Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Lsb hiding using random approach for image watermarkingeSAT Journals
Abstract A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide protection for intellectual property from illegal copying. In this paper the method of nested digital image watermarking is used that means a watermark inside another watermark embedded into the cover image that is the main image. Here the Randomized LSB hiding algorithm is used for embedding one image into another as it has lesser complexity and the approach is more robust to the variations in the type of image. The blowfish algorithm is used to encrypt the watermark image before embedding into the cover image. The concept of encryption of watermark image before get embedded into the main image is used here to increase the security of the watermark image. This is because the research work is mainly focus on to get the more secured watermark by improving and enhancing the embedding capacity. Key Words: Digital image Watermarking, Randomized LSB, Blowfish, Copyright Protection
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
Abstract Today security is an important thing when we need to transmit data from one location to another safely. In this paper we are proposing an empirical model of secure data transmission technique with a hybrid approach of Cryptography, Stegnography and rotational analysis. In the initial phase, data is encrypted with DES algorithm with the help of Session key which is generated by the Diffie-Hellman Key exchange Algorithm. In the second phase Cipher Data is hidden into the cover image’s LSB to form the stego image, by considering security as the optimal security parameter. In the third phase, the Stego image is rotated with specific angle. At the receiver end, the image is de-rotated and the cipher information from the LSB is retrieved and the cipher information is decrypted with session key. This scheme achieves lossless recovery and is difficult to decrypt by the attackers. Keywords: Cryptography, Stegnography, Visual Cryptography, DES, Diffie-Hellman Algorithm, Session Key
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
"सबसे बड़ा खजाना अच्छी सेहत- डाइइटिशन शीला सहरावत
हर इंसान की चाहत होती है कि उसके जीवन में हर खुशी हो और कोई गम उसके आसपास न भटके। लेकिन जीवन में खुशियों को भरने के लिये स्वास्थ्य का खास स्थान है। आज के मार्डन समय में अनेक प्रकार के हैल्थ कल्ब खुल गए हैं जहां पर रोजाना औरतें और आदमी अपने आपको फिट रखने के लिये थोड़ी देर मेहनत करते हैं। लेकिन सिर्फ हैल्थ कल्ब जाने से ही स्वास्थ्य ठीक नहीं रहता। स्वास्थ्य ठीक रखने के लिये हमे भोजन पर भी ध्यान देना चाहिए। भोजन ऐसा होना चाहिए जो स्वास्थय की नजर से खास हो। इसके अलावा रोजाना व्यायाम, तनावरहित मानसिक स्थिति और 6 से 8 घंटे की पूरी नींद लेना जरूरी है।
हमारे पुराने ग्रन्थों मे लिखा है कि सन्तुलित और अच्छा भोजन, अच्छी दिमागी हालत और पूरी नींद ही व्यक्ति की उम्र को बढ़ाते हैं। स्वास्थ्य का मतलब है कि पूरे शरीर में कोई रोग न हो। इसके साथ ही मन भी खुश होना चाहिए, तभी आपका शरीर और ज्यादा सुन्दर लगेगा।
बीमार पड़ने से अच्छा है कि हमेशा अपने स्वास्थ्य के प्रति सचेत रहें। स्वस्थ रहना भी एक कला है। जो पूरी तरह से स्वस्थ है वही जानते हैं कि उन्होने कितना बड़ा खजाना इकट्ठा किया है। हर इंसान को हमेशा अपने स्वास्थ्य के प्रति गम्भीर रहना चाहिए। बहुत से लोग रात को काफी देर तक टी.वी. देखने की वजह से सुबह जल्दी नहीं उठ पाते जिसकी वजह से वह व्यायाम भी नहीं करते हैं। इसके कारण जाने-अनजाने में बहुत से रोग उनके शरीर में बस जाते हैं।
सावधानी-
रोजाना रात को सही समय पर सोने की और सुबह जल्दी उठकर व्यायाम करने की आदत डालनी चाहिए। जिन लोगों का स्वास्थ्य ठीक रहता है वे लोग हर काम को ज्यादा उत्साह से करते हैं। इसके विपरीत जिनका स्वास्थ्य ठीक नहीं रहता है वे लोग पूरे दिन सुस्त से बने रहते हैं। हमारा जीवन बहुत ही कीमती है
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
Designing low cost and high speed authentication
solution for digital images is always an attractive area of
research in image processing. In past few years because of
widespread use of internet and network technology, concept
of information distribution has been become habit rather than
exception in daily life. In same aspects challenges involved
with distribution of authenticate information has been
increased manifolds. In this paper a generalize image
authentication method has proposed by hybridization of color
histogram and associated first four statistical moments to
achieve the objectives of low cost and high speed. Proposed
method can apply for both gray and color images having any
size and any format. Solution generates a very small
authentication code with an ease means which is use to analyze
the characteristics of received image from tampering
perspective.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
Abstract Today security is an important thing when we need to transmit data from one location to another safely. In this paper we are proposing an empirical model of secure data transmission technique with a hybrid approach of Cryptography, Stegnography and rotational analysis. In the initial phase, data is encrypted with DES algorithm with the help of Session key which is generated by the Diffie-Hellman Key exchange Algorithm. In the second phase Cipher Data is hidden into the cover image’s LSB to form the stego image, by considering security as the optimal security parameter. In the third phase, the Stego image is rotated with specific angle. At the receiver end, the image is de-rotated and the cipher information from the LSB is retrieved and the cipher information is decrypted with session key. This scheme achieves lossless recovery and is difficult to decrypt by the attackers. Keywords: Cryptography, Stegnography, Visual Cryptography, DES, Diffie-Hellman Algorithm, Session Key
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
A Hybrid Digital Watermarking Approach Using Wavelets and LSB IJECEIAES
The present paper proposed a novel approach called Wavelet based Least Significant Bit Watermarking (WLSBWM) for high authentication, security and copyright protection. Alphabet Pattern (AP) approach is used to generate shuffled image in the first stage and Pell’s Cat Map (PCM) is used for providing more security and strong protection from attacks. PCM applied on each 5×5 sub images. A wavelet concept is used to reduce the dimensionality of the image until it equals to the size of the watermark image. Discrete Cosign Transform is applied in the first stage; later N level Discrete Wavelet Transform (DWT) is applied for reducing up to the size of the watermark image. The water mark image is inserted in LH Sub band of the wavelet image using LSB concept. Simulation results show that the proposed technique produces better PSNR and similarity measure. The experimental results indicate that the present approach is more reliable and secure efficient. The robustness of the proposed scheme is evaluated against various image-processing attacks.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
"सबसे बड़ा खजाना अच्छी सेहत- डाइइटिशन शीला सहरावत
हर इंसान की चाहत होती है कि उसके जीवन में हर खुशी हो और कोई गम उसके आसपास न भटके। लेकिन जीवन में खुशियों को भरने के लिये स्वास्थ्य का खास स्थान है। आज के मार्डन समय में अनेक प्रकार के हैल्थ कल्ब खुल गए हैं जहां पर रोजाना औरतें और आदमी अपने आपको फिट रखने के लिये थोड़ी देर मेहनत करते हैं। लेकिन सिर्फ हैल्थ कल्ब जाने से ही स्वास्थ्य ठीक नहीं रहता। स्वास्थ्य ठीक रखने के लिये हमे भोजन पर भी ध्यान देना चाहिए। भोजन ऐसा होना चाहिए जो स्वास्थय की नजर से खास हो। इसके अलावा रोजाना व्यायाम, तनावरहित मानसिक स्थिति और 6 से 8 घंटे की पूरी नींद लेना जरूरी है।
हमारे पुराने ग्रन्थों मे लिखा है कि सन्तुलित और अच्छा भोजन, अच्छी दिमागी हालत और पूरी नींद ही व्यक्ति की उम्र को बढ़ाते हैं। स्वास्थ्य का मतलब है कि पूरे शरीर में कोई रोग न हो। इसके साथ ही मन भी खुश होना चाहिए, तभी आपका शरीर और ज्यादा सुन्दर लगेगा।
बीमार पड़ने से अच्छा है कि हमेशा अपने स्वास्थ्य के प्रति सचेत रहें। स्वस्थ रहना भी एक कला है। जो पूरी तरह से स्वस्थ है वही जानते हैं कि उन्होने कितना बड़ा खजाना इकट्ठा किया है। हर इंसान को हमेशा अपने स्वास्थ्य के प्रति गम्भीर रहना चाहिए। बहुत से लोग रात को काफी देर तक टी.वी. देखने की वजह से सुबह जल्दी नहीं उठ पाते जिसकी वजह से वह व्यायाम भी नहीं करते हैं। इसके कारण जाने-अनजाने में बहुत से रोग उनके शरीर में बस जाते हैं।
सावधानी-
रोजाना रात को सही समय पर सोने की और सुबह जल्दी उठकर व्यायाम करने की आदत डालनी चाहिए। जिन लोगों का स्वास्थ्य ठीक रहता है वे लोग हर काम को ज्यादा उत्साह से करते हैं। इसके विपरीत जिनका स्वास्थ्य ठीक नहीं रहता है वे लोग पूरे दिन सुस्त से बने रहते हैं। हमारा जीवन बहुत ही कीमती है
For Complete Learning: http://www.thelearnet.com/
Overview
Multithreading Models
Threading Issues
Pthreads
Solaris 2 Threads
Windows 2000 Threads
Linux Threads
Java Threads
A Hybrid Model of Watermarking Scheme for Color Image Authentication Using Di...iosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Effective Semantic Encrypted Relational Data Using K-Nn ModelClaraZara1
Data exchange and data publishing are becoming an important part of business and academic practices. Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be provided for the ownership of shared data, without revealing its usage under a wide range of machine learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object remain unaltered. The algorithms preserve the both right protection and utility preservation. The right protection scheme is based on watermarking. Watermarking methodology preserves the distance relationships.
Quality - Security Uncompromised and Plausible Watermarking for Patent Infrin...CSCJournals
The most quoted applications for digital watermarking is in the context of copyright-protection of digital (multi-)media. In this paper we offer a new digital watermarking technique, which pledges both Security and Quality for the image for the Patent protection. This methodology uses tale techniques like Shuffling, Composition & Decomposition, and Encryption & Decryption to record the information of a protected primary image and the allied watermarks. The quadtree can aid the processing of watermark and AES provides added security to information. Besides that, we intend a novel architecture for Patent Protection that holds promise for a better compromise between practicality and security for emerging digital rights management application. Security solutions must seize a suspicious version of the application-dependent restrictions and competing objectives.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
The astonishing developments have been occurring in the field of network communications for a long time and
these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web.
The web is not secure for the exchange of dependable data, for example, content, picture and video.
Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography,
for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt
decreased security for information protection. With a specific end goal to enhance the security, it is important to
expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption
methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based
encryption has its own significance in providing security for secret information i.e. data confidentiality than
conventional.
Image Authentication Using Digital Watermarkingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Similar to Comparative Study on Watermarking & Image Encryption for Secure Communication (20)
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Biometrics Authentication Using Raspberry PiIJTET Journal
Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time
applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem.
This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management
using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were
entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the
fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the
database (postgresql) to show the capability of this model.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Comparative Study on Watermarking & Image Encryption for Secure Communication
1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
1
Comparative Study on Watermarking & Image
Encryption for Secure Communication
Ajna Madanan1
1
AnnaUniversity, ECE,
ajna.madanan@gmail.com
Dr. S. Poornachandra2
2
Anna University, ECE
dean.iqac.snsce@gmail.com
Abstract—Over the past decades, research in security has concentrated on the development of algorithms and protocols for
authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In
this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low
sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with
low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the
coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet
domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a
high level of security.
Index Terms— Security, wavelets, watermarking, encryption, intruder.
—————————— ——————————
1 INTRODUCTION
xplosive growth in multimedia technology and its applications
has escalated the necessity to build secure methods for legal
distribution of the digital content. Presently need for protection
against unauthorized copying and distribution has increased. Thus,
there aroused apprehensions over copyright protection of digital
contents. The solution to this problem is digital watermarking, which
is the most common and possibly the strongest technique for
protecting digital data. Cryptography ensures that the messages are
secure from possible ―attacks‖, which are impersonation,
eavesdropping etc.
Watermarking is a method of data embedding and information
hiding. In digital watermarking, patterns of bits are inserted into a
digital image, video or audio file that helps in identifying the
copyright information, i.e. author, rights etc. It is a concept closely
related to steganography. Watermarking is considered as a special
technique of steganography where one message is embedded in
another and the two messages are related to each other in some way.
In digital watermarking a low energy signal is imperceptibly
embedded into another signal. The low-energy signal is known as
watermark. The main signal in which the watermark is embedded is
referred to as cover signal since it covers the watermark. The entity
known as watermark key is used for embedding and detecting
watermark signal.
In image watermarking, information is embedded into cover
media for proving ownership identification. Various watermarking
techniques have been proposed by many authors in the last several
years, which include spatial domain and transform domain
watermarking.
To provide security of the images in the multimedia environment,
encryption plays an important role. Image encryption ensures
confidential transmission and storage of image over internet. Image
encryption has applications in multimedia systems, internet
communication, telemedicine, medical imaging, and military
communication to name a few.
Steganography and cryptographic methods are used together with
wavelets to increase the security of the data while transmitting
through networks. A combination of both encryption with
steganography allows better private communication. The goal of
steganography is to avoid drawing suspicion to the transmission of
the secret message.
In this paper RSA algorithm is being used for encryption. The
RSA encryption technique is being named after the inventors Ron
Rivest, Adi Shamir, and Len Adleman in 1977. RSA is a public-key
cryptography system. This algorithm is based on the difficulty of
factorizing large numbers that have two and only two factors (prime
numbers). It works on a public key system. Everyone would know
the public key. Using public key a user can encrypt data, but cannot
decrypt it. The person who possesses the private key can only
decrypt it. Theoretically, it may be possible, but it is extremely
difficult to generate the private key from the public key; this makes
the RSA algorithm a very popular choice in data encryption.
E
————————————————
Ajna Madanan is currently pursuing masters degree program in electronics
and communication engineering in Anna University, India, PH-
8220829679. E-mail: ajna.madanan@gmail.com
V.J. Subashini is currently Associate Professor in Computer Applications in
AnnaUniversity, India, PH-9444057965. E-mail: vjsubashini@yahoo.com
Dr.S. Poornachandra is currently the dean /IQAC in electronics and
communication engineering in Anna University, India, PH-8643844943. E-
mail: dean.iqac.snsce@gmail.com
2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
2
2 RELATED WORK
Wavelet based image watermarking is gaining more popularity
because of its resemblance to the human visual system. In the
wavelet-based perceptual watermark masking proposed by Khalil
Zebbiche and FouadKhelifi [1], the perceptual masking model takes
into consideration local brightness, band sensitivity and texture
masking to compute a weight for each DWT coefficient of the
fingerprint image. Thus, the perceptual model consists of a spatial
frequency sensitivity function and two masking components based
on local brightness and texture masking. The watermarking scheme
yields a better robustness (i.e. lower BER). The bit error ratio or bit
error rate (BER) is the number of bit errors divided by the total
number of transferring bits during a time interval.
M. Barni [2] have developed an improved wavelet-based
watermarking through pixel-wise masking. It is mainly based on
masking the watermark according to characteristics of Human Visual
System (HVS). The watermark is being adaptively added to the
largest detail bands. The watermark weighing function is calculated
as a simple product of data extracted from HVS model. The
watermark is being detected by correlation. Victor [3] have
developed an algorithm that relies upon adaptive image
watermarking in high resolution sub-bands of DWT.
N. Kaewkamnerd and K.R. Rao [4] developed a wavelet based
image adaptive watermarking scheme. Embedding is performed at
higher level sub-bands of wavelet transform, even though this may
clearly change the image fidelity. Bo Chen and Hang Shen [5] have
developed a new robust fragile double image watermarking
algorithm using improved pixel-wise masking model and a new bit
substitution based on pseudo-random sequence. The method embeds
robust and fragile watermark into the insensitive part and sensitive
part of wavelet coefficients making two watermarks non-interfering.
Peng Liu and Zhizhong Ding [6] proposed a blind image
watermarking scheme based on wavelet tree quantization. Here
largest two coefficients are selected as significant coefficients and
the difference between them is taken as significant difference.
Watermark bits are embedded by comparing the significant
difference with an average significant difference value and maximum
difference coefficients are quantized.
Mohammad. A. B. Younes [7] introduced a block-based
transformation algorithm based on the combination of image
transformation and a well-known encryption and decryption
algorithm called Blowfish. The original image is being divided into
blocks that are then rearranged into a transformed image using a
transformation algorithm, and then the transformed image is
encrypted using the Blowfish algorithm. The results show that the
correlation between image elements was significantly decreased by
using this technique. The results also showed that increasing the
number of blocks by using smaller block sizes resulted in a lower
correlation and higher entropy.
The researches and applications of applying digital watermarking
to Geo-information data are still very inadequate. Watermarking
techniques that are developed for multimedia data cannot be directly
applied to the satellite images because here the analytic integrity of
the data, rather than the perceptual quality, is of primary importance.
Also satellite images have higher requirements in content security. It
desires not only watermarking for copyright protection, but also
encryption during storage and transmission for preventing
information leakage. As the demand to protect the sensitive and
valuable data from satellites has increased, a new method for satellite
image security by combining DWT-DCT watermarking and AES
encryption has been implemented [8].
To improve performance, discrete wavelet transform (DWT) has
been combined with another equally powerful transform which is
discrete cosine transform (DCT). The combined DWT-DCT
watermarking algorithm’s imperceptibility was better than the
performance of the DWT approach. For watermarking, the preferred
color model must be HSV (Hue, Saturation and Value) rather than
RGB because it is the most closely related color model with Human
Visual System [9]. Salt and pepper noise of input color satellite
image can be removed by using Modified decision based
unsymmetrical trimmed median filter (MDBUTMF) algorithm.
Prashant Shinde and Chetan Mohol [10] have proposed
application for Android OS that permits to add an invisible or visible
watermarking into an image of the current designations.
3 PROPOSED SYSTEM
Here encryption is performed in wavelet domain so that the
probability of an intruder trying to access the contents is very much
minimized. Encryption is being provided after watermarking so that
security level can be increased.
3.1 Transmission Section
Fig. 1. Extracted watermark using Haar wavelet
Here the original image and watermark are being converted to
wavelet coefficients using Haar transform. The coefficients of the
watermark are added with the coefficients of the original image to
get the watermarked image. During the embedding process, the
watermark coefficients are being embedded into the highest value
wavelet coefficient of the original image. Here for the encryption,
RSA algorithm is being used. While encrypting, keys are also used
along with user-typed message which is being converted to wavelet
coefficients. After encryption they are being transmitted. This is
being shown in Fig. 1. Encryption is being provided after
watermarking so that security level can be increased.
3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
3
3.2 Receiver Section
Fig. 2. Extracted watermark using Haar wavelet
After the reception, the user-typed message would be converted
to wavelet coefficients and then it would be used for decryption
along with the keys. By applying inverse DWT, the image and
watermark image would be returned. The watermark is removed at
the receiving end with the help of the key and the original image.
This process is called watermark extraction. In the present model,
only threshold is being considered. This is being shown in Fig. 2.
4 RESULT ANALYSIS
Performance metrics used here are Mean Square Error and Peak
Signal-to-Noise Ratio and visual comparison which are done through
correlation. Mean Square Error (MSE) allows comparing the ―true‖
pixel values of the original image to the degraded image. MSE
represents the average of the squares of the "errors" between actual
image and noisy image. Errors are the amount by which the values of
the original image differ from the degraded image. MSE can be
found using the equation:
(1)
The notations used are listed below.
𝑋 (𝑖, 𝑗): Original image,
𝑋′ (𝑖, 𝑗): Watermarked image, and
Nt : Size of image
Peak Signal-to-Noise Ratio(PSNR) is an expression for finding
the ratio between the maximum possible value (power) of a signal
and the power of distorting noise that affects the quality of its
representation. As many signals have a very wide dynamic range
(ratio between the largest and smallest possible values of a
changeable quantity), PSNR is frequently expressed in terms of the
logarithmic decibel scale. PSNR can be found using the equation:
(2)
Here Matlab is being used as the simulation software. On applying
different wavelets such as Haar, Daubechies, Coiflet, Symlet on Fig.
3, various values of MSE and PSNR are as follows:
TABLE I
MSE AND PSNR VALUES USING HAAR WAVELET
Haar Wavelet
MSE PSNR
124.2513 27.1878
Fig. 3. Extracted watermark using Haar wavelet
In Table I and II, it can be seen that Haar wavelet and db 1
(Daubechies wavelet) produces the same PSNR and MSE values.
From Fig. 3 and 4(a), it is seen that watermark extracted are as same
as the original one. In Daubechies daughter wavelets, i.e. from DB 2
to DB 10 in Fig. 4, it is seen that spots are being introduced in the
extracted watermark and also the left side is being distorted.
TABLE II
MSE AND PSNR VALUES USING DAUBECHIES WAVELET
Daubechies Wavelet
Daughter Wavelets MSE PSNR
DB 1 124.2513 27.1878
DB 2 123.0029 27.2316
DB 3 121.3821 27.2893
DB 4 119.5124 27.3567
DB 5 117.6615 27.4245
DB 6 116.3122 27.4745
DB 7 114.9985 27.5239
DB 8 113.5129 27.5803
DB 9 111.6682 27.6515
DB 10 110.1306 27.7117
(a) (b) (c) (d) (e)
(f) (g) (h) (i) (j)
Fig. 4. Extracted watermark using Daubechies daughter wavelet i.e. from
DB 1 to DB 10.
4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
4
Table III
MSE and PSNR values using Symlet wavelet
Symlet Wavelet
Daughter Wavelets MSE PSNR
SYM 2 123.0029 27.2316
SYM 3 121.3821 27.2893
SYM 4 111.4139 27.6614
SYM 5 108.2783 27.7854
SYM 6 104.9880 27.9194
SYM 7 105.9100 27.8814
SYM 8 098.0600 28.2159
(a) (b) (c) (d) (e)
(f) (g)
Fig. 5. Extracted watermark using Symlet daughter wavelet i.e. from SYM
2 to SYM 8.
Similarly, in Symlet daughter wavelets, i.e. from SYM 2 to SYM
8, it is seen that spots are being introduced and its intensity increases
in the increasing order of Symlet daughter wavelets. Also the left
side is being distorted and it increases more while reaching SYM 8.
This can be seen in Fig. 5.
Table IV
MSE and PSNR values using Coiflet wavelet
Coiflet Wavelet
Daughter Wavelets MSE PSNR
COIF 1 117.6857 27.4236
COIF 2 109.5243 27.7357
COIF 3 102.0552 28.0425
COIF 4 095.2216 28.3434
COIF 5 087.2121 28.7250
(a) (b) (c) (d) (e)
Fig. 6. Extracted watermark using Coiflet daughter wavelet i.e. from COIF
1 to COIF 5
Similarly from Table III and IV it is seen that degradation of
image quality increases as one goes down. Degradation in Coiflet is
more when compared to Symlet wavelet as seen in Fig. 6. Therefore,
from the above analysis, it is being concluded that Haar wavelet and
DB 1 of Daubechies wavelet produces better results by comparing
extracted watermark with the original image.
5 CONCLUSION
This paper introduces a model that provides a high level of
security by using both watermarking and encryption in the wavelet
domain. Due to this the probability of an intruder’s access to the
contents is very much minimized.
Fig. 7. Images a) Original Image b) Watermark Image c) Watermarked
Image d) Extracted watermark
Here watermarking has been implemented using both grayscale
and color images and watermark was extracted successfully. Fig. 7
shows the original image, watermark, watermarked image and the
extracted watermark. By comparing the original watermark image
and the extracted watermark images, it is seen that Haar wavelet
produced better results.
ACKNOWLEDGMENT
I extend my heart-felt thanks to my Project Guide, Dr. S.
Poornachandra, Dean, IQAC, for his remarkable guidance,
encouragement, valuable suggestions and support for the completion
of this Project. I take immense pleasure in expressing my humble
note of gratitude to, Dr. Karthikeyan V.V., Head of Department for
giving the permission to carry my project in the department. I am
highly grateful to our PG Project Coordinator Dr. G.K.D.
PrasannaVenkatesan, for his valuable suggestions throughout the
course of this project. I record my indebtedness to our Principal Dr.
N. Gunasekaran, for his guidance and sustained encouragement for
the completion of the project. I also extend my thanks to Mrs. V.J.
Subashini, Senior Assistant Professor, Jerusalem College of
Engineering, Chennai, for her remarkable guidance, encouragement,
valuable suggestions and support for the completion of this Project. I
also extend my thanks to Faculty members, my parents, and friends
for providing their guidance and moral support in successfully
completing the Project.
5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 1 – MAY 2015 - ISSN: 2349 - 9303
5
REFERENCES
[1] Khalil Zebbiche and FouadKhelifi, ―Efficient wavelet-based
perceptual watermark masking for robust fingerprint image
watermarking‖, IET Image Process, Vol. 8, Iss. 1, pp. 23–32 doi:
10.1049/iet-ipr.2013.0055, 2014.
[2] Barni M, Bartolini F, Piva, ―An Improved Wavelet Based
Watermarking Through Pixelwise Masking‖, IEEE transactions on
image processing, Vol. 10, 2001 pp.783-791.
[3] Victor V., Guzman, Meana, ―Analysis of a Wavelet-based
Watermarking Algorithm‖, IEEE Proceedings of the International
Conference on Electronics, Communications and Computer, 2004,
pp. 283-287.
[4] N. Kaewkamnerd and K.R. Rao, ―Wavelet Based Image Adaptive
Watermarking Scheme‖, IEEE Electronic Letters, Vol. 36,Feb.
2000, pp.312-313.
[5] Bo Chen, Hong Shen, ―A New Robust-Fragile Double Image
Watermarking Algorithm‖, Third IEEE International Conference on
Multimedia and Ubiquitous Engineering,2009, pp. 153-157
[6] Peng Liu, Zhizhong Ding, ―A Blind Image Watermarking Scheme
Based on Wavelet tree Quantization‖, Second IEEE International
Symposium on Electronic Commerce and Security, 2009, pp. 218-
222.
[7] Mohammad Ali BaniYounes and AmanJantan, ―Image Encryption
Using Block-Based Transformation Algorithm‖, IAENG
International Journal of Computer Science, 35:1, IJCS_35_1_03,
2008.
[8] Naida.H.Nazmudeen, Farsana.F.J., ―A New Method for Satellite
Image Security Using DWT-DCT Watermarking and AES
Encryption‖, IJIRSET,Volume 3, Special Issue 5, July 2014
[9] Rawan I. Zaghloul, Enas F. Al-Rawashdeh, ―HSV Image
Watermarking Scheme Based on Visual Cryptography‖, World
Academy of Science, Engineering and Technology Vol:20 2008-08-
23
[10] Prashant Shinde and Chetan Mohol, ―Copyright Protection for
Images on Android Phones‖, IJRET, Volume: 02, Issue: 11, Nov-
2013