Information security is one of the most important branches concerned with maintaining the confidentiality and reliability of data and the medium for which it is transmitted. Digital watermarking is one of the common techniques in this field and it is developing greatly and rapidly due to the great importance it represents in the field of reliability and security. Most modern watermarking systems, however, use the self-organization map (SOM), which is safer than other algorithms because an unauthorized user cannot see the result of the SOM's training. Our method presents a semifragile watermark under spatial domain using least significant bit (LSB) and by relying on most significant bit (MSB) when the taken values equal to (2 or 4 bits) depending on the characteristics of SOM through developing the so-called best matching unit (BMU) which working to determine the best location for concealment. As a result, it shows us the ability of the proposed method to maintain the quality of the host with the ability to retrieve data, whether it is a binary image or a secret message.
A secure image steganography based on burrows wheeler transform and dynamic b...IJECEIAES
In modern public communication networks, digital data is massively transmitted through the internet with a high risk of data piracy. Steganography is a technique used to transmit data without arousing suspicion of secret data existence. In this paper, a color image steganography technique is proposed in spatial domain. The cover image is segmented into non-overlapping blocks which are scattered among image size window using Burrows Wheeler transform before embedding. Secret data is embedded in each block according to its sequence in the Burrows Wheeler transform output. The hiding method is an operation of an exclusive-or between a virtual bit which is generated from the most significant bit and the least significant bits of the cover pixel. Results of the algorithm are analyzed according to its degradation of the output image and embedding capacity. The results are also compared with other existing methods.
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...IRJET Journal
The document proposes a reversible data hiding scheme for encrypted images using deep neural networks and MSB prediction. It involves a four-stage framework: 1) a hiding network embeds secret data into an image using residual learning, 2) an encryption network encrypts the cover image into a meaningful encrypted image using GAN, 3) an extractor extracts the hidden message from the encrypted image, and 4) a recovery network recovers the original image. The scheme aims to allow lossless recovery of the original image while maximizing embedding capacity. It uses techniques like convolutional neural networks, generative adversarial networks, and MSB prediction to generate meaningful encrypted images for reversible data hiding.
An improved robust and secured image steganographic schemeiaemedu
The document summarizes an improved steganographic scheme that embeds secret data in images. It modifies an existing DCT-based scheme by embedding an "embedding map" to indicate the blocks used for concealment. The embedding map is also hidden using DWT coefficients and secured using SURF features. The proposed method aims to overcome limitations in the existing scheme like potential data loss during extraction due to changes in block energy values. Results show the scheme is robust against attacks like noise and compression while maintaining good image quality. However, capacity is still limited as only part of the image can hide the embedding map.
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
Multimedia data compression is a challenging situation for compression technique, due to the possibility of loss
of data as well as it require large amount of storage place. The minimization of storage place and proper
transmission of these data need compression. In this dissertation we proposed a block based DWT image
compression technique using genetic algorithm and HCC code matrix. The HCC code matrix compressed into
two different set redundant and non-redundant which generate similar pattern of block coefficient. The similar
block coefficient generated by particle of swarm optimization. The process of particle of swarm optimization is
select for the optimal block of DWT transform function. For the experimental purpose we used some standard
image such as Lena, Barbara and cameraman image. The size of resolution of this image is 256*256. The source
of image is Google
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
Multimedia data compression is a challenging situation for compression technique, due to the possibility of loss
of data as well as it require large amount of storage place. The minimization of storage place and proper
transmission of these data need compression. In this dissertation we proposed a block based DWT image
compression technique using genetic algorithm and HCC code matrix. The HCC code matrix compressed into
two different set redundant and non-redundant which generate similar pattern of block coefficient. The similar
block coefficient generated by particle of swarm optimization. The process of particle of swarm optimization is
select for the optimal block of DWT transform function. For the experimental purpose we used some standard
image such as Lena, Barbara and cameraman image. The size of resolution of this image is 256*256. The source
of image is Google.
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET Journal
The document proposes and describes two novel reversible data hiding algorithms that can embed data in encrypted images at high capacity.
The first algorithm, called Vacating Room After Encryption (VRAE), encrypts data, embeds additional information into the encrypted data, hides the encrypted data in a cover image which is then encrypted and transmitted. At the receiver, the cover image is decrypted, the encrypted data is extracted and its embedded information is retrieved, then the data is decrypted to recover the original.
The second algorithm, Reserving Room Before Encryption (RRBE), first embeds information into data, encrypts the data, hides it in a cover image which is then encrypted and sent. At the receiver, the
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
The widespread of global internet has led to the need for developing new
methods of protecting multimedia information from exploitation, alteration
or forgery, illegal distribution, and manipulation. An attacker is quickly and
illegally distributing or changing multimedia information by using various
means of computer technology. For detecting this manipulation, this paper
suggests blind watermark image inside a host image for observing in the
receiver. If the watermark image was retrieved, then the host image was not
attacked or manipulated. While if not retrieved, in this case, the image was
attacked. The proposed method is depending on a decomposition of the host
image using lowest energy sub-bands of contourlet transform (4-levels), with
scrambling by ikeda map of the watermark image, and selecting new
positions by modified arnold cat map. This will produce more security and
safety, as well as provide more difficulty or prevent hacking. The obtained
results confirm the robustness against attacks and more effectiveness of the
presented scheme compared with the other similar works. Also, using lowest
energy sub-bands will expand area of embedding and this part will be
considered in the future works with the color images.
A secure image steganography based on burrows wheeler transform and dynamic b...IJECEIAES
In modern public communication networks, digital data is massively transmitted through the internet with a high risk of data piracy. Steganography is a technique used to transmit data without arousing suspicion of secret data existence. In this paper, a color image steganography technique is proposed in spatial domain. The cover image is segmented into non-overlapping blocks which are scattered among image size window using Burrows Wheeler transform before embedding. Secret data is embedded in each block according to its sequence in the Burrows Wheeler transform output. The hiding method is an operation of an exclusive-or between a virtual bit which is generated from the most significant bit and the least significant bits of the cover pixel. Results of the algorithm are analyzed according to its degradation of the output image and embedding capacity. The results are also compared with other existing methods.
Reversible Data hiding in Encrypted Images using Deep Neural Network and MSB ...IRJET Journal
The document proposes a reversible data hiding scheme for encrypted images using deep neural networks and MSB prediction. It involves a four-stage framework: 1) a hiding network embeds secret data into an image using residual learning, 2) an encryption network encrypts the cover image into a meaningful encrypted image using GAN, 3) an extractor extracts the hidden message from the encrypted image, and 4) a recovery network recovers the original image. The scheme aims to allow lossless recovery of the original image while maximizing embedding capacity. It uses techniques like convolutional neural networks, generative adversarial networks, and MSB prediction to generate meaningful encrypted images for reversible data hiding.
An improved robust and secured image steganographic schemeiaemedu
The document summarizes an improved steganographic scheme that embeds secret data in images. It modifies an existing DCT-based scheme by embedding an "embedding map" to indicate the blocks used for concealment. The embedding map is also hidden using DWT coefficients and secured using SURF features. The proposed method aims to overcome limitations in the existing scheme like potential data loss during extraction due to changes in block energy values. Results show the scheme is robust against attacks like noise and compression while maintaining good image quality. However, capacity is still limited as only part of the image can hide the embedding map.
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
Multimedia data compression is a challenging situation for compression technique, due to the possibility of loss
of data as well as it require large amount of storage place. The minimization of storage place and proper
transmission of these data need compression. In this dissertation we proposed a block based DWT image
compression technique using genetic algorithm and HCC code matrix. The HCC code matrix compressed into
two different set redundant and non-redundant which generate similar pattern of block coefficient. The similar
block coefficient generated by particle of swarm optimization. The process of particle of swarm optimization is
select for the optimal block of DWT transform function. For the experimental purpose we used some standard
image such as Lena, Barbara and cameraman image. The size of resolution of this image is 256*256. The source
of image is Google
Efficient Image Compression Technique using Clustering and Random PermutationIJERA Editor
Multimedia data compression is a challenging situation for compression technique, due to the possibility of loss
of data as well as it require large amount of storage place. The minimization of storage place and proper
transmission of these data need compression. In this dissertation we proposed a block based DWT image
compression technique using genetic algorithm and HCC code matrix. The HCC code matrix compressed into
two different set redundant and non-redundant which generate similar pattern of block coefficient. The similar
block coefficient generated by particle of swarm optimization. The process of particle of swarm optimization is
select for the optimal block of DWT transform function. For the experimental purpose we used some standard
image such as Lena, Barbara and cameraman image. The size of resolution of this image is 256*256. The source
of image is Google.
IRJET- A Novel High Capacity Reversible Data Hiding in Encrypted Domain u...IRJET Journal
The document proposes and describes two novel reversible data hiding algorithms that can embed data in encrypted images at high capacity.
The first algorithm, called Vacating Room After Encryption (VRAE), encrypts data, embeds additional information into the encrypted data, hides the encrypted data in a cover image which is then encrypted and transmitted. At the receiver, the cover image is decrypted, the encrypted data is extracted and its embedded information is retrieved, then the data is decrypted to recover the original.
The second algorithm, Reserving Room Before Encryption (RRBE), first embeds information into data, encrypts the data, hides it in a cover image which is then encrypted and sent. At the receiver, the
DIRECTIONAL BASED WATERMARKING SCHEME USING A NOVEL DATA EMBEDDING APPROACH acijjournal
Image watermarking has come to wide use in the recent past. It is by the authentication problems and limitation means that the setting accuracy of the image watermarking operation is minimized. Different types of integration schemes have been proposed in the past to improve efficiency and makes the
embedding resistant against various attacks .Although transformation, spatial domain approaches have been developed PSNR improvements in image artifacts due to the fringes are still to be observed. To improvise the embedding, image artifacts in this paper a forward – based image embedding scheme is proposed.
Blind image watermarking scheme based on lowest energy contourlet transform c...nooriasukmaningtyas
The widespread of global internet has led to the need for developing new
methods of protecting multimedia information from exploitation, alteration
or forgery, illegal distribution, and manipulation. An attacker is quickly and
illegally distributing or changing multimedia information by using various
means of computer technology. For detecting this manipulation, this paper
suggests blind watermark image inside a host image for observing in the
receiver. If the watermark image was retrieved, then the host image was not
attacked or manipulated. While if not retrieved, in this case, the image was
attacked. The proposed method is depending on a decomposition of the host
image using lowest energy sub-bands of contourlet transform (4-levels), with
scrambling by ikeda map of the watermark image, and selecting new
positions by modified arnold cat map. This will produce more security and
safety, as well as provide more difficulty or prevent hacking. The obtained
results confirm the robustness against attacks and more effectiveness of the
presented scheme compared with the other similar works. Also, using lowest
energy sub-bands will expand area of embedding and this part will be
considered in the future works with the color images.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
This document summarizes a research paper that proposes a new technique for data embedding and extraction in high resolution AVI videos. The technique encrypts a secret message before embedding it by alternately changing the LSB and LSB+3 bits of alternate bytes in the cover video file. An index is also created for the secret information and placed in a video frame to aid extraction. This technique aims to provide higher security, capacity and robustness compared to typical data embedding methods. The paper discusses related work on digital steganography techniques and the proposed video steganography algorithm in more detail.
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
This document presents two high capacity reversible data hiding methods for encrypted images called CPE-MHCRDH and EPE-MHCRDH. The CPE-MHCRDH method corrects prediction errors in the most significant bits of pixels before encryption, allowing two bits of secret data to be embedded per pixel. The EPE-MHCRDH method directly encrypts the original image and embeds the locations of prediction errors after encryption. Both methods compress the data-hidden encrypted image losslessly using LZ77 compression. Experimental results show the proposed methods achieve better reconstructed image quality and higher embedding capacity than previous reversible data hiding in encrypted image methods.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
This survey propose a Novel Joint Data-Hiding and
Compression Scheme (JDHC) for digital images using side match
vector quantization (SMVQ) and image in painting. In this
JDHC scheme image compression and data hiding scheme are
combined into a single module. On the client side, the data should
be hided and compressed in sub codebook such that remaining
block except left and top most of the image. The data hiding and
compression scheme follows raster scanning order i.e. block by
block on row basis. Vector Quantization used with SMVQ and
Image In painting for complex block to control distortion and
error injection. The receiver side process is based on two
methods. First method divide the received image into series of
blocks the receiver achieve hided data and original image
according to the index value in the segmented block. Second
method use edge based harmonic in painting is used to get
original image if any loss in the image.
With the enhance in the digital media, modification
and transfer of information is very easy. So this
work focus on transferring data by hiding in the
image. Here a robust approach is achieved by using
the skew tent map as an encryption/ decryption
algorithm at the sender and receiver side. In this
work image is transformed into inverse S-order as
the initial step of the work so little confusion can be
created for the intruder. Here whole data hiding is
done by modifying by using the modified histogram
shifting method. This approach was utilized to the
point that hiding information and image can be
effectively recovered with no information loss. An
investigation is done on the genuine dataset image.
Assessment parameter esteems and demonstrates
that the proposed work has kept up the SNR, PSNR,
Throughput, Data Hiding Execution Time and
Extraction Time values with high security of the
information.
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET Journal
This document summarizes a research paper that analyzes the security of an image text encryption scheme based on bit-plane extraction. The paper identifies security defects in the existing scheme and proposes improved known-plaintext and chosen-plaintext attacks. It then outlines an enhanced encryption scheme that adopts statistical values from the plain image during diffusion and builds relationships between bit planes to reduce pixel correlations in the encrypted image. The proposed scheme is evaluated experimentally and compared to other methods, showing improvements in security and robustness against attacks while maintaining encrypted image quality.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
Reversible Data Hiding Using Contrast Enhancement ApproachCSCJournals
Reverse Data Hiding is a technique used to hide the object's data details. This technique is used to ensure the security and to protect the integrity of the object from any modification by preventing intended and unintended changes. Digital watermarking is a key ingredient to multimedia protection. However, most existing techniques distort the original content as a side effect of image protection. As a way to overcome such distortion, reversible data embedding has recently been introduced and is growing rapidly. In reversible data embedding, the original content can be completely restored after the removal of the watermark. Therefore, it is very practical to protect legal, medical, or other important imagery. In this paper a novel removable (lossless) data hiding technique is proposed. This technique is based on the histogram modification to produce extra space for embedding, and the redundancy in digital images is exploited to achieve a very high embedding capacity. This method has been applied to various standard images. The experimental results have demonstrated a promising outcome and the proposed technique achieved satisfactory and stable performance both on embedding capacity and visual quality. The proposed method capacity is up to 129K bits with PSNR between 42-45dB. The performance is hence better than most exiting reversible data hiding algorithms.
In this paper steganography is used to hide the data inside the images. Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of
steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible
only to the intended receiver and not to any intruders or unauthorized parties. This work focuses on the image steganography with
an image compression using least significant bit with Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation
Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret
message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be
successfully extracted.
This document summarizes an article on implementing data hiding in images using FPGA. It discusses using least significant bit (LSB) and discrete wavelet transform (DWT) to hide data in images. The methodology section explains how LSB and DWT are used to embed data. An algorithm is provided that takes secret data, hides bits in the LSB of image pixels using DWT, and extracts the data. Simulation results on Matlab and FPGA show the output images and received message. Analysis using MSE and PSNR shows DWT provides better image quality than LSB. The conclusion states steganography combined with cryptography can provide secure data transmission.
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
This document provides an overview of hiding information in H.264/AVC compressed video. It discusses different information hiding techniques such as bit plane replacement, spread spectrum, histogram manipulation and matrix encryption. It identifies locations within the H.264 video compression process where information can be hidden, such as during prediction, transformation, quantization and entropy coding. It reviews related information hiding strategies for each location and compares strategies based on payload, overhead, video quality and complexity. The document aims to provide a better understanding of information hiding in compressed video and identify new opportunities.
This paper presents a spatial domain digital image watermarking technique. The technique embeds a binary watermark image into the cover image by inserting watermark pixels into homogeneous blocks with low variance. The watermark is first dispersed using a chaotic system before insertion. A secret multilevel image is used to extract the watermark. Experimental results show the watermark is resilient against various attacks like mean filtering, Gaussian filtering, median filtering, image rescaling, and JPEG compression. The watermark can be extracted with high correlation even after these attacks.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
A Survey on Features Combination for Image WatermarkingEditor IJMTER
As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
This document summarizes a research paper that proposes a new technique for data embedding and extraction in high resolution AVI videos. The technique encrypts a secret message before embedding it by alternately changing the LSB and LSB+3 bits of alternate bytes in the cover video file. An index is also created for the secret information and placed in a video frame to aid extraction. This technique aims to provide higher security, capacity and robustness compared to typical data embedding methods. The paper discusses related work on digital steganography techniques and the proposed video steganography algorithm in more detail.
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
This document presents two high capacity reversible data hiding methods for encrypted images called CPE-MHCRDH and EPE-MHCRDH. The CPE-MHCRDH method corrects prediction errors in the most significant bits of pixels before encryption, allowing two bits of secret data to be embedded per pixel. The EPE-MHCRDH method directly encrypts the original image and embeds the locations of prediction errors after encryption. Both methods compress the data-hidden encrypted image losslessly using LZ77 compression. Experimental results show the proposed methods achieve better reconstructed image quality and higher embedding capacity than previous reversible data hiding in encrypted image methods.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
This survey propose a Novel Joint Data-Hiding and
Compression Scheme (JDHC) for digital images using side match
vector quantization (SMVQ) and image in painting. In this
JDHC scheme image compression and data hiding scheme are
combined into a single module. On the client side, the data should
be hided and compressed in sub codebook such that remaining
block except left and top most of the image. The data hiding and
compression scheme follows raster scanning order i.e. block by
block on row basis. Vector Quantization used with SMVQ and
Image In painting for complex block to control distortion and
error injection. The receiver side process is based on two
methods. First method divide the received image into series of
blocks the receiver achieve hided data and original image
according to the index value in the segmented block. Second
method use edge based harmonic in painting is used to get
original image if any loss in the image.
With the enhance in the digital media, modification
and transfer of information is very easy. So this
work focus on transferring data by hiding in the
image. Here a robust approach is achieved by using
the skew tent map as an encryption/ decryption
algorithm at the sender and receiver side. In this
work image is transformed into inverse S-order as
the initial step of the work so little confusion can be
created for the intruder. Here whole data hiding is
done by modifying by using the modified histogram
shifting method. This approach was utilized to the
point that hiding information and image can be
effectively recovered with no information loss. An
investigation is done on the genuine dataset image.
Assessment parameter esteems and demonstrates
that the proposed work has kept up the SNR, PSNR,
Throughput, Data Hiding Execution Time and
Extraction Time values with high security of the
information.
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane ExtractionIRJET Journal
This document summarizes a research paper that analyzes the security of an image text encryption scheme based on bit-plane extraction. The paper identifies security defects in the existing scheme and proposes improved known-plaintext and chosen-plaintext attacks. It then outlines an enhanced encryption scheme that adopts statistical values from the plain image during diffusion and builds relationships between bit planes to reduce pixel correlations in the encrypted image. The proposed scheme is evaluated experimentally and compared to other methods, showing improvements in security and robustness against attacks while maintaining encrypted image quality.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
Reversible Data Hiding Using Contrast Enhancement ApproachCSCJournals
Reverse Data Hiding is a technique used to hide the object's data details. This technique is used to ensure the security and to protect the integrity of the object from any modification by preventing intended and unintended changes. Digital watermarking is a key ingredient to multimedia protection. However, most existing techniques distort the original content as a side effect of image protection. As a way to overcome such distortion, reversible data embedding has recently been introduced and is growing rapidly. In reversible data embedding, the original content can be completely restored after the removal of the watermark. Therefore, it is very practical to protect legal, medical, or other important imagery. In this paper a novel removable (lossless) data hiding technique is proposed. This technique is based on the histogram modification to produce extra space for embedding, and the redundancy in digital images is exploited to achieve a very high embedding capacity. This method has been applied to various standard images. The experimental results have demonstrated a promising outcome and the proposed technique achieved satisfactory and stable performance both on embedding capacity and visual quality. The proposed method capacity is up to 129K bits with PSNR between 42-45dB. The performance is hence better than most exiting reversible data hiding algorithms.
In this paper steganography is used to hide the data inside the images. Steganography is the science that involves
communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. The main goal of
steganography is to ensure that the transmitted message is completely masked, thereby ensuring that the message is accessible
only to the intended receiver and not to any intruders or unauthorized parties. This work focuses on the image steganography with
an image compression using least significant bit with Discrete Wavelet Transform (DWT) on FPGA Spartan III Evaluation
Development Kit (EDK). Current trends support digital image files as the cover file to hide another digital file with secret
message or data. At receiver side, using Inverse Discrete Wavelet transform, both original image as well as hidden data can be
successfully extracted.
This document summarizes an article on implementing data hiding in images using FPGA. It discusses using least significant bit (LSB) and discrete wavelet transform (DWT) to hide data in images. The methodology section explains how LSB and DWT are used to embed data. An algorithm is provided that takes secret data, hides bits in the LSB of image pixels using DWT, and extracts the data. Simulation results on Matlab and FPGA show the output images and received message. Analysis using MSE and PSNR shows DWT provides better image quality than LSB. The conclusion states steganography combined with cryptography can provide secure data transmission.
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
This document provides an overview of hiding information in H.264/AVC compressed video. It discusses different information hiding techniques such as bit plane replacement, spread spectrum, histogram manipulation and matrix encryption. It identifies locations within the H.264 video compression process where information can be hidden, such as during prediction, transformation, quantization and entropy coding. It reviews related information hiding strategies for each location and compares strategies based on payload, overhead, video quality and complexity. The document aims to provide a better understanding of information hiding in compressed video and identify new opportunities.
This paper presents a spatial domain digital image watermarking technique. The technique embeds a binary watermark image into the cover image by inserting watermark pixels into homogeneous blocks with low variance. The watermark is first dispersed using a chaotic system before insertion. A secret multilevel image is used to extract the watermark. Experimental results show the watermark is resilient against various attacks like mean filtering, Gaussian filtering, median filtering, image rescaling, and JPEG compression. The watermark can be extracted with high correlation even after these attacks.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
A Survey on Features Combination for Image WatermarkingEditor IJMTER
As the internet users are increasing day by day it is easy to transfer digital data. By this new
problem of data piracy is increasing. For this different methods of watermarking are developed for
protecting the digital data like video, audio, image, etc. Out of these many researcher are working on
image watermarking field from last few decades. This paper focus on the image watermarking features
combination with various techniques which are broadly categorized into spatial and frequency domain.
Many features are studied with their different requirement and functionality. It has been observed that
most of the researcher combines many features for achieving the prior goal of the watermark that is to
embed watermark and extract from the carrier image in presence of different attack.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
Similar to Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Digital watermarking by utilizing the properties of selforganization map based on least significant bit and most significant bit
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 6, December 2022, pp. 6545~6558
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i6.pp6545-6558 6545
Journal homepage: http://ijece.iaescore.com
Digital watermarking by utilizing the properties of self-
organization map based on least significant bit and most
significant bit
Khalid Kadhim Jabbar1
, Munthir Bahir Tuieb1
, Salam A. Thajeel2
1
Department of Computer Sciences, College of Education, Mustansiriyah University, Baghdad, Iraq
2
Department of Petroleum Technology, University of Technology, Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Jul 2, 2021
Revised Jul 27, 2022
Accepted Aug 14, 2022
Information security is one of the most important branches concerned with
maintaining the confidentiality and reliability of data and the medium for
which it is transmitted. Digital watermarking is one of the common
techniques in this field and it is developing greatly and rapidly due to the
great importance it represents in the field of reliability and security. Most
modern watermarking systems, however, use the self-organization map
(SOM), which is safer than other algorithms because an unauthorized user
cannot see the result of the SOM's training. Our method presents a semi-
fragile watermark under spatial domain using least significant bit (LSB) and
by relying on most significant bit (MSB) when the taken values equal to
(2 or 4 bits) depending on the characteristics of SOM through developing the
so-called best matching unit (BMU) which working to determine the best
location for concealment. As a result, it shows us the ability of the proposed
method to maintain the quality of the host with the ability to retrieve data,
whether it is a binary image or a secret message.
Keywords:
Digital watermarking
Information security
Least significant bit
Most significant bit
Self-organization map
This is an open access article under the CC BY-SA license.
Corresponding Author:
Khalid Kadhim Jabbar
Computer Science Department, College of Education, Mustansiriyah University
Baghdad, Iraq
Email: khalid_jabbar@yahoo.com, khalidk.jabbar@uomustansiriyah.edu.iq
1. INTRODUCTION
However, steganography is an antiquated art, the beginning of personal computer (PC) innovation
has given it new life. PC based steganography methods acquaint changes with computerized covers to install
data unfamiliar to the local covers. Such data might be conveyed as text, parallel records, or give extra data
about the cover. The requirements for information embedding within another cover, copyright protection and
steganography are important work [1].
Computerized picture watermarking should meet prerequisites, for example keep up with image
quality, hard to eliminate the watermark, nature of watermark extraction, and appropriate [2]. The
accompanying variables are considered in planning an ideal information concealing framework [3]; the
following properties must be met by the digital watermark technology in general. To begin, the embedded
watermark should not affect the image visually and should be perceptually unnoticeable:
− Imperceptibility: the features of human visual or auditory systems are the basis for this idea. If the
average human person is unable to distinguish between carriers that carry hidden information and those
that do not, the embedded information is unnoticeable. One of the most important criteria in this field is
that the cover is included without significant deterioration, deformation or loss in the quality of cover.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6545-6558
6546
− Security: the criterion of a secure embed algorithm lies in a successful and robust embedding process
where the embed information remains undetectable after its discovery, and this depends on the total
amount of information about the embedding algorithm and the secret.
− Capacity: the thought of limit in information stowing away demonstrates the absolute number of bits
stowed away and effectively recuperated by the steganography scheme.
− Robustness: Durability of the inserted information must remain unblemished if the stego-image goes
through change, for example, linear and non-linear filtering; addition of random noise, scaling, rotations
and loss compression.
− Embedding intricacy: if the image with the embedded message matches the source model from which the
cover images were drawn, the information included is undetectable by intruders. For example, if the
steganography approach includes a secret message in the noise component of the image, the
steganography must take place without causing any statistically significant changes in the carrier noise.
On the other hand, the size of the secret message and the nature of the cover image content have an
impact on the inability to detect.
The technique of embedding a hidden information (i.e., a watermark) into digital data (such as
audio, video, or digital images) in order to establish ownership or identify a buyer is known as digital
watermarking. A logo, a label, or a random sequence can be used as a digital watermark. In general, visible
and invisible watermarks are the two forms of digital watermarks. For authentication or identification, the
embedded watermarks can be retrieved or recognized from the watermarked medium. Watermarks that are
not visible can be divided into two categories: robust and fragile watermarks, because they are resistant to
practically all types of image processing procedures, strong watermarks are commonly employed for
copyright protection and ownership verification. Fragile watermarks, on the other hand, are mostly used for
content authentication and integrity attestation because they are fully vulnerable to any changes.
2. BACKGROUND
The stego durability is improved by inserting it within lower-middle-significant bits. For good
perception quality and watermark recovery, Kutter and Petitcolas [4] recommend inserting 80 bits of
watermark data in the host image. This is enough to recover more than 80% of the watermark.
Parah et al. [5] devise a watermarking approach that uses a random vector address to embed the logo
in the intermediate significant bits of the three host images at precise geographical places. In [6], a strategy
for numerous watermarks is suggested that utilizes a square plan based on the human visual elements. An
edge is utilized to decide the watermark esteems by altering first section of the symmetrical U framework
acquired from singular value decomposition (SVD) [7]. In this investigation, picture steganography utilizing
least huge piece and mystery map strategies is performed by applying 3D tumultuous guides, in particular,
3D Chebyshev and 3D calculated guides, to acquire high security. This method depends on the idea of
performing arbitrary inclusion and choosing a pixel from a host picture.
According to Peng et al. [8], embedding two bits in each pixel increases the payload, and processing
the two images for image integrity makes the work very difficult [9]. Create a watermark from most
significant bit (MSB) by inserting them as standard bits and authentication bits, but according to Kutter and
Petitcolas' [4] benchmark methodology, the watermark must be independent of the host image, which was
violated. The proposed method that presented in [10] involved proposing a model based on the specified
pixel values (first and last) from least significant bit (LSB), MSB based on the spatial domain for information
masking and retrieval as the pixel values of the image would be a mixture of those bits. While [11] proposed
a method that based on including the secret message in the small part of the host depending on the LSB, as
well as hiding the confidential information in the host within the same field in the most important part of the
digital image MSB by relying on the new hybrid technique (NHB).
The results showed a big difference when hiding information using LSB and MSB, noting that the
proposed method has the ability to deal with information with different extensions such as DOX, XLSX, and
PDF in [12], the research contributed to shedding light on the most important methods and mechanisms
adopted in the field of embedding and retrieval of the binary watermark, and how to determine tampering
area(s). While [13] present a block-wise and pixel-wise techniques, it depend on the false positive rate false
positive rate (FPR) parameter, if the size of the block wise is small then the FPR will be decrease, otherwise
it will be lower than that of the block-wise detection.
The proposed method that presented in [14] was embedded the gray image in the color image under
transform domain. This is done by analyzing the gray image into a binary image by arranging the bit numbers
from LSB to MSB by combining those binary bits with the corresponding blocks by using a quantization
technique. In [15], it aimed to hide the secret data in the encrypted image by relying on what is called the
reverse method of masking, this method determines the embedded pixels depending on the prediction errors
3. Int J Elec & Comp Eng ISSN: 2088-8708
Digital watermarking by utilizing the properties of self-organization map … (Khalid Kadhim Jabbar)
6547
with the neighboring pixels in terms of strong correlation with them, and then the encoded image is created
resulting from the rearrangement of those embedded pixels by taking advantage of the MSB properties.
Another attempt presented in [16], the differences between LSB technology and MSB technology in hiding
with color or gray image after including the secret message in the digital image was highlighted, specifically
when embedded the secret information in small parts of LSB, as well as using MSB technology to hide that
confidential information in the most important part of the digital image within spatial domain.
While study [17] present a method based on computing the security authentication code/watermark
bit for each pixel based on MSB and subsequently the watermark bit will be embedded in LSB for each pixel
based on a secret sequence obtained from an approved logistic map in the proposed method. In this method
that presented in [18], eight bits are included in each of the two LSBs for the whole image in order to obtain
the validation bit from the image summaries that are recovered from every 2×2 non-overlapping blocks based
on the two techniques of wavelet and halftone after two summaries are generated from the host image.
3. SELF-ORGANIZATION MAP
self-organization map (SOM) or self-organizing feature mapping (SOFM) is a kind of artificial
neural network (ANN) that utilizations prepared solo figuring out how to create low-dimensional (normally
two-dimensional), discrete portrayal preparing tests. The info space, called the guide, is an approach to lessen
the quantity of measurements. Self-sorting out maps are not quite the same as other counterfeit neural
systems in that they apply contending adapting instead of blunder adjusting learning (for instance, back
engendering with slope plummet), as in they use neighborhood capacities to safeguard the topology of the
info space.
A SOM arrange normally comprises of two layers, the input layer and the output layer, see Figure 1.
Not quite the same as the vast majority of the other neural systems, in SOM the input layer of source hubs is
legitimately associated with the output layer of calculation hubs with no concealed layer. The hubs in the
information layer indicate the characteristics (highlights) or, all the more for a most part, the factors
contained in the information. Each bit of information is spoken to by a m-dimensional info vector,
𝑥 = (𝑥1, 𝑥2, . . . , 𝑥𝑚), whose components show the trait estimations of a specific dataset. In the event that
there are enormous contrasts among the characteristic qualities in the informational collection,
standardization of the information is required so as to keep away from the strength of a specific trait or subset
of properties. This will give equivalent opportunities to all the traits and improve the numerical precision.
Figure 1. Self-organization map
Best matching unit (BMU) is reached by figuring the separation between completely input vectors
and the example vector, at that point getting the weight going through every one of them. The victor weight
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6545-6558
6548
is the one with the most limited separation. There are numerous approaches to figure the separation. The
weight vectors are instated to begin SOM mapping. An example vector is chosen arbitrarily and looking
through the guide of weight vectors to discover which test is best spoken to by the weight, remunerating the
weight that is picked by having the option to turn out to be progressively like the example vector that was
haphazardly chosen. Neighboring loads are accessible for each weight vector and are near it, compensating
the neighbors of that weight likewise by having the option to turn out to be increasingly like the picked test
vector. Now the quantity of neighbors diminishes additionally weight learning rate diminishes after some
time. This entire procedure is rehashed countless occasions [19].
4. LEAST SIGNIFICANT BIT AND MOST SIGNIFICANT BIT
LSB is the lowest bit in a sequence of numbers in the binary form e.g. in the binary number:
(10110001), is the least significant bit is far right 1. The LSB used to embed the secret data in to the least
significant bits of the pixel values in a cover image. While MSB represent the highest bit in a sequence of
numbers in the binary form e.g. in the binary number of: (11001100), the most significant bit is far left 1
[20], [21].
5. THE PROPOSED METHOD
5.1. Statement of the problem
Images are considered one of the most important media, fastest and easiest media used to hide
confidential information in them under spatial domain or frequency domain whether they were binary image
or secret messages or gray image. The watermarked image content could be deliberately tampered with the
presence of professional and easy-to-use of friendly programs, in addition may be destroyed unintentionally;
for this reason, many attempts were made to maintain the secrecy of watermarked image by preserving the
confidentiality of the method used for inclusion in the host. The main challenge of this diversity is allowed
the proposed method to be able to deal with different media, while preserving the quality of the color image
that used as a host for those media during the embedding stage with ability to recover the logo after
extraction stage with preserving the quality of the host. The proposed method includes the process of hiding a
binary image in the color image, as well as the ability to embedded the secret message in the color image
under spatial domain by utilizing the properties of both LSB and the value that provided by MSB to
determine the best hiding site in a manner that differs in subtraction and results from previous attempts by
controlling the values of each.
In order to achieve the best results and observe the effectiveness of the proposed method and the
quality of watermarked images after embedding stage when embedded the text/binary image in the color
image, the proposed method depends on the mechanism that provided by SOM to determining the BMU
value that was developed in the proposed method that used to determine the optimal hiding site to achieve the
embedding stage and it is our contribution. Our proposed method embedded the binary image inside the color
image under spatial domain based on LSB. The colors of image are classified into set of clusters or regions
based on SOM, the regions have different sizes relied on color distribution in cover image. The varied
distribution of colors is allocating randomly within the cover image. This randomization is exploited in the
proposed approach, because this feature complicates finding a proper position of embedding information in
the cover. The proposed method consists of following main stages:
5.2. Self-organization map stage
Considered one of the most important steps in the process of learning self-organizing maps, note the
following algorithm:
Algorithm 1. Learning process.
Input: Weight, information vector.
Output: SOM Learning
Begin
1. Weight instatement.
2. The information vector is browsed the dataset.
3. BMU is processed.
4. The range of neighbors that will be refreshed is registered.
5. Each load of the neurons inside the range will be changed in accordance with make
them increasingly like the information vector.
6. Steps from 2 to 5 are rehashed for each information vector of the dataset.
7. END; END.
5. Int J Elec & Comp Eng ISSN: 2088-8708
Digital watermarking by utilizing the properties of self-organization map … (Khalid Kadhim Jabbar)
6549
The training sample is supplied to the network SOM, the distance is computed based on Euclidean to all
weight values which arranged as vectors, the most similar neuron to the input sample in term of weight
vector is named the BMU. The BMU weights and nearest neurons in the SOM lattice are regulated
concerning to the input vector. The changing degree of distance reduces with time according to BMU. The
following formula for a weight vector (Wv (t)) with neuron:
Wv(t + 1) = Wv(t) + Θ(v. t)α(t)(D(t) − Wv(t)) (1)
where α(t) is a learning coefficient which is decreasing monotonically and D(t) is denote to the input vector.
The Θ(v, t) indicates a neighborhood function relies on the distance of lattice. The complete memory of SOM
is kept inside of the weighted links between the output and input layer. The weights are modified in apiece
epoch. An epoch takes place as soon as training data is offered to the SOM and the weights are attuned based
on the outcomes of the training data sample.
Algorithm 2. Self-organization map.
Input: O, SOM. (Where O: original image)
Output: BMU.
Begin
1. Read the original image O.
2. Apply SOM over the whole O to produce the nodes On.
3. Initialize a weight for each On (On0, On1,…, Onm) to produce the weighted victor as Ow.
4. For each On find the Euclidean distance between On and Ow to produce OE'. (where OE':
Euclidean distance)
5. Compute Best Matching Unite (BMU) during the iteration process for each pixel of the
whole O by using Ow'.
6. Updates the neighbors of BMU and BMU itself by engage them to input.
7. IF iteration reached THEN
GOTO step 8
ELSE
GOTO step 4: END.
5.3. Choose the optimal embedding site stage
The regions of colors are arranged from larger to smaller distance or verse versa. Then choosing half
of center region for embedding start depending on comparison between two most significant bit (MSB) of the
pixel be for embedding and two MSB of random number, if the (2 MSB of pixel < 2 MSB) of random then
embedding will start from small to large else it will start from large too small. The binary image will be read
either column or row; the method depends on the difference between center byte of secret message and first
eight bits of center pixel.
Algorithm 3. Choose the optimal hiding site.
Input: BMU, Rn. (Where Rn: random number)
Output: Hs, HL.
Begin
1. Measure the regions of BMU to produce the BMU'.
2. Generate the random numbers Rni.
3. Choose the W, where W represent the value of (MSB =2 bits/ 4 bits) for each Rn to
produce Rn'.
4. Choose the W form MSB of each BMU' to produce BMU''.
5. IF Rn < BMU'' THEN
Start form smallest region to largest region for hidden (hiding site is HS).
ELSE
Start form largest to smallest region for hidden (hiding site is HL).
6. END; END.
5.4. Embedding stage
After the process of calculating the weights from the original image and configuring the SOM to get
the BMU through which adding to Rn we will get the best concealment areas, which are HLHs, and as shown
in the Figure 2. After obtaining the concealment sites, the basic embedding stage will take place, that need
the original image, LSB, and binary data (image/Message). Figure 2 illustrate our proposed embedding stage,
while algorithm 4 illustrates the embedding process:
Algorithm 4. Embedding stage.
Input: O, Bi, BMU'', Rn. (where Bi: binary image).
Output: Wi.
Begin
1. Read O, and Bi.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6545-6558
6550
2. Apply SOM to the whole O to arrange color and produce O'.
3. Read BMU''.
4. Read Rn.
5. Perform embedding process between Bi and O' inside (HSHL) according W based on LSB,
to produce watermarked image as Wi.
6. END; END.
During the embedding stage, our proposed method computes the LSB and MSB from the algorithm 5:
Algorithm 5. Compute LSB.
Input: Cove image, Binary (messagelogo)
Output: Stego Image.
1. Read the host image.
2. Read the logo in the binary form.
3. Calculate LSB of each pixel of host image.
4. Replace the LSB of the host image with the corresponding bit of binary sequence one
by one.
5. END; END.
Figure 2. The general diagram of our proposed method
5.5. Extraction stage
The extraction watermark is one of the important stages. Especially in the process of verifying
reliability (image authentication), in addition to illustrate the most important results through which the extent
of integration in the proposed embedding algorithm is known. The extraction stage illustrated in the
algorithm 6:
Algorithm 6. Compute MSB.
Input: Cove image, Binary (messagelogo)
Output: Stego Image
1. Read the host image.
2. Read the logo in the binary form.
3. Calculate MSB of each pixel of host image.
4. Replace the LSB of the host image with the corresponding bits of binary sequence one
by one.
5. END; END.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Digital watermarking by utilizing the properties of self-organization map … (Khalid Kadhim Jabbar)
6551
Algorithm 7. Extraction stage.
Input: Wi, Bi, BMU'', Rn.
Output: O′, W′.
Begin
1. Read Wi.
2. Calculate LSB of each pixel of stego image.
3. Retrieve bits and convert each 8 bit into character.
4. Perform extraction process over Wi from (HS HL) to produce the recovered image O′ and
extracted watermark W′.
5. END; END.
6. EXPERIMENTAL RESULT
The evaluation of our proposed method is labeled for improving the hiding fastness, the evaluation
implemented in various characteristics to improve the performance of hiding process. It also improves the
fastness of hiding and extraction process of images. A group of different samples was dealt with in the results
paragraph in order to obtain different results according to the type of image used by take into consideration
image texture such: high texture, low texture, standard, and painted, all of them with size of 256×256 and
with different image file format such as: (BMP, PNG, and JPG); Table 1 shows our approved samples, while
Figure 3 shows the original samples that used in our proposed method, furthermore; Figure 4 shows the
original watermark (binary logo with size of 128×128); Our proposed method was tested with several hosts
such as: i) color image with binary logo and ii) color image with text message.
Table 1. The samples
Name Texture
Lena Smooth
Baboon High texture
Peppers Low texture
Prush Painted
Figure 3. The different samples with histogram Figure 4. The original watermark
6.1. Color image with binary logo
The most important results that obtained after applying the proposed method between the color
image and the binary watermark will be reviewed. In this regard, two types of basic criteria were relied upon.
It is shown in the following two sections:
6.1.1. Objective side
Figure 5 shows the watermarked image (2 bits MSB), while Figure 6 presents the extracted
watermark, and Figure 7 shows the watermarked images with histograms (4 bits MSB), and the extracted
watermark illustrated in Figure 8. Our proposed method survives the host quality after completing the
embedding process when the value of (MSB=2 bits) with the possibility of retrieving the binary watermark
after the embedding process without any distortion, but when the value of (MSB=4 bits) became lost in the
color image, in addition to the inability to retrieve the watermark. The reason for this is due to two things: the
first is that the embedding process in order to be foolproof and with a good result, the best domain for
embedding process is frequency domain, but this does not mean that the spatial domain does not perform the
desired goal or it is incompetent, but in such a case it is possible that the results are best in the case of four
bits if the embedding process field is frequency domain. The second reason is because the amount of
additional data added per pixel is due to the use of LSB and then the use of MSB again.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6545-6558
6552
Figure 5. The watermarked image (2 bits MSB) with
histogram
Figure 6. The recovered watermark from the
watermarked image (2 bits MSB)
Figure 7. The watermarked image (4 bits MSB) with histogram
9. Int J Elec & Comp Eng ISSN: 2088-8708
Digital watermarking by utilizing the properties of self-organization map … (Khalid Kadhim Jabbar)
6553
Figure 8. The recovered watermark (4 bits MSB)
6.1.2. Subjective side
Through the use of a set of well-known measurement tools such as: mean square error (MSE), peak
signal to noise ratio (PSNR), normalized cross-correlation (NK), accuracy rate (AR), maximum difference
(MD), normalized absolute error (NAE), runtime (MS), and bit error rate (BER), that used to illustrate the
difference between the original image and watermarked image after embedding stage when: (MSB=2 bit, and
MSB=4 bit), furthermore; to obtain the ability of our proposed method to recovered the watermark form the
watermarked image after embedding stage when: (MSB=2 bit, and MSB=4 bit). These measures are
described as:
a. Mean square error (MSE)
𝑀𝑆𝐸 =
1
𝑚𝑛
∑ ∑ [𝐼(𝑖, 𝑗) − 𝐾(𝑖, 𝑗)]2
𝑛−1
𝑗=0
𝑚−1
𝑖=0 (2)
Where I(i, j) represent the original image and 𝐾(𝑖, 𝑗) is an encrypted image. A low value of MSE gives the
optimal difference between original image and its encryption image [17].
b. Peak signal to noise ratio (PSNR)
The fundamental presentation of any stenographic calculation is the stego-picture quality and the
implanting limit that the calculation gives to convey privileged information. The stego quality is measured
utilizing the picture metric pinnacle sign to clamor proportion PSNR:
PSNR=10×log(
2552
𝑀𝑆𝐸
) (3)
The value of MSE is calculated from (2). A high value of PSNR gives the better result of difference between
original image and its encryption image [22].
c. Normalized cross-correlation (NK)
NK=
∑ ∑ [𝐼(𝑖,𝑗).𝐾(𝑖,𝑗)]
𝑛−1
𝑗=0
𝑚−1
𝑖=0
∑ ∑ [𝐼(𝑖,𝑗).𝐼(𝑖,𝑗)]
𝑛−1
𝑗=0
𝑚−1
𝑖=0
(4)
Where I(i, j) represent the original plain image and K(i, j) is an encryption image, low values of NK measure
the differences between the original watermark and extracted watermark.
d. Accuracy rate (AR)
It computes from (6) between original watermark and recover watermark, AR is used to measure the
difference ratio between the original watermark and the recovered one [23], its defined as (5).
𝐴𝑅 = 𝐶𝑃 𝑁𝑃
⁄ (5)
e. Maximum difference (MD)
MD=𝑀𝑎𝑥(𝑀𝑎𝑥(𝐼(𝑖, 𝑗) − 𝐾(𝑖, 𝑗))) (6)
Where I(i, j) represent the original plain image and 𝐾(𝑖, 𝑗) is an encryption image. A large value of (MSE,
MD) gives the difference between original image and its encryption image [24].
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6545-6558
6554
f. Normalized absolute error (NAE)
NAE=
∑ ∑ [|𝐼(𝑖,𝑗)−𝐾(𝑖,𝑗)|]
𝑛−1
𝑗=0
𝑚−1
𝑖=0
∑ ∑ [𝐼(𝑖,𝑗)]
𝑛−1
𝑗=0
𝑚−1
𝑖=0
(7)
Where I(i, j) represent the original plain image and K(i, j) is an encryption image. A large value of NAE
gives the difference between original image and its encryption image [25]. The experimental results of our
proposed method after embedding process that computed between the original image and the watermarked
image when (MSB=2 bits) illustrated in Table 2, while the results when (MSB=2/4 bits) illustrated in Table 3
and the value of MSE and AR are computed between the original watermark and the extracted watermark.
Table 2. The value of quality measurement after embedding process, (LSB=2 bits)
WI MSE PSNR NK AR NAE
Lena 0.0000 51.1115 0.0202 0.9985 0.0099
Baboon 0.0040 51.1138 0.8566 0.99792 0.1070
Pepear 0.0006 50.4347 0.6576 0.99963 0.1006
Brush 0.0963 50.2450 0.3585 0.67520 0.2108
Table 3. The value of quality measurement after embedding process, (MSB=2/ 4 bits)
WI MSE PSNR NK AR NAE
Lena 1.2300 14.2564 1.9936 1.9987 1.2543
Baboon 1.9931 14.0012 1.9854 1.3147 2.6487
Pepear 1.1458 13.5478 1.9993 2.2975 2.4878
Brush 1.9851 13.0010 2.9852 2.0852 2.1132
From the results reached and shown in Tables 2 and 3, it was found that the proposed method has
the ability to maintain the quality of watermarked image with the possibility of retrieving the watermark after
the embedding process, in addition to the possibility of achieving good results with the scales used in this
aspect when the value of (MSB=2 bits), as shown in Table 2 based on the nature of the measures that used to
measure the quality of watermarked image after embedding process, in addition to that the variation is clear
in the results that shown in Table 3, where it was found that the watermark cannot be recovered after
embedding process in addition to the quality of the resulting image is not acceptable; because of the increase
in the amount of extra data per pixel when (MSB=4 bits), it distorted the watermarked image after embedding
process.
6.2. Color image with text message
As we reviewed the results obtained after applying the proposed method between the color image
and the binary watermark, we would like to highlight the most important results that were obtained after the
embedding stage between the host and the text message. So, the two types of computational criteria were
used. It is described in the following two sections:
6.2.1. Runtime analysis based on stego message size
Runtime is the measure of time occupied to retrieve the embedded data with respect to their size.
Millisecond (MS) is the unit to measure runtime, the following mathematical equation to calculate the
runtime as (8).
𝑅𝑢𝑛𝑡𝑖𝑚𝑒 (𝑀𝑆) = 𝑅𝑒𝑡𝑟𝑖𝑒𝑣𝑎𝑙 𝑇𝑖𝑚𝑒 ∗ 𝐷𝑎𝑡𝑎 𝑆𝑖𝑧𝑒 (8)
Secret text messages with size of (3.5 k) were used in order to discover the difference in the results between
the different pictures according to the differences in image texture. It is possible to use other sizes of text
messages and the results are close as they were predetermined. The process of embedding was applied
between the color image and the secret message (in text form), after converting the message to the binary
form then the binary bits are embedded in the host under spatial domain based on LSB when (MSB=2 bits)
the results shown in Table 4, while the result that obtain after embedding process when (MSB=4 bits)
illustrated in Table 5.
In the Tables 4 and 5, text messages of different sizes were used, after converting the secret message
to the binary form, it was embedded in the color image under spatial domain by utilize the properties of LSB,
11. Int J Elec & Comp Eng ISSN: 2088-8708
Digital watermarking by utilizing the properties of self-organization map … (Khalid Kadhim Jabbar)
6555
and by controlling the value of MSB, the following results obtained: i) when (MSB=2 bits) then the run time
values are higher and ii) when (MSB=4 bits) then the run time values are lower.
Table 4. Runtime analysis (MSB=2 bits)
Host Name Size/ K Runtime/sec
Lena 62.7 0.700472
Baboon 87.4 2.035349
Pepear 39.4 0.664984
Brush 90.2 1.985545
Table 5. Runtime analysis (MSB=4 bits)
Host Name Size/ K Runtime/sec
Lena 62.7 1.986514
Baboon 87.4 3.123560
Pepear 39.4 2.112477
Brush 90.2 3.786212
This discrepancy in the results led us to a new result that differs from the results that reached after
embedded the watermark in the color image, due to the difference in the size of the data between the two
cases. Our result is the possibility of achieving better run time in the case of (MSB=4 bits) and conversely in
the case of (MSB=2 bits). So, the runtime is relied on the data Size and retrieval time, the method is more
efficient when lower runtime is obtained.
6.2.2. Bit error rate on image steganography
The performance of image-based information hiding is measured relying on the rate of bit error. The
rate of bit error indicates to the number of bit errors (in the terms of KB) divided by the overall number of
conveyed bits (in the terms of KB) at a certain period of time. The performance of embedded the secret
message inside the host is measured based on the rate of bit error and is formulated as given (9).
𝐵𝑖𝑡 𝐸𝑟𝑟𝑜𝑟 𝑅𝑎𝑡𝑒 (𝐵𝐸𝑅) = 𝐵𝑖𝑡 𝐸𝑟𝑟𝑜𝑟𝑠 𝑆𝑀𝑆 ∗ 100 (9)
According to (3) the lower the rate of bit error, the performance is thought to be higher, Table 6
presents rate of bit error with respect to images in different sizes when (MSB=2 bits), while Table 7 illustrate
the value that obtained when (MSB=4 bits) that measured in terms of KB. The growing size of hidden
message leads to increase the bit error rate.
Table 6. Bit error rate (MSB=2 bits)
Host Name Size/K Bit Error Rate
Village 3.7 13.23
Lena 4.5 19.33
Peppers 3.1 11.14
Table 7. Bit error rate (MSB=4 bits)
Host Name Size/K Bit Error Rate
Village 62.7 53.0023
Lena 87.4 57.0031
Peppers 39.4 51.0114
The increase in the size of secret message leads to an increase in the bit error rate, on the other hand;
the bit error rate has been reduced in the proposed method when the value of (MSB=4 bits) in order to
accommodate the largest amount of data and distribute it over the host area and thus the bit error rate has
become less, and this explained in the previous tables. A different methodology used to present our proposed
method and the results that applied, this difference in the method of presentation is what distinguishes our
proposed method
Our proposed method has the ability to deal with different images texture regardless of their color
nature due to the mechanism that used in the embedding stage while ensuring good results with each image,
on the other hand; there is a convergence between our proposed method with [7], and the results are close in
terms of the quality of the watermarked image after the embedding stage, but the first depends on the gray
image as a basic part of the embedding process after converting it to the binary form, and this represents a
weakness in this method if it is applied to color images. As for the method [10], it gave good results with
MSB depending on the reverse method that aimed to embed the secret data in the encrypted image which is
generated from the same image depending on the error coefficient. It in turn makes the proposed method
good with MSB technology but it does not deal with LSB while our method had good results with the use of
LSB and also with MSB in including confidential data in the color image in terms of execution time.
On the other hand, the comparison between our proposed method and [13] resulted in close results
with the standards used to measure the quality of the watermarked image with the adoption of the same LSB
technique in the embedding process. In this state, if the embedding process is based on MSB then the
watermarked image will be subject to distortion after embedding stage and watermark bits cannot be
retrieved from it. As for the other methods mentioned in the previous studies, the proposed method was
compared from a group of previous methods, and the results were analyzed according to Table 8 represents
the results that were reached during that comparison.
12. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6545-6558
6556
From Table 8, it is noted that our proposed method has the ability to survive image quality after the
embedding stage when using LSB technique, as well as with using MSB; on the other hand, the execution
time spent is better with using MSB to hide the secret message inside the color image. Especially when
(MSB=4 bits), and these results were different from what the methods that were compared with other
methods that mentioned, and the reason for that is due to our use of SOM technique which allowed us to
determine the optimal hiding site after utilizing a BMU which it developed in our proposed method to work
on determining the best hiding site according to the nature of the media (color image, text).
Table 8. Comparison between the proposed methods with others
Proposed Method Embedding Technique Time (millisecond) MSE (dB) PSNR (dB) Survive
LSB MSB LSB MSB LSB MSB LSB MSB
[2] LSB/MSB 159 262 0.307 0.114 53.263 15.492 Strong Middle
[9] LSB/MSB/NHB 160 280 0.371 52.481 52.480 10.380 Strong Middle
[6] LSB/MSB 232 319 0.581 21.380 50.910 21.381 Strong Middle
[11] LSB/MSB 178 290 0.410 110.977 51.320 18.331 Strong Weak
[12] LSB/MSB 266 385 0.031 22.378 49.592 22.917 Middle Middle
[14] LSB/MSB 301 395 0.007 97.044 46.010 42.401 Middle Weak
Our proposed
method
LSB/MSB/SOM 1.986 0.700 0.000 1.230 51.111 14.256 Strong Strong
7. DISCUSSION
The main challenge that illustrated in the proposed method is who to make the method able to deal
text and binary image in same time with survive the quality of the host under spatial domain by utilizing the
properties of SOM by using LSB, and MSB. The scientific contribution in this paper is through comparison
in the results that are obtained after hiding the binary image in the color image, taking into account the
variation of images texture that used in the proposed method, on the other hand, the secret message data that
is hidden in the color image, all within the time domain with different sizes for confidential message files.
The embedding stage is accomplished by taking advantage of SOM properties depending on LSB, MSB, and
we also controlled the MSB values and observed the variance in the results obtained and explained that.
On the other hand; The methodology used in the proposed method differs from the others through
the use of the same embedding and retrieval algorithm in the case of including a binary image with the color
image, as well as including the secret message in the same color images that were dealt with in the first case,
the proposed method relied on three techniques: LSB, MSB, and SOM in order to determine the best location
for concealment by relying on BMU, which determines that location depending on the type of host and the
type of medium, the proposed method deals with all types of color images regardless of the color nature of
that image and it also deals with media of the type text, binary image and this in turn, the proposed method
provided the ability to determine the feasibility of the embedding and retrieval algorithms according to the
used technique LSB and MSB depending on the values of each.
8. CONCLUSION
The results obtained proved that the proposed method preserved the image quality after the
embedding process with the possibility of retrieving the watermark successfully when the value of (LSB,
MSB=2 bits), and when we changed the values for (LSB, MSB=4 bits), it is noticed that the difference in that
the resulting image was of lower quality with (LSB, MSB=4 bits). The possibility of retrieving the binary
image is due to the increase in the value of the last bit that was hidden, and the aim of this experiment is to
ensure the possibility of the technology according to the values specified for it in maintaining the quality of
the host image after the embedding process. On the other hand, the quality of the host image was not affected
after the inclusion process when the values of (LSB, MSB=4 bits), on the contrary, gave better results at the
time of implementation, and the reason is due to the color nature of the host image and on the other hand, the
embedding time was short and the ability to retrieve the secret message. May be a group of known techniques
were used in the proposed method, such as: (SOM, LSB, and MSB), which rely on BMU, Rn to determine the
best location for concealment.
After the proposed method was compared with a set of previous methods, the results were
converging in several aspects, including the values that were reached using the known standards that are used
to measure the quality of the image in this aspect, and it was also found that the proposed method has the
ability to provide a safe environment for the inclusion of confidential messages in true images as well as the
inclusion of binary images in color images so that we can later achieve a higher level of security for these
media. From the obtained results, our proposed method presents a semi-fragile watermark scheme with
13. Int J Elec & Comp Eng ISSN: 2088-8708
Digital watermarking by utilizing the properties of self-organization map … (Khalid Kadhim Jabbar)
6557
ability to survive the watermarked image after mild-processing. The methodology used in the proposed
method is different and it is almost a new attempt in the aspect of using different media in the same proposed
algorithm, as images and texts were dealt with simultaneously, and this is considered a good contribution to
this topic.
ACKNOWLEDGEMENTS
The authors would like to thank Mustansiriyah University (www.uomustansiriyah.edu.iq) Baghdad,
Iraq for its support in the present work.
REFERENCES
[1] Akhi and S. Gawande, “A review on steganography methods,” International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, vol. 2, no. 10, pp. 4635–4638, 2013.
[2] F. Ernawan, “Tchebichef image watermarking along the edge using YCoCg-R color space for copyright protection,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 3, pp. 1850–1860, Jun. 2019, doi:
10.11591/ijece.v9i3.pp1850-1860.
[3] V. A. Kumar, C. Dharmaraj, and C. S. Rao, “A hybrid digital watermarking approach using wavelets and LSB,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 7, no. 5, pp. 2483–2495, Oct. 2017, doi:
10.11591/ijece.v7i5.pp2483-2495.
[4] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking system,” in Proceedings of SPIE - The International
Society for Optical Engineering, Apr. 1999, pp. 226–239, doi: 10.1117/12.344672.
[5] S. A. Parah, J. A. Sheikh, U. I. Assad, and G. M. Bhat, “Realisation and robustness evaluation of a blind spatial domain
watermarking technique,” International Journal of Electronics, vol. 104, no. 4, pp. 659–672, Apr. 2017, doi:
10.1080/00207217.2016.1242162.
[6] F. Ernawan, S.-C. Liew, Z. Mustaffa, and K. Moorthy, “A blind multiple watermarks based on human visual characteristics,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 4, pp. 2578–2587, Aug. 2018, doi:
10.11591/ijece.v8i4.pp2578-2587.
[7] A. Alabaichi, M. A. Ali K. Al-Dabbas, and A. Salih, “Image steganography using least significant bit and secret map techniques,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 935–946, Feb. 2020, doi:
10.11591/ijece.v10i1.pp935-946.
[8] Y. Peng, X. Niu, L. Fu, and Z. Yin, “Image authentication scheme based on reversible fragile watermarking with two images,”
Journal of Information Security and Applications, vol. 40, pp. 236–246, Jun. 2018, doi: 10.1016/j.jisa.2018.04.007.
[9] C. Qin, H. Wang, X. Zhang, and X. Sun, “Self-embedding fragile watermarking based on reference-data interleaving and adaptive
selection of embedding mode,” Information Sciences, vol. 373, pp. 233–250, Dec. 2016, doi: 10.1016/j.ins.2016.09.001.
[10] S. O.Akinola and A. A.Olatidoye, “On the image quality and encoding times of LSB, MSB and combined LSB-MSB
steganography algorithms using digital images,” International Journal of Computer Science and Information Technology, vol. 7,
no. 4, pp. 79–91, Aug. 2015, doi: 10.5121/ijcsit.2015.7407.
[11] Y. Y. Wai and E. E. Myat, “Comparison of LSB, MSB and new hybrid (NHB) of steganography in digital image,” International
Journal of Engineering Trends and Applications (IJETA), vol. 5, no. 4, pp. 16–19, 2018.
[12] L. Rakhmawati, W. Wirawan, and S. Suwadi, “A recent survey of self-embedding fragile watermarking scheme for image
authentication with recovery capability,” EURASIP Journal on Image and Video Processing, vol. 2019, no. 1, Dec. 2019, doi:
10.1186/s13640-019-0462-3.
[13] C.-F. Lee, J.-J. Shen, Z.-R. Chen, and S. Agrawal, “Self-embedding authentication watermarking with effective tampered
lotcation detection and high-quality image recovery,” Sensors, vol. 19, no. 10, May 2019, doi: 10.3390/s19102267.
[14] T. Huynh-The and S. Lee, “Color image watermarking using selective MSB-LSB embedding and 2D Otsu thresholding,” in 2017
IEEE International Conference on Systems, Man, and Cybernetics (SMC), Oct. 2017, pp. 1333–1338, doi:
10.1109/SMC.2017.8122798.
[15] D. Wang, X. Zhang, C. Yu, and Z. Tang, “Reversible data hiding in encrypted image based on multi-MSB embedding strategy,”
Applied Sciences, vol. 10, no. 6, Mar. 2020, doi: 10.3390/app10062058.
[16] A. Khurana and B. M. Mehta, “Comparison of LSB and MSB based image steganograph,” International Journal of Computer
Science And Technology, vol. 3, no. 3, pp. 870–871, 2012.
[17] S. Prasad and A. K. Pal, “A secure fragile watermarking scheme for Protecting integrity of digital images,” Iranian Journal of
Science and Technology, Transactions of Electrical Engineering, vol. 44, no. 2, pp. 703–727, Jun. 2020, doi: 10.1007/s40998-
019-00275-7.
[18] B. Bolourian Haghighi, A. H. Taherinia, and A. Harati, “TRLH: Fragile and blind dual watermarking for image tamper detection
and self-recovery based on lifting wavelet transform and halftoning technique,” Journal of Visual Communication and Image
Representation, vol. 50, pp. 49–64, Jan. 2018, doi: 10.1016/j.jvcir.2017.09.017.
[19] U. Asan and S. Ercan, “An introduction to self-organizing maps,” in Computational Intelligence Systems in Industrial
Engineering, 2012, pp. 295–315.
[20] M. Alia and K. Suwais, “Improved steganography scheme based on fractal set,” The International Arab Journal of Information
Technology, vol. 17, no. 1, pp. 128–136, Jan. 2020, doi: 10.34028/iajit/17/1/15.
[21] V. L. Reddy, “Novel chaos based steganography for images using matrix encoding and cat mapping techniques,” Information
Security and Computer Fraud, vol. 3, no. 1, pp. 8–14, 2015, doi: 10.12691/iscf-3-1-2.
[22] S. A. Mehdi, K. K. Jabbar, and F. H. Abbood, “Image encryption based on the novel 5d hyper-chaotic system via improved AES
algorithm,” International Journal of Civil Engineering and Technology (IJCIET), vol. 9, no. 10, pp. 1841–1855, 2018.
[23] K. S. Rawat and D. S. Tomar, “Digital watermarking schemes for authorization against copying or piracy of color images,” Indian
Journal of Computer Science and Engineering, vol. 1, no. 4, pp. 295–300, 2010.
[24] F. Memon, M. A. Unar, and S. Memon, “Image quality assessment for performance evaluation of focus measure operators,”
Mehran University Research Journal of Engineering and Technology, vol. 34, no. 4, pp. 379–386, 2015.
[25] K. V. Thakur, O. H. Damodare, and A. M. Sapkal, “Identification of suited quality metrics for natural and medical images,”
Signal & Image Processing: An International Journal, vol. 7, no. 3, pp. 29–43, Jun. 2016, doi: 10.5121/sipij.2016.7303.
14. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 6, December 2022: 6545-6558
6558
BIOGRAPHIES OF AUTHORS
Khalid Kadhim Jabbar Baghdad-Iraq, B.Sc. in Computer Science, Baghdad
University, Baghdad, Iraq, 2001. HI-DUP in Data Security, ICCI, Baghdad, Iraq, 2002. M.Sc.
in The Science of Software Engineering, ICCI, 2012. Asst. Pro. In Computer Science
Department, Collage of Education, Mustansiriyah University. Scientific reviewer, Designated
Reviewer, Editorial Board Member, and member of the Technical Program Committee in local
and international journals (Scopus). My scientific interests include the majors of: information/
data security, image processing, chaotic system, steganography, AI, software engineering,
digital watermarking, data structure, and digital forensic. He can be contacted at email:
khalid_jabbar@yahoo.com, khalidk.jabbar@uomustansiriyah.edu.iq.
Munthir Bahir Tuieb Baghdad-Iraq, date of Birth 2941987, BSc. In Software
Engineering, Imam Ja'afar Al-Sadiq University, Baghdad-Iraq, 2009. MSc in Software
Engineering Science, ICCI, Baghdad, Iraq, 2012. PhD in Computer Science, ICCI, Baghdad,
Iraq, 2021. The major field of study is: Network and Communication, Driven and Maintenance
and Information Security. He can be contacted at email: munthir87@yahoo.com.
Salam A. Thajeel received the BSc degree in computer science from
Mustansiriyah University, Baghdad-Iraq, in 2000. His M.Sc. degree in computer science
(pattern recognition) from Iraqi Commission for Computer and Informatics, Informatics
Institute for Postgraduate studies, in 2003; and his Ph.D. degree in computer science (digital
forensic) from University Technology Malaysia (UTM), Malaysia, in 2016. He is currently an
assistant professor at University of Technology-Iraq. His research interest includes digital
forensic, computer vision, multimedia information security. He can be contacted at email:
sath72@gmail.com.