. This conversion is frequently used so that a drawn
image can be moved between color regions. This method is most frequently used for the creation of
converted image appearances that match the original image as closely as possible. The RGB model employs
an additive color mixture and, because of this, details the reasonable light weight that needs to be emitted to
provide a particular light-weight color that is advancement by providing a new form from darkness. With the
RGB technique, individual values are stored for red, green and blue [3]. The RGB color space is the most
frequently employed option for graphic displays on PCs, and because of the colors displayed (red, green, and
blue units), the specified color will not be produced by the area unit. Thus the RGB color space offers an
option whereby the color show system's design and appearance may be varied. Furthermore, such systems
provide space unit victimization for the RGB color house, possibly cashing in the overextended variations of
extant software package routines. While such color houses have been in existence for some years, the RGB
color house does not offer good economy in relation to "real-world" images."
The three elements of RGB should be combined in the information involved in order to offer colors
on the RGB color cube. This technique may create a buffer with identical picture element depths and which
illustrates the resolution for all parts of RGB. In addition, using the RGB color area as a workspace for
processing images is not generally optimal in terms of economy. As an example, if the intensity or color of a
specific picture element is to be switched, the three RGB color values ought to be derived from the buffer
store. Were the system provided with a picture directly contained within the intensity and color format, some
stages of this process would be accelerated [13].
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 202 - 209
204
2.2. YCbCr color space
YCbCr are the most common transforms that helps one abstract the Intensity (Luma) and the
consistent chromaticity which define the colour information in each of the bands. In both models, Y is a
luminance signal implied in 8 bits and it almost represents the grayscale different of a colour image [14].
The “chroma model of CCIR601 coding mode” is the definition of the YCbCr color system; this is frequently
employed in color TV displays and a number of color display systems. The Y is an essential element for the
color space, the luminance element showing the brightness (luma), and Cb and Cr, which declare the
chrominance elements. Cb represents blue subtract luma (B – Y) while Cr represents red subtract luma
(R – Y). There are several reasons that the YCbCR color system space should be used with color display
systems, as detailed in [15]:
1. The illumination variation problem can be solved using the luminance component (Y) and, as the color
is independent, it allows for easy programming.
2. In accordance with [14], it provides a more compact covering color cluster than alternative color spaces.
3. Under a number of different illumination conditions, it offers the least overlap of covering and
non-covering data.
4. It is extremely serviceable for use in applications that compress video, such as JPEG and MPEG
[15-19].
5. It encompasses a group of color spaces employed for video systems and is specified for the standard-
definition television used for the ITU-R BT.601 standard which operates with digital system videos.
6. It has an accompanying RGB color space; digital component videos are represented by two primary
color spaces. JPEG-YCbCris is employed by JPEG image formats, with the YCbCr being rescaled,
while the Y, Cb, and Cr components are converted into digital bits (0 or 1). For forward and backward
transformations for RGB to JPEG-YCbCr, the following matrices can be employed:
3. RELATED WORK
A novel approach was put forward by Masud Karim, centered on LSB [20]. This method involves
the use of a secret key, with concealed information undergoing encryption and being stored with the image's
LSP positions altered. This method offers extremely secure storage. In [21], a methodology was put forward
for hiding secret information across the RGB planes on the basis of the human visual system (HVS). Using
such a method, the stego image is of low quality.
In Sachdeva, and Kumar [22] Hid a top-secret message by using the "Vector Quantization (VQ)" table,
which offers improvements in message capacity and stego size. With reference to concealing text messages,
[23] offered improvements in the support of security for steganography. Every preceding approach is
employed to hide text messages within images with lower distortion levels and without losing RGB images.
These methods do not address operating issues with signal processing items. [24] proposed a different
approach, using minimum deviation techniques for fidelity, rooted in the decision embedding method. In this
instance, replacement positions are randomly selected between MSP and LSB with modification of two bits
per byte up to the fourth bit towards MSB. [25] used a "discrete wavelet transform (DWT)" for embedding
text messages in color images. The "Blowfish" encryption method involved in crafting a text message by
employing SSCIA coding and discrete Fourier transform (DFT) coding for concealment of images in storage
or transmission in [26]."
With the cover image, the specific sacred images are not concealed using the suggested method; the
transmission of these images takes place through concealment of the keys. In the work of [27] and [28] the
YCbCr method was employed. Additionally, in [29] DWT and inverse wavelet transform (TWT) are
employed to hide a single grayscale within the color image; in [30] enhancements were made to capacity by
employing solely IWT through the concealment of apparel grayscale images within a single color image.
Employing these methods improves the stego image quality. The method put forward here offers greater
4. Int J Elec & Comp Eng ISSN: 2088-8708
"Color image steganography in YCbCr space (Zena Ahmed Alwan)"
205
security for the encryption technique because the keys are encrypted using an alternative encryption
methodology.
4. PROPOSED METHOD
"In the proposed technique, the cover image is transformed into YCbCr spaces, after which the XOR
procedure is applied to (LSB) bytes to take benefit of three different channels and the requirement of a pixel.
Three different arrays (Y- represents the luminance component; Cb- and Cr-represent the chrominance
components) is being the 24-bit color image. The binary secret pixel data of the image will be hidden in
the LSB of the blue part. Two XOR operations were used before saving information to protect the data."
Our method was implemented in Matlab using the GUI toolbox. Table 1 and Table 2 show the
introduction of the needle values. The proposed method was executed in Matlab R2017b (9.3.0.713579). Our
work is shown as a flow chart in Figure 1. "
4.1. Embedding pseudocode
The embed processing for hid a binary image into RGB_color image in YCrCb space is described as
follows:
The steps of hiding a Binary Image processing:
Begin
Input: (BI) -Binary Image and (CI)-Color Image.
Output: (SC-Img) –Cover Stego Image.
Sp1: Rearrange pixel bytes of (BI) so to become the same area of (CI).
Sp2: Convert (CI) from RGB Space to YCbCr Space.
Sp3: Divide (CI) into three parts (Y, Cb, and Cr).
Sp4: Implements XOR between (CI_Y _LSB and BI_LSB).
Sp5: Apply XOR agin between (the result of Sp4 and CI_Cb _LSB).
Sp6: Insert the output data of sp5 to CI_Cr_LSB.
Sp7: Exchange YCbCr Space to RGB Space of the color image,
Sp8: Save the (CI)-color Image
Finish
4.2. Reconstructed pseudocode
The stpes of recovery the Binary Image processing:
Begin
Input: (SC-Img) -Stego color Image.
Output: (BI) -Binary Image.
Sp1: Read (SC-Img)-stego image and split to RGB Spaces image.
Sp2: Exchanging the RGB color stego_image (SC-Img) to YCbCr space by performing Sp1.
Sp3: Divid (SC-Img)-stego image to three parts such as (Y-part, Cb-part, and Cr-part).
Sp4: Perform XOR between (Cr _LSB and Cb_LSB of (SC-Img).
Sp5: Apply XOR between the output data of Sp4 and Y _LSB of (SC-Img).
Sp6: Keep and Save the result bits and display Secret Binary Image (BI)
Finish
5. EXPERIMENTAL RESULTS
This et alion will discuss the results of the experiment regarding the concealment of the necessary
data employing the steganography method put forward in this paper. There is a proposal for a new
methodology to make information more secure, presenting new concepts for the improvement of the
capabilities of steganography for embedding secret messages in the most insignificant byte after undertaking
two XORs within the YCbCr space. The programming language employed to implement this is MATLAB
Version R2017b (9.3.0.713579). For this research, we employed a different image that does not match the
size of the image illustrated in Table 1 and Table 2. Even when the hidden image was open, a person without
authority could extract a random image but be unable to acquire the concealed data, and this is the advantage
of the algorithm that we propose. In analyzing the peak signal-to-noise ratio (PSNR), comparisons are made
between the base work and the proposed PSNR work as shown in Table 3. Thus we propose a new modern
methodology for steganography for images within color scale images that have the capability of supporting
more secure data. Information is concealed within the cover image, not totally within the pixel data image.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 202 - 209
206
This algorithm is applied to the color image, with the results illustrated in Figure 2 Figure 3 and Figure 4,
where to checkers our employees standing for MSE and PSNR. The PSNR technique was employed for
evaluation of the stego image methodology quality. PSNR definition matches those in [12, 13, and 18]:
Where:
n: is the size of the row to the image
m: is the size of column to the image
: is the cover image
is the stego image
If the MSR value is low, the quality of the image was good. A better image quality is shown by a
greater PSNR, which means that the signal power is better to increase the image display. In general, in terms
of human sensitivity, a watermarked image is considered suitable when its PSNR is more than 30 dBs. In
adding, the correlation method is used to estimate the robustness of the watermarking procedure, while PSNR
is used to estimate the “transparency of the watermarking technique” [5, 21, and 26]. This measures the et
alion of pixels that will be altered when the projected process is applied to these test images. The three
dissimilar binary image sizes are 16.9 KB, 24.0 KB, and 28.1 KB."
Figure 1. Flow chart of embedding algorithm
6. Int J Elec & Comp Eng ISSN: 2088-8708
"Color image steganography in YCbCr space (Zena Ahmed Alwan)"
207
Table 1. Size of cover color image and the secrete binary image of three experiments.
cover image
Dimensions of cover
image(pixel)
Size of cover image Dimensions of secrete
binary image(pixel)
Size of secrete binary
image
Lena 512x512 463KB 400x333 16.9KB
koala 1024x768 762KB 640x360 28.1KB
peppers 512x512 441KB 540x362 24.0KB
Table 2. Value of (PSNR, MSE) using YCbCr channel for different color images (for BPP=8/3)
cover image PSNR MSE
Lena 54.7543 0.46647
koala 55.7234 0.41722
peppers 54.958 0.45566
Table 3. The PSNR values of stego_image at several techniques
References Technique PSNR(dB)
[24] 39.6
[25] 42.4
[26] 36.6
[29] 33.2
[30] 44.7
Proposed 54.7
Figure 2. Test 1 of processing method. Figure 3. Test 2 of processing method.
Figure 4. Test 3 of processing method.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 202 - 209
208
6. CONCLUSIONS
This research proposes a data hiding procedure in images with greater embedding data; we can use
one color image to hide a binary secret image.These secret images can be restored without keeping the image
by applying XOR procedures between the secret image and the color image in the YCbCr space, resulting in
a high-quality stego image with great PSNR values comparable to those achieved by other present methods.
The results found demonstrate the strength of the novel method; by increasing the PSNR to 54.7, that result it
was a very good point in image steganography that mean the error will be very simple.
REFERENCES
[1] A. Nag, S. Ghosh, S. Biswas, D. Sarkar, P. Sarkar, “An Image Steganography Technique using X-Box Mapping,”
International Conference on Advances in Engineering, Science And Management, IEEE (ICAESM), 2012.
[2] Z. Ahmed, H. Mohammed, “Secure Watermark Image Steganography by Pixel Indicator Based on Randomization,”
Journal of Madent ALelem College, vol. 4, no. 2, pp. 101-110, 2012.
[3] H. Mohammed, Z. Ahmed, “Improved method using a two Exclusive-OR to binary image in RGB color image
steganography,” International Journal of Engineering & Technology, vol. 7, no. 4, pp. 4295-4299, 2018.
[4] K. Joshi, R. Yadav, “New Approach toward Data Hiding Using XOR for Image Steganography,” 2016 Ninth
International Conference on Contemporary Computing (IC3), 2016.
[5] K. Farhan Rafat, M. Junaid Hussain, “Secure Steganography for Digital Images Meandering in the Dark,”
(IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, 2016.
[6] C. Patvardhan, P. Kumar, C. Vasantha Lakshmi, "Effective color image watermarking scheme using YCbCr color
space and QR code,” Multimedia Tools and Applications, Springer, pp. 1-23, 2017.
[7] M. S Arya, et al, “Improved Capacity Image Steganography Algorithm using 16- Pixel Differencing with n-bit LSB
Substitution for RGB Images,” International Journal of Electrical and Computer Engineering (IJECE), vol. 6,
no. 6, pp. 2735-2741, 2016.
[8] K. Joshi, R. Yadav, G. Chawla, “An Enhanced Method for Data Hiding using 2-Bit XOR in Image Steganography,”
International Journal of Engineering and Technology (IJET), vol. 8, no. 6, Dec 2016-Jan 2017.
[9] P. Jain, N. Kanwal, “Image Steganography in RGB Color Components using Improved LSB Technique Image
Pattern Compression using Weighted Principal Components Algorithm,” Indian Journal of Science and
Technology, vol. 9, pp. 45, pp. 1-4, 2016.
[10] M. Masoumi, S. Amiri, “A High Capacity Digital Watermarking Scheme for Copyright Protection of Video Data
based on YCbCr Color Channels Invariant to Geometric and Non-Geometric Attacks,” International Journal of
Computer Applications, vol. 51, no. 13, pp. 0975 – 8887, 2012.
[11] A. Nilizadeh, A. Reza, “A Novel Steganography Method Based on Matrix Pattern and LSB Algorithms in RGB
Images,” 1st Conference on Swarm Intelligence and Evolutionary Computation (CSIEC2016), Higher Education
Complex of Bam, Iran, IEEE, pp. 877-885, 2016.
[12] V. Ashok Kumar, C. Dharmaraj, Ch. Srinivasa Rao, “A Hybrid Digital Watermarking Approach Using Wavelets
and LSB,” International Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 5, pp. 2483-2495,
Oct 2017.
[13] X. Zhou, W. Gong, W. Fu, L. Jin, “An Improved Method for LSB Based Color Image steganography Combined
with Cryptography,” Okayama, Japan, IEEE, ICIS, 2016.
[14] O. Salima, A. Taleb-Ahmed, B. Mohamed, "Spatial Information based Image Clustering with A Swarm Approach,”
IAES International Journal of Artificial Intelligence (IJ-AI), vol. 1, no. 3, pp. 149-160, Sep 2012.
[15] S. Pramanik, R. P. Singh, R. Ghosh, “A new encrypted method in image steganography,” Indonesian Journal of
Electrical Engineering and Computer Science (IJEECS), vol. 14, no. 3, pp. 1412-1419, Jun 2019.
[16] R. Din, R. Bakar, S. Utama, J. Jasmis, S. Jamel Elias, “The evaluation performance of letter-based technique on
text steganography system,” Bulletin of Electrical Engineering and Informatics (BEEI), vol. 8, no. 1,
pp. 291-297, Mar 2019.
[17] P. Wahyu Adi, F. Zakiyah Ramhanti, E. Winarno, “Robust Watermarking through Dual Band IWT and Chinese
Remainder Theorem,” Bulletin of Electrical Engineering and Informatics (BEEI), vol. 7, no. 4, pp. 561-569, 2018.
[18] Al Farissi, Agung Wahyu Nugroho, Megah Mulya, “Medical Image Encryption by Using Modification of
SomdipDey Advanced Encryption Image Technique,” Proceeding of International Conference on Electrical
Engineering, Computer Science and Informatics (EECSI 2014), Yogyakarta, Indonesia, pp. 396-399, Aug 2014.
[19] P. Wahyu Adi, Y. Parti Astuti, E. Rosi Subhiyakto, “Imperceptible Image Watermarking based on Chinese
Remainder Theorem over the Edges,” Proc. EECSI 2017, Yogyakarta, Indonesia, Sep 2017.
[20] M. Karim S.M., Rahman M.S., Hossain M.I., “A New Approach for LSB Based Image Steganography using Secret
Key,” Proceedings of 14th
International Conference on Computer and Information Technology, IEEE,
pp. 286 – 291, 2011.
[21] Xie Qing, Xie Jianquan, Xiao Yunhua., “A High Capacity Information Hiding Algorithm in Color Image,”
Proceedings of 2nd International Conference on E-Business and Information System Security, IEEE, pp. 1-4, 2010.
[22] Sachdeva, S and Kumar, A., “Colour Image Steganography Based on Modified Quantization Table,”
Proceedings of Second International Conference on Advanced Computing & Communication Technologies,
IEEE Conference Publications, pp. 309 – 313, 2012.
8. Int J Elec & Comp Eng ISSN: 2088-8708
"Color image steganography in YCbCr space (Zena Ahmed Alwan)"
209
[23] Roy S., Parekh R, “A Secure Keyless Image Steganography Approach for Lossless RGB Images,” Proceedings of
International Conference on Communication, Computing & Security, ACM Publications, pp. 573-576, 2011.
[24] Mandal, J.K., Sengupta, M., “Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF),”
Proceedings of Second International Conference on Emerging Applications of Information Technology,
IEEE Conference Publications, pp. 298 – 301, 2011.
[25] Mandal J.K., Sengupta M., “Authentication/Secret Message Transformation Through Wavelet Transform based
Subband Image Coding (WTSIC),” Proceedings of International Symposium on Electronic System Design,
IEEE Conference Publications, pp. 225 – 229, 2010.
[26] Kapre Bhagyashri, S., Joshi, M.Y. "All Frequency Band DWT-SVD Robust Watermarking Technique for Color
Images in YUV Color Space". In Proceedings of 2011 IEEE International Conference on Computer Science and
Automation Engineering (CSAE), IEEE Conference Publications, PP. 295 – 299, (10-12 June 2011).
[27] H. S, U Dinesh Acharya, Renuka A, Priya R. Kamath, “A Secure Color Image Steganography in Transform
Domain,” International Journal on Cryptography and Information Security (IJCIS), vol. 3, no. 1, pp. 17-24, 2013.
[28] N. Tiwari1, M. Shandilya, "Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An
Incremental Growth", International Journal of Security and Its Applications, PP.53-62, Vol.4, No.4, October, 2010.
[29] Ghoshal, N., Mandal, J.K. "A Steganographic Scheme for Colour Image Authentication" (SSCIA). In Proceedings
of International Conference on Recent Trends in Information Technology (ICRTIT 2011), (Madras Institute of
Technology, Chennai, India, IEEE Conference Publications, PP. 826 – 831, (June 03 - 05, 2011).
[30] H. S., U Dinesh Acharya, Renuka A., Priya R. Kamath, “A secure and high capacity image steganography
technique,” Signal & Image Processing : An International Journal (SIPIJ), vol. 4, no. 1, pp. 83-89, 2013.
BIOGRAPHIES OF AUTHORS
Zena Ahmed Alwan received her B.Sc. in Computer Sciences from the University of
Baghdad in 2002. She received her M.Sc. degree in the Computer Sciences in 2005 from the
same University. Her areas of interest are Digital Image Processing, Pattern Recognition and
Information Hiding. Currently, she is lecture in Department of Medical Instrumentation
Techniques Engineering in Electrical Engineering Technical College in the Middle Technical
University, Iraq.
Hamid Mohammed Farhan received the B.Sc. degree in Electrical Engineering from Air
Force Technical Academy (Rajlovac), Sarajevo, Yugoslavia, in 1986, and the M.Sc. degree in
Electrical Engineering from Belgrade University, Belgrade, Yugoslavia, in 1988 and the Ph.D.
degree in communication engineering from Razak School of University Technology Malaysia,
Kuala Lumpur, Malaysia in 2017.
Siraj Qays Mahdi received his B.Sc. Degree (with ranked 1st
) at 2006 and M.Sc. degree
(at 2008) in Computer Engineering Techniques/ Electrical Engineering Technical College from
Middle Technical University, Baghdad-Iraq. He is an assistant Lecturer in Computer
Engineering department/College of Electrical and Electronics Engineering Techniques since
2010 and became Lecturer from March 2013 and Assistant Professor from 2017 until now.
Recently, he is the head of Scientific Affairs in Electrical Engineering Technical College.