SlideShare a Scribd company logo
1 of 12
Download to read offline
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Design and Implementationproposedencryption and HidingSecure
Image Inan Image
Asst. Prof. Dr.Bahejak.Shukur, Alaaldeen Abbas Abdulhassan, Mohammed
Hussein Jawad
Computer Technology /network department, Babylon University, Iraq

Abstract
Steganographyand cryptography are two general methods of transfer vital information in a top-secret method. When
we hide the secure image the malicious want to distort this secure image itself. Therefore, the cryptography
techniques used must be one of the most powerful techniques.Also cryptography and Steganography are the two
major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as
in steganography the secret message is embedded into the cover medium.This paper presentshybrid method of
cryptography which combined two nonlinear feedbacks register in one non-linear function to produce a strong
cryptography technique. The cryptography method is working on the image resulted from the DWT which, used
the orthogonal filter.In steganography part we have used most significant method to hide the secret true image into
true image. To evaluate our system number of measurements used such as Mean Square Error, Normalized Cross
Correlation, Average Difference, Structural Content,peak signal to noise ratio (PSNR)have been computed between
the cover and stego image.Finally histogram plot of cover image, stego image, secret ciphered images have been
plotted.
Keyword: steganography, cryptography, orthogonal filter, cipher, decipher.
substitute redundant partsof a cover with a secret
message is called Substitutionsystems;but embedding
I. Introduction
the secret information in a transform space of the signal
The science of hiding data by embedding
(e.g., in the frequency domain) is called transform
information into cover meansis called a Steganography,
methods; and in spread spectrum methodsimplemented
which is supplementcryptography not replace itin
the concepts of spread spectrum communication;
security. To provide another layer of protection the
Byexploiting several statistical properties of acover and
hidden message is encrypted, which it must be
use hypothesis testing in the extraction process the
decrypted
if
discovered.Thescience
thatstudies
statistical methods encode data invented; also in the
mathematical techniques for keeping message secure
distortion methodsthe data storing by signal distortion
and free from attacks called the cryptography [1],
and the deviation from the original cover measured in
[2].Whereas the science for hiding communication
the decoding step; finally the cover generation methods
called a steganography [3].Which, involves hiding
,which created the encode of the data in the cover for
information that appears no information is hidden in it
secret communication .
at all.
In this study we apply the discrete wavelet
Cryptography and Steganography achieve the same
transform on the secret first then embedding the LL
goal via different means. Encryption encodes the data
level resulted from this stage in the cover image.
so that an unintended recipient cannot determine its
Similar to cryptanalysis which applied in the
intended meaning. Steganography, in contrast attempts
cryptography, the steganography deals with hiding
to prevent an unintended recipient from suspecting that
thedata in some cover source. Whereas the steganalysis
the data is there. [4].Combining encryption with
is the science of detecting messages hidden using
steganography allows for a better private
steganography, which identify suspected packages, to
communication. The goal of steganography is to avoid
determine whether or not they have a payload encoded
drawing suspicion to the transmission of the secret
into them, and, if possible, recover that payload. [5]
message.
There are number of methods in
steganographic systems,which can beclassifyaccording
to the type of covers used for secret communication.
Which they:The systems which

www.ijera.com

644|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

www.ijera.com

II. The structure of the suggested system:

……………………………………………………………...........................................

Figure (1)the design of the suggested system
Steps for hiding the encoding image are,
1. Use Discrete Wavelet Transform.
2. Apply proposed encryption algorithm on the LL
band resulted from step 1by making xor operation
between it with the bytes of the LL band.
3. Use LSB replacement to hidden the resulting secret
encryption image.
4. Store the stegoresulting image which contains the
encryption secret information.

www.ijera.com

5.

to evaluate the result number of performance
measurements used .

Steps for extracting and decoding of hidden image are,
1. Extract the embedding secret encryption image
using the extracting LSB algorithm.
2. Apply the decryption proposed algorithm to extract
the origin secure image by making xor operation
between the key and encryption image.

645|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655
3.
4.

Take the Inverse Discrete Transform to the resulted
image from step 2.
Then extract secret image and cover image.

2.1Discrete Wavelet Transform (DWT)
The DWT is a system, which involved two
filters, one is the “wavelet filter”, and the other is the
“scaling filter”. The wavelet filter is a high pass filter,
while the scaling filter is a low pass filter. DWT
includes many kinds of transforms, such as Haar
wavelet, Daubechies wavelet, and others. Our study
utilizes the orthogonal wavelet.
After applying a 1- level DWT on an image,
we get the approximation subband LL, the horizontal
subband LH, the vertical subband HL, andthe diagonal
subband HH. .
An advantage of DWT over other transforms
is it allows good localization both in time and spatial
frequency domain.Because of their inherent multiresolution nature, wavelet coding schemes are
especially suitable for applications where scalability
and tolerable degradation are important. Applying
IDWT to LL, HL, LH, and HH, we can get four
different frequency's images that are low frequency
image,
middle-lowfrequencyimage,
middle-high
frequency image, high frequency image separately [6].
The main steps of DWT are:First, the row and column
convolution with scaling filters (Low-Pass Filters) and
wavelet filters (High-Pass Filters)
1. Convolve the lowpass filters with rows of image
file and save the result.
2. Convolve the lowpass filters with the columns (of
the result from step 1) to obtain the Low passLowpass (LL) subimage.
3. Convolve the result from step 1 (the lowpass
filtered rows) with the highpass filter on the
column, to produce the Low pass-High pass (LH)
Subimage.
4. Convolve the original image with the Highpass
filters on the rows and save the result.
5. Convolve the result from step 4 with the lowpass
filtered on the columns to yield the Highpass_
Lowpass (HL) Subimage.
6. To obtain the Highpass_Highpass (HH) subimage,
convolve the columns of the result from step 4 with
Highpass filter.
Secondly,
the
(Down
Sampler)are
implemented by choosing only the odd or even
locations of the sub-bands.
2.2 Inverse Discrete Wavelet Transform
The inverse wavelet transform performed by
enlarging the wavelet transform data to its original size.
Insert zeros between each two values horizontally and
vertically, then convolve the corresponding (lowpass
and highpass) inverse filters to each of the four sub
www.ijera.com

www.ijera.com

images, and sum the results to obtain the original image
[7].
1. Upsample the rows for each Sub-band (LL, LH,
HL, and HH) by inserting zero between every two
samples.
2. Convolve the rows result from step1 with low and
high pass filter, where the sub-bands (LL, LH) with
low pass filter and (HL, HH) with the high pass
filter.
3. Upsample the columns for the result from step2 by
inserting zero between every two samples.
4. Convolve the result from step 3 with low pass and
high pass filters, where the sub-bands (LL, HL)
with the low pass filter and (LH, HH) with high
pass filters.
5. Add the results from step 3 with the result from
step 4 and save the result.
2.3Least Significant Bit (LSB)
Least Significant Bit (LSB) insertion is a
common, simple approach to embedding information in
a cover image. The least significant bit of some of all of
the bits inside an image is changed to a bit of a secret
message. When using 24-bit image, a bit of each of the
red, green and blue color components can be used,
since they are each represented by a bit So it is possible
to embed three bits in each pixel [8].
Algorithm of LSB Based Steganography:
Algorithm to embed secret imagein cover image
Step 1: Read the cover image &secretLL encryption
image, which is to be hidden in the cover image.
Step 2: Convert secret image into binary.
Step 3: Calculate LSB of each pixel of cover image.
Step 4: Replace LSB of cover image with each bit of
secretLL encryption image one by one.
Step 5: Write stego image.
Algorithm to retrieve secret message using cover image
Step 1: Read the stego image.
Step 2: Calculate LSB of each pixel of stego image.
Step 3: Retrieve bits & convert each 8 bit into byte of
secretLL encryption imagefor each band (Red, Green,
and Blue).
Step 4: Reconstruct the cover image.
2.4 Encryption method:
The first method:
. A combination of three LFSRs:
. If a1, a2 and a3 are the outputs of three LFSRs, the
output of the generator can be calculated by the
following equation:
+
b1= (a1^a2) (¬a1)
^a3)
If the LFSRs have lengths n1, n2 and
n3respectively then the linear complexity of the
generator is:
646|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655
(n1+1) n2+n1n3

www.ijera.com

In this study we combined the result of two
methods in one in nonlinear function to produce more
robustmethod.

The second method:
Consist of three LFSRs:
.19 bits
.x19+x5+x2+x+1
.clock bit 8.
.tapped bits: 13,16,17,18
.22 bits
. X22+x+1
.Clock bit 10.
.tapped bits 20, 21.
.23 bits
.x23+x15+x2+x+1
.clock bit 10.
.tapped bits 7,20,21,22

III. Performance Metrics
For data hiding, the main objectives are that
the embedded data must be invisible to the observer,
and it should have maximum load possible. It is
difficult to quantify how invisible embedded data,for
this reason number of statistical metrics have been used
to show the difference between the cover and stego
image such as Average Distance (AD) , Structure
Content (SC),Normalized Cross-Correlation (Nk) and
Normal Mean Square Error (MSE),peak signal to noise
ratio (PSNR).
Let the cover’s pixels be represented as C(i,j)
and the stego image pixels as S(i ,j) for fixed image size
of M x N. Then the following equations can be
represented as follow:

PSNR= ((M*N)*10*LOG (255^2))/MSE

IV. The implementation of the suggested
system
In the suggested system
 We used orthogonal DWT transform on the true
color image first to reduce the size of the secret
image, which we needed to transfer it over the
communication channel.
 Scrambled the resulted above image using
suggested encryption method by making xor
operation between the byte of the LL secret image
and the bits resulted from this method.
 Preparing the cover image, which used for hiding
the resulted scrambled secret image then the
stegoimage resulted.

www.ijera.com

In the extracted stage:
 Take the stego image and reconstructed the hidden
scrambled secret image.
 Decipheringthe hidden secret image by making xor
operation between the byte of scrambled secret
image and the bits of suggested encryption method.
 Applythe IDWT on the resulted secret image to
reconstruct it to the original size of the secure
image.
 Extract the cover image and the secret image.
All of the above stage can be seen briefly in
the tables from (1) to (5) ,where the first table explain
the implementation of the DWT on the secure true
image then apply the suggested encryption algorithm
for ciphering and deciphering, whereas the second
647|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655
tableshow the affected of the encryption process on the
image as show in the histogram, while the third table
show the application of the steganography algorithm on
the cover and cipher true image and the reconstruction

www.ijera.com

process, in table (4) show the histogram of the cover
and stego image, finally in table (5) described the
implementation of the performance metrics on the
cover and stego image :

Table (1) explain the implementation of the DWT on the secure true image then apply the suggested
encryption algorithm for ciphering and deciphering

The secure image

www.ijera.com

Apply DWT

Cipher image

Decipher image

648|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

www.ijera.com

Table (2) show the affected of the encryption process on the secure image as show in the histogram
The DWT
The histogram of DWT secure image
The histogram of the cipher DWT
secure image
secure image

www.ijera.com

649|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

www.ijera.com

www.ijera.com

650|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

www.ijera.com

Table (3) show the application of the steganography algorithm on the cover and cipher true image and the
reconstruction process
The cover image
The DWT Encryption
Stego image
Extracted
secureima
of DET
secret
ge
image

www.ijera.com

651|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

The cover image

www.ijera.com

www.ijera.com

Table (4) show the histogram of the cover and stego image
The histogram of cover image
The histogram of the stego image

652|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

www.ijera.com

Table (5) described the implementation of the performance metrics on the cover and stego image
The image

AD

0.0125732421875

www.ijera.com

MSE

0.583984375

SC

NK

PSNR

0.9997844273390
23

0.99981617034
182

154.58896346936

653|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

www.ijera.com

-0.05322265625

2.

3.
4.

5.
6.

1.00044494761

158.112742442548

0.53581237792968

0.9967093283069

0.99830661597

168.482488871287

0.023681640525

1.

1.0009730282621

0.14666748046875

V.

0.57745361328125

0.58511352539062

0.9995004219713

0.99967682783

154.290546515341

Conclusions
The using of DWTand suggested encryption
method, which could be proven a highly
securedand
efficiency
method
fordata
communication.
This study presented a system that combined
Steganography, with cryptography, which is a
powerful tool that enables people to communicate
without possible eavesdroppers even knowing there
is a form of communication in the first place.
The proposed method provides acceptable image
quality with very little distortion in the image.
The main advantage of this Crypto/Stegno System
is that the method used for encryption, proposed
encryption method, is very secure and the DWT
transformation ,LSB steganography techniques are
very hard to detect.
The using of DWT allow to hiding secure image in
cover image with the same size or larger than it.
The LSB steganography method added another
level of security to the secret image.

[2]

[3]

[4]

[5]

References:
[1]

Menezes, Alfred , Paul C van Oorschot ,Scott
A. Vanstone, ― Handbook of Applied

www.ijera.com

[6]

Cryptography. CRC Press‖ , October 1996 ,
ISBN 0-8493-8523-7.
William Stallings, ―Cryptography and
Network Security: Principles and practices‖ ,
Pearson education, Third Edition, ISBN 817808-902-5.
N. Provos and P. Honeyman, ―Hide and seek:
An introduction to steganography,‖ IEEE
Security and Privacy Mag.‖ , 2003, vol. 1, no.
3, pp. 32–44,.
Westfeld, A., and G. Wolf, Steganography in a
Video conferencing system, in proceedings of
the second international workshop on
information hiding, vol. 1525 of lecture notes
in computer science, Springer, 1998. Pp. 3247.
Ms.G.S.Sravanthi,
Mrs.B.SunithaDevi,S.M.Riyazoddin&M.Janga
Reddy,
"A
Spatial
Domain
Image
Steganography Technique Based onPlane Bit
Substitution Method",Global Journals Inc.
(USA),Volume 12 Issue 15 Version 1.0 Year
2012.
P.Saxena, S.Garg and A.Srivastava,”DWTSVD Semi-Blind Image WatermarkingUsing
654|P a g e
Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655

[7]

High Frequency Band”, (ICCSIT'2012)
Singapore April 28-29, 2012.
Panrong X., “Image Compression by Wavelet
Transform”, EastState University, Master
Thesis, 2006.

www.ijera.com

[8]

www.ijera.com

P. Rajkumar ,R. Kar,A. K. , H. Dharmasa,"A
Comparative Analysis of Steganographic Data
Hiding within Digital Images",International
Journal of Computer Applications (0975 –
8887) Volume 53– No.1, September 2012.

655|P a g e

More Related Content

What's hot

Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013ijcsbi
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityFatima Azeez
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Dual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoDual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoIJTET Journal
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
 

What's hot (19)

Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Dual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in VideoDual Steganography for Hiding Video in Video
Dual Steganography for Hiding Video in Video
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 

Viewers also liked

Viewers also liked (20)

Mc3620712075
Mc3620712075Mc3620712075
Mc3620712075
 
Kp3618151819
Kp3618151819Kp3618151819
Kp3618151819
 
Ba4103327330
Ba4103327330Ba4103327330
Ba4103327330
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Hk3513021306
Hk3513021306Hk3513021306
Hk3513021306
 
Hs3513431348
Hs3513431348Hs3513431348
Hs3513431348
 
Hc3512401245
Hc3512401245Hc3512401245
Hc3512401245
 
Especialmente
Especialmente Especialmente
Especialmente
 
Butterfly
ButterflyButterfly
Butterfly
 
E Mail Marketing
E Mail MarketingE Mail Marketing
E Mail Marketing
 
Diario Resumen 20150121
Diario Resumen 20150121Diario Resumen 20150121
Diario Resumen 20150121
 
Gerência de identidades federadas em nuvens
Gerência de identidades federadas em nuvensGerência de identidades federadas em nuvens
Gerência de identidades federadas em nuvens
 
Carnaval autonomico
Carnaval autonomicoCarnaval autonomico
Carnaval autonomico
 
Los 10 Mejores Blogs
Los 10 Mejores BlogsLos 10 Mejores Blogs
Los 10 Mejores Blogs
 
Practica sobre conceptos básicos de circuitos eléctricos.
Practica  sobre conceptos básicos de circuitos eléctricos.Practica  sobre conceptos básicos de circuitos eléctricos.
Practica sobre conceptos básicos de circuitos eléctricos.
 
SAVE OUR PLANET
SAVE OUR PLANETSAVE OUR PLANET
SAVE OUR PLANET
 
Kasenian budaya tatar sunda
Kasenian budaya tatar sundaKasenian budaya tatar sunda
Kasenian budaya tatar sunda
 
INTRODUCCIÓN I.O
INTRODUCCIÓN I.OINTRODUCCIÓN I.O
INTRODUCCIÓN I.O
 
Compet essenciais
Compet essenciaisCompet essenciais
Compet essenciais
 
Lachor Gr
Lachor GrLachor Gr
Lachor Gr
 

Similar to Cv4201644655

A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform IJECEIAES
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 

Similar to Cv4201644655 (20)

A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
D010312230
D010312230D010312230
D010312230
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Cv4201644655

  • 1. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Design and Implementationproposedencryption and HidingSecure Image Inan Image Asst. Prof. Dr.Bahejak.Shukur, Alaaldeen Abbas Abdulhassan, Mohammed Hussein Jawad Computer Technology /network department, Babylon University, Iraq Abstract Steganographyand cryptography are two general methods of transfer vital information in a top-secret method. When we hide the secure image the malicious want to distort this secure image itself. Therefore, the cryptography techniques used must be one of the most powerful techniques.Also cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium.This paper presentshybrid method of cryptography which combined two nonlinear feedbacks register in one non-linear function to produce a strong cryptography technique. The cryptography method is working on the image resulted from the DWT which, used the orthogonal filter.In steganography part we have used most significant method to hide the secret true image into true image. To evaluate our system number of measurements used such as Mean Square Error, Normalized Cross Correlation, Average Difference, Structural Content,peak signal to noise ratio (PSNR)have been computed between the cover and stego image.Finally histogram plot of cover image, stego image, secret ciphered images have been plotted. Keyword: steganography, cryptography, orthogonal filter, cipher, decipher. substitute redundant partsof a cover with a secret message is called Substitutionsystems;but embedding I. Introduction the secret information in a transform space of the signal The science of hiding data by embedding (e.g., in the frequency domain) is called transform information into cover meansis called a Steganography, methods; and in spread spectrum methodsimplemented which is supplementcryptography not replace itin the concepts of spread spectrum communication; security. To provide another layer of protection the Byexploiting several statistical properties of acover and hidden message is encrypted, which it must be use hypothesis testing in the extraction process the decrypted if discovered.Thescience thatstudies statistical methods encode data invented; also in the mathematical techniques for keeping message secure distortion methodsthe data storing by signal distortion and free from attacks called the cryptography [1], and the deviation from the original cover measured in [2].Whereas the science for hiding communication the decoding step; finally the cover generation methods called a steganography [3].Which, involves hiding ,which created the encode of the data in the cover for information that appears no information is hidden in it secret communication . at all. In this study we apply the discrete wavelet Cryptography and Steganography achieve the same transform on the secret first then embedding the LL goal via different means. Encryption encodes the data level resulted from this stage in the cover image. so that an unintended recipient cannot determine its Similar to cryptanalysis which applied in the intended meaning. Steganography, in contrast attempts cryptography, the steganography deals with hiding to prevent an unintended recipient from suspecting that thedata in some cover source. Whereas the steganalysis the data is there. [4].Combining encryption with is the science of detecting messages hidden using steganography allows for a better private steganography, which identify suspected packages, to communication. The goal of steganography is to avoid determine whether or not they have a payload encoded drawing suspicion to the transmission of the secret into them, and, if possible, recover that payload. [5] message. There are number of methods in steganographic systems,which can beclassifyaccording to the type of covers used for secret communication. Which they:The systems which www.ijera.com 644|P a g e
  • 2. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 www.ijera.com II. The structure of the suggested system: ……………………………………………………………........................................... Figure (1)the design of the suggested system Steps for hiding the encoding image are, 1. Use Discrete Wavelet Transform. 2. Apply proposed encryption algorithm on the LL band resulted from step 1by making xor operation between it with the bytes of the LL band. 3. Use LSB replacement to hidden the resulting secret encryption image. 4. Store the stegoresulting image which contains the encryption secret information. www.ijera.com 5. to evaluate the result number of performance measurements used . Steps for extracting and decoding of hidden image are, 1. Extract the embedding secret encryption image using the extracting LSB algorithm. 2. Apply the decryption proposed algorithm to extract the origin secure image by making xor operation between the key and encryption image. 645|P a g e
  • 3. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 3. 4. Take the Inverse Discrete Transform to the resulted image from step 2. Then extract secret image and cover image. 2.1Discrete Wavelet Transform (DWT) The DWT is a system, which involved two filters, one is the “wavelet filter”, and the other is the “scaling filter”. The wavelet filter is a high pass filter, while the scaling filter is a low pass filter. DWT includes many kinds of transforms, such as Haar wavelet, Daubechies wavelet, and others. Our study utilizes the orthogonal wavelet. After applying a 1- level DWT on an image, we get the approximation subband LL, the horizontal subband LH, the vertical subband HL, andthe diagonal subband HH. . An advantage of DWT over other transforms is it allows good localization both in time and spatial frequency domain.Because of their inherent multiresolution nature, wavelet coding schemes are especially suitable for applications where scalability and tolerable degradation are important. Applying IDWT to LL, HL, LH, and HH, we can get four different frequency's images that are low frequency image, middle-lowfrequencyimage, middle-high frequency image, high frequency image separately [6]. The main steps of DWT are:First, the row and column convolution with scaling filters (Low-Pass Filters) and wavelet filters (High-Pass Filters) 1. Convolve the lowpass filters with rows of image file and save the result. 2. Convolve the lowpass filters with the columns (of the result from step 1) to obtain the Low passLowpass (LL) subimage. 3. Convolve the result from step 1 (the lowpass filtered rows) with the highpass filter on the column, to produce the Low pass-High pass (LH) Subimage. 4. Convolve the original image with the Highpass filters on the rows and save the result. 5. Convolve the result from step 4 with the lowpass filtered on the columns to yield the Highpass_ Lowpass (HL) Subimage. 6. To obtain the Highpass_Highpass (HH) subimage, convolve the columns of the result from step 4 with Highpass filter. Secondly, the (Down Sampler)are implemented by choosing only the odd or even locations of the sub-bands. 2.2 Inverse Discrete Wavelet Transform The inverse wavelet transform performed by enlarging the wavelet transform data to its original size. Insert zeros between each two values horizontally and vertically, then convolve the corresponding (lowpass and highpass) inverse filters to each of the four sub www.ijera.com www.ijera.com images, and sum the results to obtain the original image [7]. 1. Upsample the rows for each Sub-band (LL, LH, HL, and HH) by inserting zero between every two samples. 2. Convolve the rows result from step1 with low and high pass filter, where the sub-bands (LL, LH) with low pass filter and (HL, HH) with the high pass filter. 3. Upsample the columns for the result from step2 by inserting zero between every two samples. 4. Convolve the result from step 3 with low pass and high pass filters, where the sub-bands (LL, HL) with the low pass filter and (LH, HH) with high pass filters. 5. Add the results from step 3 with the result from step 4 and save the result. 2.3Least Significant Bit (LSB) Least Significant Bit (LSB) insertion is a common, simple approach to embedding information in a cover image. The least significant bit of some of all of the bits inside an image is changed to a bit of a secret message. When using 24-bit image, a bit of each of the red, green and blue color components can be used, since they are each represented by a bit So it is possible to embed three bits in each pixel [8]. Algorithm of LSB Based Steganography: Algorithm to embed secret imagein cover image Step 1: Read the cover image &secretLL encryption image, which is to be hidden in the cover image. Step 2: Convert secret image into binary. Step 3: Calculate LSB of each pixel of cover image. Step 4: Replace LSB of cover image with each bit of secretLL encryption image one by one. Step 5: Write stego image. Algorithm to retrieve secret message using cover image Step 1: Read the stego image. Step 2: Calculate LSB of each pixel of stego image. Step 3: Retrieve bits & convert each 8 bit into byte of secretLL encryption imagefor each band (Red, Green, and Blue). Step 4: Reconstruct the cover image. 2.4 Encryption method: The first method: . A combination of three LFSRs: . If a1, a2 and a3 are the outputs of three LFSRs, the output of the generator can be calculated by the following equation: + b1= (a1^a2) (¬a1) ^a3) If the LFSRs have lengths n1, n2 and n3respectively then the linear complexity of the generator is: 646|P a g e
  • 4. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 (n1+1) n2+n1n3 www.ijera.com In this study we combined the result of two methods in one in nonlinear function to produce more robustmethod. The second method: Consist of three LFSRs: .19 bits .x19+x5+x2+x+1 .clock bit 8. .tapped bits: 13,16,17,18 .22 bits . X22+x+1 .Clock bit 10. .tapped bits 20, 21. .23 bits .x23+x15+x2+x+1 .clock bit 10. .tapped bits 7,20,21,22 III. Performance Metrics For data hiding, the main objectives are that the embedded data must be invisible to the observer, and it should have maximum load possible. It is difficult to quantify how invisible embedded data,for this reason number of statistical metrics have been used to show the difference between the cover and stego image such as Average Distance (AD) , Structure Content (SC),Normalized Cross-Correlation (Nk) and Normal Mean Square Error (MSE),peak signal to noise ratio (PSNR). Let the cover’s pixels be represented as C(i,j) and the stego image pixels as S(i ,j) for fixed image size of M x N. Then the following equations can be represented as follow: PSNR= ((M*N)*10*LOG (255^2))/MSE IV. The implementation of the suggested system In the suggested system  We used orthogonal DWT transform on the true color image first to reduce the size of the secret image, which we needed to transfer it over the communication channel.  Scrambled the resulted above image using suggested encryption method by making xor operation between the byte of the LL secret image and the bits resulted from this method.  Preparing the cover image, which used for hiding the resulted scrambled secret image then the stegoimage resulted. www.ijera.com In the extracted stage:  Take the stego image and reconstructed the hidden scrambled secret image.  Decipheringthe hidden secret image by making xor operation between the byte of scrambled secret image and the bits of suggested encryption method.  Applythe IDWT on the resulted secret image to reconstruct it to the original size of the secure image.  Extract the cover image and the secret image. All of the above stage can be seen briefly in the tables from (1) to (5) ,where the first table explain the implementation of the DWT on the secure true image then apply the suggested encryption algorithm for ciphering and deciphering, whereas the second 647|P a g e
  • 5. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 tableshow the affected of the encryption process on the image as show in the histogram, while the third table show the application of the steganography algorithm on the cover and cipher true image and the reconstruction www.ijera.com process, in table (4) show the histogram of the cover and stego image, finally in table (5) described the implementation of the performance metrics on the cover and stego image : Table (1) explain the implementation of the DWT on the secure true image then apply the suggested encryption algorithm for ciphering and deciphering The secure image www.ijera.com Apply DWT Cipher image Decipher image 648|P a g e
  • 6. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 www.ijera.com Table (2) show the affected of the encryption process on the secure image as show in the histogram The DWT The histogram of DWT secure image The histogram of the cipher DWT secure image secure image www.ijera.com 649|P a g e
  • 7. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 www.ijera.com www.ijera.com 650|P a g e
  • 8. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 www.ijera.com Table (3) show the application of the steganography algorithm on the cover and cipher true image and the reconstruction process The cover image The DWT Encryption Stego image Extracted secureima of DET secret ge image www.ijera.com 651|P a g e
  • 9. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 The cover image www.ijera.com www.ijera.com Table (4) show the histogram of the cover and stego image The histogram of cover image The histogram of the stego image 652|P a g e
  • 10. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 www.ijera.com Table (5) described the implementation of the performance metrics on the cover and stego image The image AD 0.0125732421875 www.ijera.com MSE 0.583984375 SC NK PSNR 0.9997844273390 23 0.99981617034 182 154.58896346936 653|P a g e
  • 11. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 www.ijera.com -0.05322265625 2. 3. 4. 5. 6. 1.00044494761 158.112742442548 0.53581237792968 0.9967093283069 0.99830661597 168.482488871287 0.023681640525 1. 1.0009730282621 0.14666748046875 V. 0.57745361328125 0.58511352539062 0.9995004219713 0.99967682783 154.290546515341 Conclusions The using of DWTand suggested encryption method, which could be proven a highly securedand efficiency method fordata communication. This study presented a system that combined Steganography, with cryptography, which is a powerful tool that enables people to communicate without possible eavesdroppers even knowing there is a form of communication in the first place. The proposed method provides acceptable image quality with very little distortion in the image. The main advantage of this Crypto/Stegno System is that the method used for encryption, proposed encryption method, is very secure and the DWT transformation ,LSB steganography techniques are very hard to detect. The using of DWT allow to hiding secure image in cover image with the same size or larger than it. The LSB steganography method added another level of security to the secret image. [2] [3] [4] [5] References: [1] Menezes, Alfred , Paul C van Oorschot ,Scott A. Vanstone, ― Handbook of Applied www.ijera.com [6] Cryptography. CRC Press‖ , October 1996 , ISBN 0-8493-8523-7. William Stallings, ―Cryptography and Network Security: Principles and practices‖ , Pearson education, Third Edition, ISBN 817808-902-5. N. Provos and P. Honeyman, ―Hide and seek: An introduction to steganography,‖ IEEE Security and Privacy Mag.‖ , 2003, vol. 1, no. 3, pp. 32–44,. Westfeld, A., and G. Wolf, Steganography in a Video conferencing system, in proceedings of the second international workshop on information hiding, vol. 1525 of lecture notes in computer science, Springer, 1998. Pp. 3247. Ms.G.S.Sravanthi, Mrs.B.SunithaDevi,S.M.Riyazoddin&M.Janga Reddy, "A Spatial Domain Image Steganography Technique Based onPlane Bit Substitution Method",Global Journals Inc. (USA),Volume 12 Issue 15 Version 1.0 Year 2012. P.Saxena, S.Garg and A.Srivastava,”DWTSVD Semi-Blind Image WatermarkingUsing 654|P a g e
  • 12. Dr. Bahejak.Shukur et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 1), February 2014, pp.644-655 [7] High Frequency Band”, (ICCSIT'2012) Singapore April 28-29, 2012. Panrong X., “Image Compression by Wavelet Transform”, EastState University, Master Thesis, 2006. www.ijera.com [8] www.ijera.com P. Rajkumar ,R. Kar,A. K. , H. Dharmasa,"A Comparative Analysis of Steganographic Data Hiding within Digital Images",International Journal of Computer Applications (0975 – 8887) Volume 53– No.1, September 2012. 655|P a g e