The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Review on Stegnography Data Hiding using Color Imagesijtsrd
Nowadays, network has necessary roles for transferring knowledge accurately and quick from supply to a destination. The info isnt secure enough to transfer extremely confidential. The protection of data has become one in every of the principle challenges of resource sharing with electronic communication over network. Cryptography and Steganography square measure to strategies for shielding knowledge from intruders whereas transferring over an open channel network. Cryptography could be a technique to cipher knowledge and steganography is that the art and science of concealing secret message in an exceedingly cowl image. The digitally shared knowledge between the users ought to be born again to some unclear format which cannot be tampered by the intruders. To fulfill these necessities the technique Steganography will be used. During this technique we tend to use completely different mediums to cover the info that square measure text, images, audio, video etc. this paper is that specialize in encrypting of knowledge by exploitation image steganography. Gagandeep Singla | Chamkour Singh ""A Review on Stegnography Data Hiding using Color Images"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23556.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23556/a-review-on-stegnography-data-hiding-using-color-images/gagandeep-singla
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Review on Stegnography Data Hiding using Color Imagesijtsrd
Nowadays, network has necessary roles for transferring knowledge accurately and quick from supply to a destination. The info isnt secure enough to transfer extremely confidential. The protection of data has become one in every of the principle challenges of resource sharing with electronic communication over network. Cryptography and Steganography square measure to strategies for shielding knowledge from intruders whereas transferring over an open channel network. Cryptography could be a technique to cipher knowledge and steganography is that the art and science of concealing secret message in an exceedingly cowl image. The digitally shared knowledge between the users ought to be born again to some unclear format which cannot be tampered by the intruders. To fulfill these necessities the technique Steganography will be used. During this technique we tend to use completely different mediums to cover the info that square measure text, images, audio, video etc. this paper is that specialize in encrypting of knowledge by exploitation image steganography. Gagandeep Singla | Chamkour Singh ""A Review on Stegnography Data Hiding using Color Images"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23556.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23556/a-review-on-stegnography-data-hiding-using-color-images/gagandeep-singla
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and propose to enhance the security of the secret message by random selection of the keys to extract the secret message and working towards increasing the PSNR Peak Signal to Noise Ratio and decreasing the MSE Mean Square Error . Naveen Verma | Preeti Sondhi | Gargi Kalia ""LSB Based Stegnography to Enhance the Security of an Image"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25163.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/25163/lsb-based-stegnography-to-enhance-the-security-of-an-image/naveen-verma
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that
assists the internet users to interchange their secret and private data safely across the web. Informationhiding
process in a Steganography system starts by identifying medium’s redundant bits. The encryption
process creates a stego medium by replacing these redundant bits with data from the hidden message.
So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform
Circular Shift Operations on the image pixels and the number of rotations have been calculated based on
the length of the password. In the second phase, the first phase has undergone some bitwise operations
with a carriage image, by doing this; breaking of the cipher text is difficult.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
Steganography is the technique of hiding a secret message or information in a cover message like an image, text or sound in such a way that only the desired or intended recipient knows about the existence of the secret data. It can be defined as the study of invisible communication which usually deals with the technique of hiding the existence of the secret message. The hidden message may be in the form of text, image, audio and video etc. An image after inserting the secret message into it by using a stego key is known as a stego image. Nowadays steganography is important due to an exponential growth in secret communication by potential computer users over the internet. In this paper we have analyzed the various steganography techniques and observed that the security of the secret message can be enhanced by random selection of the pixels for substitution in LSB steganography. Further the error metrics PSNR Peak Signal to Noise Ratio should be high and MSE Mean Square Error should be low indicating good quality re construction. Naveen Verma | Preeti Sondhi | Gargi Kalia "Review Paper on LSB Based Stegnography to Enhance Image Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25326.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/25326/review-paper-on-lsb-based-stegnography-to-enhance-image-security/naveen-verma
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Data Security Through Crypto-Stegano Systemsrinzindorjej
Unauthorized access and hacking are major issues for internet users, and numerous articles have been published on various approaches to solving this issue. This study proposes a novel method for encoding a hidden message within the text by combining text steganography and substitution cryptography. While steganography and cryptography can be used to protect data, neither is sufficient to provide better security as they can be broken by steganalysis and cryptoanalysis. Therefore, the terms "cryptography-stegano" should be combined for improved security. In this method, data is first encrypted using a substitution cryptography technique to produce the cypher text, which is then encrypted using text steganography to produce a more secure cypher text sent to the recipient. Contrary to popular belief, using image steganography and cryptographic methods is unnecessary for effective data encryption. The study shows that combining text steganography with cryptographic techniques is an excellent data security method. Additionally, other combinations, such as audio and video steganography, should also be considered for better security
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of
camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia
content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access
from suspicion of the existence of confidential information exchanged during communication channels
between the connected parties. In this paper, an integrated image steganographic system is designed to
conceal images, messages or together where the mainly deliberate the improvement of embedding capacity
through embedding text with image simultaneously. For that purpose, used matrix partition to partition the
secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify
the better performance of the proposed algorithms.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
In the digital world, data is that the heart of computer communication and world
economy to make sure the safety for this data it is desired secure transmission of
confidential data that gets an excellent deal of attention. Therefore; it’s necessary to
use effective methods to reinforce information security. Many strategies are coming up
to shield the information from going to unauthorized person. Steganography and
cryptography are 2 completely different mechanisms for information security. The
main purpose in cryptography is to create message idea unintelligible, whereas
steganography aims to hide secret message. Digital-pictures are wonderful carriers of
hidden information. Combining these two methods is a topic of high relevance since
secure communication is inevitable for mankind. In this paper, a method for
protection data was proposed comprises a hybridization between cryptography and
steganography. In the proposed approach particle swarm optimization algorithm
(PSO) was used in both methods(encryption and steganography).The PSO algorithm
was used in key generation process for data encryption and in generating hidden
locations for data hiding. Also, the Least Significant Bit (LSB)was utilized to add the
encrypted data into LSB of the cover and the PSO was utilized to specify the location
of hiding data. The data will be encrypted by using stream cipher method. The image
will be transmitted and received through the internet and the extraction process would
be exactly reveres for hidden process. Experimental results illustrate that the visual,
and therefore applying mathematics values of the image with encrypted information
before the insertion represented as the same as the values after the insertion so that
the reduction in the possibility of the confidential-message to be detected and allows
secret communication. The effectiveness of the projected technique has been
calculable by computing 5 statistical tests, 16 NIST tests for the generated key
Similar to COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMMUNICATION (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2. 150 Computer Science & Information Technology (CS & IT)
1. INTRODUCTION
In today’s world the data is the heart of computer communication and global economy. To ensure
the security of the data so that it does not go to unintended destination, the concept of data hiding
has attracted people to come up with creative solutions to protect data from falling into wrong
hands [1]. Digital data can be delivered over computer networks from one place to another
without any errors and often without interference. The distribution of digital media raised a
concern over the years as the data are attacked and manipulated by unauthorized person [2].
Digital data can be copied without any loss in quality and content. Thus it poses a big problem for
the security of data and protection of intellectual property rights of copyright owners [3]. The
Internet provides an increasingly broad band of communication as a means to distribute
information to the masses. As a result of spreading the Internet all around the world, motivation
of hiding secret message in different multimedia and secure communication via Internet is
increased [5]. Techniques for information hiding have become increasingly more sophisticated
and widespread. Such information includes text, images, and audio to convey ideas for mass
communication which provide excellent carriers for hidden information. Due to the growth of
data communication over computer network, the security of information has become a major
concern [4]. Therefore, the confidentiality and data integrity are required to be protected against
unauthorized access and use. Steganography and cryptography are the two different information
hiding and protecting techniques, where we transform the message so as to make it meaning
obscure to a malicious people trying to intercept [8].
Steganography is a data hiding technique aiming to transmit a message on a channel, where some
other kind of information is already being transmitted [6]. The goal of steganography is to hide
messages inside other “harmless” digital media in a way that does not allow any person to even
detect the secret message present [4]. The information that is to be hidden is encoded in a manner
such that the very existence of the information is concealed. The main goal of steganography is to
communicate securely in such a way as to avoid drawing suspicion to the transmission of a
hidden data [7]. Cryptography, on the other hand obscures the content of the message, so it
cannot be understood where the existence of the message itself is not disguised [4]. Cryptography
hides the contents of a secret message from a unauthorized person but the content of the message
is visible [12]. In cryptography, the structure of a message is scrambled in such a way as to make
it meaningless and unintelligible manner but it makes no attempt to disguise or hide the encoded
message. Basically, cryptography offers the ability of transmitting information between persons
in a way that prevents a third party from reading it [11].
Steganography does not alter the structure of the secret message, but hides it inside a medium so
it cannot be seen [7]. In other words, steganography prevents an unintended recipient from
suspecting that the data exists. In addition, the security of the steganography system relies on
secrecy of the data encoding system [1]. Once the encoding system is known, the steganography
system is defeated. While cryptography protects messages from being captured by unauthorized
parties, steganography techniques enable concealment of the fact that a message is being sent so
that it could not be felt that a message is embedded into digital media. Steganography is the
invisible communication between the sender and the receiver [14]. In Steganography, only the
sender and the receiver know the existence of the message, whereas in cryptography the existence
of the encrypted message is visible to the world [13]. Due to this, Steganography removes the
unwanted attention coming to the media in which the message is hidden. Cryptographic methods
try to protect the content of a message, while Steganography uses methods that would hide both
the message as well as the content [30].
3. Computer Science & Information Technology (CS & IT) 151
Although, the two techniques are different in their way of data hiding but they are in fact
complementary techniques. No matter how strong algorithm, if an encrypted message is
discovered, it will be subject to cryptanalysis [31]. Likewise, no matter how well a message is
concealed inside a digital media there is possibility of the hidden message to be discovered. By
combining Steganography and Cryptography we can achieve better security by concealing the
existence of an encrypted message [9]. It is possible to combine the techniques by encrypting
message using cryptography and then hiding the encrypted message using steganography [8]. The
resulting stego-object can be transmitted without revealing that secret information is being
exchanged. Furthermore, even if an attacker were to defeat the steganographic technique and
detect the message from the stego-object, he at first have to decode the message from digital
media and then he would still require the cryptographic decoding algorithm to decipher the
encrypted message [10].
2. IMAGE BASED STEGANOGRAPHY
It has been observed that all digital file formats can be used hiding data using steganography, but
the formats those have a high degree of redundancy present in them are more suitable. The
redundant bits of an object are those bits that can be altered without the alteration being detected
easily [4, 16]. As digital images contains large amount of redundant bits, they are the most
popular cover objects for steganography. This is relatively easy because an image, being an array
of pixels, typically contains an enormous amount of redundant information [6]. To a computer, an
image is a collection of numbers that constitute different light intensities in different areas of the
image. This numeric representation forms a grid and the individual points are referred to as pixels
[32]. These pixels make up the image’s raster data. Image based steganography is about
exploiting the limited powers of the human visual system (HVS) [5, 28]. There are plenty of ways
to hide messages within images. The security of stego-images depends entirely on their ability to
go unnoticed [5].
When working with digital images, the images seems to be too large to be transmitted over the
Internet. Thus in orders to display an image in a reasonable amount of time, techniques are used
to reduce the image’s file size [24]. These techniques make use of mathematical formulas to
analyze and reduce image data, resulting in smaller file sizes and this process is called
compression [7]. Steganographic technique is equally important as the choice of the cover image
thus compression plays a very important role in image based steganography methods. Current
image formats can be divided into two broad categories, lossy and lossless. Both methods save
storage space but have different results. Lossless compression reconstructs the original message
exactly and thus it is preferred when the original information must remain intact [15, 16].
Lossless images are more suitable for embedding, since the integrity of the image data is
preserved. However, they do not have the high compression ratio that lossy formats do. Lossy
compression, on the other hand, saves space but may not maintain the original image’s integrity.
The plus side of lossy images, in particular JPEG, is that it achieves extremely high compression,
while maintaining fairly good quality [16, 17]. Earlier it was thought that steganography would
not be possible using JPEG images, since they use lossy compression [4] which results in parts of
the image data being altered. One of the major characteristics of steganography is the fact that
information is hidden in the redundant bits of an object and since redundant bits are left out when
using JPEG it was feared that the hidden message would be destroyed [14]. However, the
properties of the compression algorithm have been exploited in order to develop a steganographic
4. 152 Computer Science & Information Technology (CS & IT)
algorithm for JPEGs [18]. One of these properties of JPEG is exploited to make the changes to
the image invisible to the human eye [20]. This technique, whilst crude, hides a large volume of
information inside the image [6]. Once implemented, it is not necessarily perceptible to a human
eye that the image has been changed. Lossy compression is preferred in image based
steganography because it achieve higher compression compared to lossless compression and thus
it is much more secure and have less chances of detection that that of lossless. Steganography not
only deals with embedding the secret data inside the digital image but also the receiver to whom
the message is intended must know the method used and would be able to retrieve the message
successfully without drawing the attention of a third party that a secret communication is
occurring.
3. PROPOSED TECHNIQUE
In this paper we propose a method for hiding large volumes of data in digital images by
combining cryptography and steganography while incurring minimal perceptual degradation in
terms of human visual interpretation and to solve the problem of unauthorized data access.
Steganography also can be implemented to cryptographic data so that it increases the security of
this data [8, 9]. In this method we first encrypt a message using substitution cipher method and
then embed the encrypted message inside a JPEG image using DCT in frequency domain. A
substitution cipher is one in which each character in the plaintext is substituted for another
character in the ciphertext [31]. Thus the original message that is represented in such a form that
is not meaningful to the third party. As we know that the JPEG compression is based on the
discrete cosine transform (DCT) and reduces the visual redundancy to achieve good compression
performance [17]. Thus it is very difficult to detect hidden message in frequency domain and for
this reason we use transformation like DCT in our proposed technique. Therefore, the embedding
capacity provided by JPEG steganography is less prone to detection. The combination of these
two methods will enhance the security of the data embedded. This combinational methodology
will satisfy the requirements such as capacity, security and robustness for secure data
transmission over an open channel [10]. The resulting stego-image can be transmitted without
revealing that secret information is being exchanged. Furthermore, even if an attacker were to
defeat the steganographic technique to detect the message from the stego-object, he would still
require the cryptographic decoding method to decipher the encrypted message [8]. The intended
receiver should be able to recover the embedded data successfully, without any errors. The
proposed methods can be employed for applications that require high-volume embedding with
robustness against attacks.
3.1. Encrypting message
The proposed method uses a cryptographic system based on classical encryption technique i.e.
substitution method, A substitution cipher substitutes one piece of information for another. In
substitution cipher each character in the plaintext is substituted for another character in the
ciphertext [13]. Such ciphertext could be transmitted across a network or stored within a file
system with the disguise serving to provide confidentiality [25]. Instead of changing the order of
characters as in transposition cipher, the substitution cipher replaces the character of the message
with other character so as to make the message unintelligible [26]. In substitution cipher, the
algorithm is to offset the alphabet and the key is the number of characters to offset it [31]. The
receiver inverts the substitution on the ciphertext to recover the plaintext [25]. For example, if we
encrypt the word “MESSAGE” by shifting 16 places, then we have “MESSAGE” encrypts as
5. Computer Science & Information Technology (CS & IT) 153
“CUIIQWU”. To allow someone else to read the ciphertext, we tell the recipient that the key is
16. Now if we suppose A (sender) wants to send B (recipient) the plaintext message M over the
insecure communication line, A encrypts M by computing the ciphertext C = E (K, M) and sends
C to B. Upon receipt, B decrypts C by computing M = D (K, C). The adversary may know E and
D are the encryption and decryption algorithms respectively which are being used in the process.
plaintext sender ciphertext
Shared symmetric key
Communication Channel
plaintext receiver
Fig 1: Symmetric encryption system
• Plaintext: It is the original message which is to be transmitted. Formally, it can be written
as M =< m1, m2, . . . , mn > to denote the plaintext. For example, M =< t,h,i,s, ,i,s, ,a,n,
,e,n,c,r,y,p,t,i,o,n, ,m,e,t,h,o,d >.
• Ciphertext: It is the translated or encrypted message, which can be denoted as C =< c1,
c2, . . . , cm >. Thus, the ciphertext C =<j,x,y,i, ,y,i, ,q,d, ,u,d,s,h,o,f,j,y,e,d, ,c,u,j,x,e,t >.
• Encryption: The process of encoding a message so that its meaning is not obvious; the
transformation from plaintext to ciphertext. The encryption is denoted using C = E (M),
where C is the ciphertext and M is the plaintext and E is the encryption method. In the
present substitution method, C = E (M) = (M +16) mod (26); in general, C = E (M) = (M
+ K) mod (26), where K is the key.
• Decryption: It is the reverse process of encryption; the transformation from ciphertext to
plaintext, formally denoted as M = D(C). In the present substitution method, M = D(C) =
(C − 16) mod (26); in the general, M = D(C) = (C − K) mod (26), where K is the key.
• Key: Key is something that is set based on the agreement between the sender and the
recipient. In the present encryption method the key tells how much to shift. It is an input
to the encryption and decryption algorithm [31]. The encryption algorithm will produce a
different ciphertext depending on the specific key being used. The corresponding key is
needed to decrypt the ciphertext to plaintext [27]. A key gives us flexibility in using an
encryption algorithm and provides additional security [19]. If the encryption algorithm is
known to the third party still the messages can be kept secret because the attacker does
Encryption
algorithm
C = E (K, M)
jxyi yi qd
udshofjyed
cujxet
this is an
encryption
method
Decryption
method
M = D (K, C)
this is an
encryption
method
6. 154 Computer Science & Information Technology (CS & IT)
not know the key value used in the encryption process. When same key used for
encryption and decryption as shown in Fig. 1, they are called symmetric key, or secret key
[19]. The encryption (symmetric-key encryption or secret- key encryption) process can be
denoted as C = E (K, M); and the decryption process is denoted as M = D (K, C). The
cryptosystem is called symmetric cryptosystem and needs to satisfy M = D (K, E (K, M)).
3.2. Embedding the encrypted message in image file
Images are the most popular cover objects for steganography because of large amount of
redundant bits which are suitable for data transmission on the Internet [24]. An example of an
image format that uses this compression technique is JPEG (Joint Photographic Experts Group)
[17]. JPEG is the most popular image file format on the Internet and the image sizes are small
because of the compression, thus making it the least suspicious algorithm to use. The JPEG
format uses a discrete cosine transform to image content transformation. DCT is a widely used
tool for frequency transformation [23]. In JPEG image format, message bits are inserted in the
DCT (Discrete Cosine Transforms) coefficients. The quantized DCT coefficients formed in the
JPEG compression are used to embed the secret bits.
Embedding process is discussed in four phases as follows:
• Phase One: Divide the Image
To compress an image into JPEG format, the RGB colour representation is first converted to a
YUV representation space and break up each colour plane into 8 x 8 blocks of pixels [18, 21]. In
this representation the Y component corresponds to the luminance (or brightness) and the U and V
components stand for chrominance (or colour) [23]. The chrominance coefficients of an image are
determined by a 2D grid that has blue to yellow on one axis, and red to green on another [22].
According to research the human eye is more sensitive to changes in the brightness (luminance) of
a pixel than to changes in its colour. This means that it is possible to remove a lot of colour
information from an image without losing a great deal of quality [17]. This fact is exploited by the
JPEG compression by down sampling the colour data to reduce the size of the file. The colour
components (U and V) are halved in horizontal and vertical directions, thus decreasing the file size
by a factor of 2.
• Phase Two: Conversion to the Frequency Domain
The next step is the actual transformation of the image. The DCT transforms [20] a signal from an
image representation into a frequency representation, by grouping the pixels into 8 × 8 pixel blocks
and transforming the pixel blocks into 64 DCT coefficients each [22]. A modification of a single
DCT coefficient will affect all 64 image pixels in that block.
Discrete cosine transformations (DCT) are used by the JPEG compression algorithm to transform
successive 8 x 8 pixel blocks of the image, into 64 DCT coefficients each [24]. Each DCT
coefficient F (u, v) of an 8 x 8 block of image pixels f(x, y) is given by:
Fሺu, vሻ =
1
4
CሺuሻCሺvሻ fሺx, yሻ ∗ cos
ሺ2x + 1ሻuπ
16
cos
ሺ2y + 1ሻvπ
16
୷ୀ
୶ୀ
ሺ1ሻ
7. Computer Science & Information Technology (CS & IT) 155
where Cሺuሻ = 1/√2 when u =0 and C(u)=1 otherwise.
Cሺvሻ = 1/√2 when v =0 and C(v)=1 otherwise.
• Phase Three: Quantization
Having the data in the frequency domain allows the algorithm to discard the least significant parts
of the image. The JPEG algorithm does this by dividing each cosine coefficient in the data matrix
by some predetermined constant, and then rounding up or down to the closest integer value [21].
The constant values that are used in the division may be arbitrary. The next step is the
quantization [17] phase of the compression. The aim is to quantize the values that represent the
image after transforming values to frequencies [22]. Quantization is the process of taking the 64
DCT coefficients and dividing them individually against a predetermined set of values and then
rounding the results to the nearest real number value [6, 18]. The human eye is fairly good at
spotting small differences in brightness over a relatively large area, but not so good as to
distinguish between different strengths in high frequency brightness [23]. This means that the
strength of higher frequencies can be diminished, without changing the appearance of the image.
JPEG does this by dividing all the values in a block by a quantization coefficient [22].
After calculating the coefficients, the following quantizing operation is performed:
F୕ሺu, vሻ = ඌ
Fሺu, vሻ
Qሺu, vሻ
ඐ ሺ2ሻ
where Q(u, v) is a 64-element quantization table.
After quantization the encrypted message bits are embedded into the DCT coefficients. DCT
coefficients transform a signal or image from the spatial domain to the frequency domain. DCT is
used in image steganography is broken into 8×8 blocks of pixels. Working from left to right, top
to bottom, the DCT is applied to each block [18]. Each block is compressed through quantization
table to scale the DCT coefficients and encrypted message is embedded in quantized DCT
coefficients. The selected coefficients after quantization are ordered by magnitude and then
modified by the corresponding bit in the message stream. The quantization step is lossy because
of the rounding error [22]. The quantized coefficients are then passed to the entropy encoding
step to form the compressed code.
• Phase Four: Entropy Coding
After quantization, zig-zag type motion is performed so that similar frequencies are grouped
together. Zigzag ordered encoding collects the high frequency quantized values into long strings
of zeros [21]. In zigzag small unimportant coefficients are rounded to 0 while larger ones lose
some of their precision [18]. To perform a zigzag encoding on a block, the algorithm starts at the
discrete cosine value and begins winding its way down the matrix. This converts an 8 x 8 table
into a 1 x 64 vector. The results are rounded to integer values and the coefficients are encoded
using Huffman coding to further reduce the size [17]. All of the values in each block are encoded
in this zigzag order except for the discrete cosine value. Huffman coding scans the data being
written and assigns fewer bits to frequently occurring data, and more bits to infrequently occurring
8. 156 Computer Science & Information Technology (CS & IT)
data [23]. Discrete cosine values use delta encoding, which means that each discrete cosine value
is compared to the previous value, in zigzag order. The size field for discrete cosine values is
included in the Huffman coding for the other size values, so that JPEG can achieve even higher
compression of the data.
Thus it is important to recognize that the JPEG compression algorithm is actually divided into
lossy and lossless stages [7]. The DCT and the quantization phase form part of the lossy stage,
while the Huffman encoding used to further compress the data is lossless. Steganography can take
place between these two stages [14].Using the same principles of insertion the encrypted message
can be embedded into DCT coefficients before applying the Huffman encoding [17]. By
embedding the information at this stage, in the transform domain, it is extremely difficult to detect,
since it is not in the visual domain [18]. Transform embedding in which a message is embedded by
modifying coefficients of the cover image (result is called the stego-image).Transform embedding
methods are found to be in general more robust than other embedding methods which are
susceptible to image-processing type of attacks [23].
4. EXPERIMENTAL ANALYSIS
In the proposed method we first encrypt the plaintext to generate the ciphertext using substitution
cipher method, and then the ciphertext is embedded inside the JPG image file using DCT
technique. The generated stego-image is sent over to the intended recipient. Once the recipient
receives the stego-image, the ciphertext is extracted from it by reversing the logic that was used
to embed it in the first place. The ciphertext is decrypted using the substitution cipher method to
get back the original plaintext. The messages were successfully embedded into the cover images.
a b
c d
9. Computer Science & Information Technology (CS & IT) 157
e f
Fig. 2. tulips (a) Original image (b) stego image winter (c) Original image (d) stego image,
sunset (e) Original image (f) stego image.
The messages were also extracted successfully. In the experiment it is observed that the human
visual system (HVS) cannot distinguish the cover-image and stego image [28] the complexity of
the image is not disturbed as shown in figure 2 (a) and (b), (c) and (d), (e) and (f). Distortion
analysis of stego images is carried out by studying distortion / similarity statistically. Distortion
between two different images is measured by considering Mean Square Error (MSE), and PSNR
(peak signal to noise ratio) [29].
Usually, the invisibility of the hidden message is measured in terms of the Peak Signal-to-Noise
Ratio [28]. To analyze the quality of the embedded texture image, with respect to the original, the
measure of PSNR has been employed [29]:
ܴܲܵܰ = 10 logଵ
255ଶ
ܧܵܯ
ሺ3ሻ
where mean square error (MSE) is a measure used to quantify the difference between the cover
image I and the stego (distorted) image I’ [28]. If the image has a size of M * N then
ܧܵܯ =
1
ܯ × ܰ
.
ெ
ୀଵ
ሾܫሺ݅, ݆ሻ − `ܫሺ݅, ݆ሻሿଶ
ே
ୀଵ
ሺ4ሻ
TABLE 1. MSE and PSNR values for the Original and Stego images
Cover
image
Stego
Image
No. of bytes embedded MSE
%
PSNR
(dB)
No. of bytes
extracted
tulips steg_tulips 2213 bytes 6.22 40.19 2213 bytes
winter steg_winter 1628 bytes 3.54 42.63 1628 bytes
sunset steg_sunset 1323 bytes 1.71 45.79 1323 bytes
10. 158 Computer Science & Information Technology (CS & IT)
Generally speaking, when the payload increases, the MSE will increase, and this will affect the
PSNR inversely [23]. So, from trade-off it was found that MSE decrease causes PSNR increase
and vice-versa. PSNR is often expressed on a logarithmic scale in decibels (dB). PSNR values
falling below 30 dB indicate a fairly low quality, i.e. distortion caused by embedding can be
obvious; however, a high quality stego-image should strive for 40 dB and above [28]. Our results
indicate that embedding process introduces less perceptual distortion and higher PSNR [29]. Note
that PSNR ranging from 40 dB to 45 dB means that the quality degradations could hardly be
perceived by a human eye.
5. CONCLUSION
The proposed technique has its place in secured data communication. In this paper an attempt has
been made to identify the requirements of a good data hiding algorithm. Hiding a message with
steganographic methods reduces the chance of a message being detected. Steganography is the
data hiding technique which comes under the assumption that if the feature is visible, the point of
attack is evident, thus the goal here is always to obscure the very existence of the embedded data.
Neither Steganography nor cryptography alone is a good solution for data secrecy from the
attacks. But if these methods are combined, the system may provide more security to the data. If a
message is encrypted and hidden with a steganographic method, it provides an additional layer of
protection and reduces the chance of the hidden message being detected. This combinational
methodology gives synergistic effect and will satisfy the requirements such as capacity, security
and robustness for secured data transmission over an open channel. This paper mainly focuses on
the development of a new system with extra security features where a meaningful piece of text
message can be hidden by combining techniques like Cryptography and Steganography. These
combined techniques can be propelled to the forefront of the current security techniques by the
remarkable growth in computational power, the increase in security awareness among the
individuals, groups, agencies, government organization and through intellectual pursuit. Here we
embed the confidential message into an image file in such a manner that the degradation in
quality of the carrier image is not noticeable. Thus the proposed method allows users to send data
through the network in a secured fashion. The steganography method may be further secured if
we compress the secret message first and then encrypt it and then finally embed inside in the
cover image.
ACKNOWLEDGEMENTS
One of the authors (Shamim Ahmed Laskar) gratefully acknowledges UGC for the granting
Research fellowship (Maulana Azad National Fellowship).
REFERENCES
[1] M. Conway, “ Code Wars: Steganography, Signals Intelligence, and Terrorism”, Knowledge
Technology & Policy, Volume 16, Number 2, pp. 45-62, Springer, 2003.
[2] R. J. Anderson and F. A. P. Petitcolas, “On The Limits of Steganography”, IEEE Journal of Selected
Areas in Communications, 16(4), pp.474-481, May 1998, ISSN 0733-8716.
[3] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding-A Survey”, Proceedings of
the IEEE, 87(7), pp.1062-1078, July 1999.
11. Computer Science & Information Technology (CS & IT) 159
[4] S. A. Laskar and K. Hemachandran, “An Analysis of Steganography and Steganalysis Techniques”,
Assam University Journal of Science and Technology, Vol.9, No.II, pp.83-103, January, 2012, ISSN:
0975-2773.
[5] C. Hosmer, “Discovering Hidden Evidence”, Taylor & Francis Group, Journal of Digital Forensic
Practice, Vol. No.1, pp.47–56, 2006.
[6] B. Li, J. He, J. Huang and Y. Q. Shi, “A Survey on Image Steganography and Steganalysis”, Journal
of Information Hiding and Multimedia Signal Processing, Vol. 2, No. 2, pp. 142-172, April, 2011,
ISSN 2073-4212.
[7] N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE, Computer, vol.
31, no. 2, pp. 26-34, Feb. 1998.
[8] A. J. Raphael and V. Sundaram, “Cryptography and Steganography – A Survey”, Int. J. Comp. Tech.
Appl., Vol 2 (3), pp. 626-630 , ISSN:2229-6093.
[9] S. Song, J. Zhang, X. Liao, J. Du and Q. Wen, “A Novel Secure Communication Protocol Combining
Steganography and Cryptography”, Elsevier Inc, Advanced in Control Engineering and Information
Science, Vol. 15, pp. 2767 – 2772, 2011.
[10] M. A. Fadhil, “A Novel Steganography-Cryptography System”, Proceedings of the World Congress
on Engineering and Computer Science 2010, USA, Vol. I, October, 2010, ISSN: 2078-0966.
[11] R. Anderson, “Cryptanalytic Properties of Short Substitution Ciphers”, Taylor & Francis,
Cryptologia, Vol. XIII, No. 1, pp. 61-72, January, 1989.
[12] G. J. Simmons, "Subliminal Channels: Past and Present," European Transactions on
Telecommunications, Vol. 4, No. 4, pp. 459-473, Aug 1994.
[13] R. S. Ramesh , G. Athithan and K. Thiruvengadam, “An Automated Approach to Solve Simple
Substitution Ciphers”, Taylor & Francis, Cryptologia, Vol. XVII, No. 2, pp. 202-218, April, 1993.
[14] E. Walia, P. Jain and Navdeep, “ An Analysis of LSB & DCT based Steganography”, Global Journal
of Computer Science and Technology, Vol. 10 Issue 1 (Ver 1.0), pp 4-8, April,2010.
[15] M. Kaur, S. Gupta, P. S. Sandhu and J. Kaur, “A Dynamic RGB Intensity Based Steganography
Scheme”, World Academy of Science, Engineering and Technology 67, pp 833-836, 2010.
[16] P. Khare, J. Singh and M. Tiwari, “Digital Image Steganography”, Journal of Engineering Research
and Studies, Vol. II, Issue III, pp. 101-104, July-September,2011, ISSN:0976-7916.
[17] A. B Watson, “Image Compression Using the Discrete Cosine Transform”, Mathematica Journal,
4(1), pp. 81-88, 1994.
[18] C-L Liu and S-R. Liao, “High-performance JPEG steganography using complementary embedding
strategy”, Elsevier Inc, Journal of Pattern Recognition Vol. 41, pp.2945 – 2955,2008.
[19] B. B. Zaidan, A. A. Zaidan, A.K. Al-Frajat and H.A. Jalab, “On the Differences between Hiding
Information and Cryptography Techniques: An Overview”, Journal of Applied Sciences, Vol.10,
No.15, pp.1650-1655, 2010.
[20] M. Kharrazi, H. T. Sencar and N. Memon, “Performance study of common image steganography and
steganalysis techniques”, Journal of Electronic Imaging, SPIE Proceedings Vol. 5681.15(4), 041104
(Oct–Dec 2006). SPIE and IS&T., 2006.
[21] B.J. Erickson, “Irreversible Compression of Medical Images”, Journal of Digital Imaging, Vol. 15,
No.1, pp. 5-14, March, 2002.
[22] A. B. Watson, “Perceptual Optimization of DCT Color Quantization Matrices”, Proceedings of the
IEEE International Conference on Image Processing, Austin, TX, Nov., 1994.
[23] X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization
algorithm”, Information Sciences 177 (15) (2007) 3099–31091.
[24] N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography”, IEEE Security and
Privacy1(3) pp. 32–44, 2003.
[25] S. Ravi and K. Knight, “Attacking Letter Substitution Ciphers with Integer Programming”, Taylor &
Francis, Cryptologia, Vol.33, No.4, pp.321-334, 2009.
[26] P. Kaijser, T. Parker, and D. Pinkas, "SESAME: The Solution to Security for Open Distributed
Systems," Journal of Computer Communications, Vol. 17, No. 4, pp. 501-518, Jul 1994.
[27] G.W. Hart, "To Decode Short Cryptograms," Communications of the ACM, Vol. 37, No. 9, pp. 102-
108, Sept 1994.
12. 160 Computer Science & Information Technology (CS & IT)
[28] B. E. Carvajal-Gámez , F. J. Gallegos-Funes and J. L. López-Bonilla, “ Scaling Factor for RGB
Images to Steganography Applications”, Journal of Vectorial Relativity, Vol.4, No.3 pp.55-65, 2009.
[29] G. Ulutas , M. Ulutas and V. Nabiyev, “Distortion free geometry based secret image sharing”,
Elsevier Inc, Procedia Computer Science, Vol.3, pp.721–726, 2011.
[30] W.F. Friedman, "Cryptology," Encyclopedia Britannica, Vol. 6, pp. 844-851, 1967.
[31] Atul Kahate, “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2008.
[32] R. C. Gonzalez and R. E. Woods, “Digital Image Processing”, 2nd edition, Prentice Hall, Inc, 2002.
Authors
Shamim Ahmed Laskar received his B.Sc. and M.Sc. degrees in Computer Science in
2006 and 2008 respectively from Assam University, Silchar, where he is currently doing
his Ph.D. His research interest includes Image Processing, Steganography, Information
Retrieval and Data Security.
Prof. K. Hemachandran is associated with the Department of Computer Science, Assam
University, Silchar, since 1998. He obtained his M.Sc. Degree from Sri Venkateswara
University, Tirupati and M.Tech and Ph.D Degrees from Indian School of Mines,
Dhanbad. His areas of research interest are Image Processing, Software Engineering
and Distributed Computing.