The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder.
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachCSCJournals
While it is possible to make a patient's medical images available to a practicing radiologist online e.g. through open network systems inter connectivity and email attachments, these methods don't guarantee the security, confidentiality and tamper free reliability required in a medical information system infrastructure. The possibility of securely and covertly transmitting such medical images remotely for clinical interpretation and diagnosis through a secure steganographic technique was the focus of this study.
We propose a method that uses an Enhanced Least Significant Bit (ELSB) steganographic insertion method to embed a patient's Medical Image (MI) in the spatial domain of a cover digital image and his/her health records in the frequency domain of the same cover image as a watermark to ensure tamper detection and nonrepudiation. The ELSB method uses the Marsenne Twister (MT) Pseudo Random Number Generator (PRNG) to randomly embed and conceal the patient's data in the cover image. This technique significantly increases the imperceptibility of the hidden information to steganalysis thereby enhancing the security of the embedded patient's data.
In measuring the effectiveness of the proposed method, the study adopted the Design Science Research (DSR) methodology, a paradigm for problem solving in computing and Information Systems (IS) that involves design and implementation of artefacts and methods considered novel and the analytical testing of the performance of such artefacts in pursuit of understanding and enhancing an existing method, artefact or practice.
The fidelity measures of the stego images from the proposed method were compared with those from the traditional Least Significant Bit (LSB) method in order to establish the imperceptibility of the embedded information. The results demonstrated improvements of between 1 to 2.6 decibels (dB) in the Peak Signal to Noise Ratio (PSNR), and up to 0.4 MSE ratios for the proposed method.
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...CSCJournals
In healthcare industry, the patient\'s medical data plays a vital role because diagnosis of any ailments is done by using those data. The high volume of medical data leads to scalability and maintenance issues when using health-care provider\'s on-site picture archiving and communication system (PACS) and network oriented storage system. Therefore a standard is needed for maintaining the medical data and for better diagnosis. Since the medical data reflects in a similar way to individuals’ personal information, secrecy should be maintained. Maintaining secrecy can be done by encrypting the data, but as medical data involves images and videos, traditional text based encryption/decryption schemes are not adequate for providing confidentiality. In this paper, we propose an algorithm for securing the DICOM format medical archives by providing better confidentiality and maintaining their integrity. Our contribution in this algorithm is of twofold: (1) Development of Improved Chaotic based Arnold Cat Map for encryption/decryption of DICOM files and (2) Applying a new hash algorithm based on chaotic theory for those encrypted files for maintaining integrity. By applying this algorithm, the secrecy of medical data is maintained. The proposed algorithm is tested with various DICOM format image archives by studying the following parameters i) PSNR - for quality of images and ii) Key - for security.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachCSCJournals
While it is possible to make a patient's medical images available to a practicing radiologist online e.g. through open network systems inter connectivity and email attachments, these methods don't guarantee the security, confidentiality and tamper free reliability required in a medical information system infrastructure. The possibility of securely and covertly transmitting such medical images remotely for clinical interpretation and diagnosis through a secure steganographic technique was the focus of this study.
We propose a method that uses an Enhanced Least Significant Bit (ELSB) steganographic insertion method to embed a patient's Medical Image (MI) in the spatial domain of a cover digital image and his/her health records in the frequency domain of the same cover image as a watermark to ensure tamper detection and nonrepudiation. The ELSB method uses the Marsenne Twister (MT) Pseudo Random Number Generator (PRNG) to randomly embed and conceal the patient's data in the cover image. This technique significantly increases the imperceptibility of the hidden information to steganalysis thereby enhancing the security of the embedded patient's data.
In measuring the effectiveness of the proposed method, the study adopted the Design Science Research (DSR) methodology, a paradigm for problem solving in computing and Information Systems (IS) that involves design and implementation of artefacts and methods considered novel and the analytical testing of the performance of such artefacts in pursuit of understanding and enhancing an existing method, artefact or practice.
The fidelity measures of the stego images from the proposed method were compared with those from the traditional Least Significant Bit (LSB) method in order to establish the imperceptibility of the embedded information. The results demonstrated improvements of between 1 to 2.6 decibels (dB) in the Peak Signal to Noise Ratio (PSNR), and up to 0.4 MSE ratios for the proposed method.
An Integrated Algorithm supporting Confidentiality and Integrity for secured ...CSCJournals
In healthcare industry, the patient\'s medical data plays a vital role because diagnosis of any ailments is done by using those data. The high volume of medical data leads to scalability and maintenance issues when using health-care provider\'s on-site picture archiving and communication system (PACS) and network oriented storage system. Therefore a standard is needed for maintaining the medical data and for better diagnosis. Since the medical data reflects in a similar way to individuals’ personal information, secrecy should be maintained. Maintaining secrecy can be done by encrypting the data, but as medical data involves images and videos, traditional text based encryption/decryption schemes are not adequate for providing confidentiality. In this paper, we propose an algorithm for securing the DICOM format medical archives by providing better confidentiality and maintaining their integrity. Our contribution in this algorithm is of twofold: (1) Development of Improved Chaotic based Arnold Cat Map for encryption/decryption of DICOM files and (2) Applying a new hash algorithm based on chaotic theory for those encrypted files for maintaining integrity. By applying this algorithm, the secrecy of medical data is maintained. The proposed algorithm is tested with various DICOM format image archives by studying the following parameters i) PSNR - for quality of images and ii) Key - for security.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Novel framework for optimized digital forensic for mitigating complex image ...IJECEIAES
Digital Image Forensic is significantly becoming popular owing to the increasing usage of the images as a media of information propagation. However, owing to the presence of various image editing tools and software, there is also an increasing threat to image content security. Reviewing the existing approaches to identify the traces or artifacts states that there is a large scope of optimization to be implemented to enhance the processing further. Therefore, this paper presents a novel framework that performs cost-effective optimization of digital forensic technique with an idea of accurately localizing the area of tampering as well as offers a capability to mitigate the attacks of various forms. The study outcome shows that the proposed system offers better outcomes in contrast to the existing system to a significant scale to prove that minor novelty in design attributes could induce better improvement with respect to accuracy as well as resilience toward all potential image threats.
Image Steganography Techniques: An OverviewCSCJournals
Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
With the surge in modern research focus towards Pervasive Computing, lot of techniques and challenges
needs to be addressed so as to effectively create smart spaces and achieve miniaturization. In the process of
scaling down to compact devices, the real things to ponder upon are the Information Retrieval challenges.
In this work, we discuss the aspects of multimedia which makes information access challenging. An
Example Pattern Recognition scenario is presented and the mathematical techniques that can be used to
model uncertainty are also presented for developing a system that can sense, compute and communicate in
a way that can make human life easy with smart objects assisting from around his surroundings.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...IJDKP
Huge volume of data from domain specific applications such as medical, financial, library, telephone,
shopping records and individual are regularly generated. Sharing of these data is proved to be beneficial
for data mining application. On one hand such data is an important asset to business decision making by
analyzing it. On the other hand data privacy concerns may prevent data owners from sharing information
for data analysis. In order to share data while preserving privacy, data owner must come up with a solution
which achieves the dual goal of privacy preservation as well as an accuracy of data mining task –
clustering and classification. An efficient and effective approach has been proposed that aims to protect
privacy of sensitive information and obtaining data clustering with minimum information loss
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Novel framework for optimized digital forensic for mitigating complex image ...IJECEIAES
Digital Image Forensic is significantly becoming popular owing to the increasing usage of the images as a media of information propagation. However, owing to the presence of various image editing tools and software, there is also an increasing threat to image content security. Reviewing the existing approaches to identify the traces or artifacts states that there is a large scope of optimization to be implemented to enhance the processing further. Therefore, this paper presents a novel framework that performs cost-effective optimization of digital forensic technique with an idea of accurately localizing the area of tampering as well as offers a capability to mitigate the attacks of various forms. The study outcome shows that the proposed system offers better outcomes in contrast to the existing system to a significant scale to prove that minor novelty in design attributes could induce better improvement with respect to accuracy as well as resilience toward all potential image threats.
Image Steganography Techniques: An OverviewCSCJournals
Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
With the surge in modern research focus towards Pervasive Computing, lot of techniques and challenges
needs to be addressed so as to effectively create smart spaces and achieve miniaturization. In the process of
scaling down to compact devices, the real things to ponder upon are the Information Retrieval challenges.
In this work, we discuss the aspects of multimedia which makes information access challenging. An
Example Pattern Recognition scenario is presented and the mathematical techniques that can be used to
model uncertainty are also presented for developing a system that can sense, compute and communicate in
a way that can make human life easy with smart objects assisting from around his surroundings.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
TUPLE VALUE BASED MULTIPLICATIVE DATA PERTURBATION APPROACH TO PRESERVE PRIVA...IJDKP
Huge volume of data from domain specific applications such as medical, financial, library, telephone,
shopping records and individual are regularly generated. Sharing of these data is proved to be beneficial
for data mining application. On one hand such data is an important asset to business decision making by
analyzing it. On the other hand data privacy concerns may prevent data owners from sharing information
for data analysis. In order to share data while preserving privacy, data owner must come up with a solution
which achieves the dual goal of privacy preservation as well as an accuracy of data mining task –
clustering and classification. An efficient and effective approach has been proposed that aims to protect
privacy of sensitive information and obtaining data clustering with minimum information loss
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
An efficient data masking for securing medical data using DNA encoding and ch...IJECEIAES
Data security is of utmost importance for ubiquitous computing of medical/diagnostic data or images. Along with that must consider preserving the privacy of patients. Recently, deoxyribose nucleic acid (DNA) sequences and CSs are jointly used for building efficient data masking models. However, the state-of-art method is not robust against cropping attack (CA) and noise. Since in the existing model most of the digits of each pixel are not changed. This work represents efficient-data-masking (EDM) using chaos and the DNA based encryption technique for securing the healthcaredata. For overcoming the research challenges the effective-bit-scrambling technique is needed. At first, this work represents an efficient bit-scrambling using the logistic-sin-map, and the PS-utilizing the chaotic system. Then the substitution is carried out between them to resist against SA, DA, and CA. the experiments are conducted on the standard assuming the diverse images. The gained result represents that the introduced model is very efficient when compared to the existing models.
Medical image is an important parameter for diagnosis to many diseases. Now day’s
telemedicine is major treatment based on medical images. The World Health Organization
(WHO) established the Global Observatory for eHealth (GOe) to review the benefits that
Information and communication technologies (ICTs) can bring to health care and patients’
wellbeing. Securing medical images is important to protect the privacy of patients and assure
data integrity. In this paper a new self-adaptive medical image encryption algorithm is proposed
to improve its robustness. A corresponding size of matrix in the top right corner was created by
the pixel gray-scale value of the top left corner under Chebyshev mapping. The gray-scale value
of the top right corner block was then replaced by the matrix created before. The remaining
blocks were encrypted in the same manner in clockwise until the top left corner block was finally
encrypted. This algorithm is not restricted to the size of image and it is suitable to gray images
and color images, which leads to better robustness. Meanwhile, the introduction of gray-scale value diffusion system equips this algorithm with powerful function of diffusion and disturbance.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
Significant Data Hiding through Discrete Wavelet Transformation ApproachEswar Publications
The methods of communication of invisible information have become need in the today’s digital era. The network connectivity and high speed devices made easy passing massive data instantly. As boom of the huge data transmission has taken place due to easy use of the technology, the protection of the data has become prime issue. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. We proposed a novel integration of an incorporating text and image steganography to find a solution for improve security and protect data. The proposed methods shows a high level of efficiency and robustness by combining text and image which involves the scheme of discrete wavelet transformation combining text and image by secretly embeds encrypted secrete message text data (cipher text) or text image in the content of a digital image. A comparative study of the different techniques has been illustrated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR).
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
An Effective Semantic Encrypted Relational Data Using K-Nn ModelClaraZara1
Data exchange and data publishing are becoming an important part of business and academic practices. Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be provided for the ownership of shared data, without revealing its usage under a wide range of machine learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object remain unaltered. The algorithms preserve the both right protection and utility preservation. The right protection scheme is based on watermarking. Watermarking methodology preserves the distance relationships.
Data Hiding In Medical Images by Preserving Integrity of ROI Using Semi-Rever...IJERA Editor
Text fusion in images is an important technology for image processing. We have lots of important information related to the patient’s reports and need lots of space to store and the proper position and name which relates that image with that data. In our work we are going to find out the ROI (region of interest) for the particular image and will fuse the related document in the NROI (non-region of interest) of the image, till yet we have many techniques to fuse text data in the medical images one of form them is to fuse data at the boarders of the images and build the particular and pre-defined boarder space. We have propose an algorithm in which we first find out the area of interest and after that we find noisy pixels of the image to embed data in that noisy portions of the image. We use wavelets for smoothing images and segmentation process for extracting region of interest. Coordinates of the noisy pixels have been located and data has been embedded in those pixels .The used embedding technique embed data in least significant bits, hence does not degrade the quality of the image to unacceptable limits. Results show that it gives good PSNR and MSE values which are used for measuring quality effected performance.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Water billing management system project report.pdf
Efficiency of LSB steganography on medical information
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 5, October 2021, pp. 4157~4164
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i5.pp4157-4164 4157
Journal homepage: http://ijece.iaescore.com
Efficiency of LSB steganography on medical information
Oluwakemi Christiana Abikoye1
, Roseline Oluwaseun Ogundokun2
1
Department of Computer Science, University of Ilorin, Kwara State, Nigeria
2
Department of Computer Science, Landmark University Omu Aran, Kwara State, Nigeria
Article Info ABSTRACT
Article history:
Received Mar 31, 2020
Revised Mar 10, 2021
Accepted Mar 22, 2021
The development of the medical field had led to the transformation of
communication from paper information into the digital form. Medical
information security had become a great concern as the medical field is
moving towards the digital world and hence patient information, disease
diagnosis and so on are all being stored in the digital image. Therefore, to
improve the medical information security, securing of patient information
and the increasing requirements for communication to be transferred between
patients, client, medical practitioners, and sponsors is essential to be secured.
The core aim of this research is to make available a complete knowledge
about the research trends on LSB Steganography Technique, which are
applied to securing medical information such as text, image, audio, video and
graphics and also discuss the efficiency of the LSB technique. The survey
findings show that LSB steganography technique is efficient in securing
medical information from intruder.
Keywords:
Information hiding
Least significant bit
Medical information
Security
Steganography
This is an open access article under the CC BY-SA license.
Corresponding Author:
Roseline Oluwaseun Ogundokun
Department of Computer Science
Landmark University
Omu Aran, Kwara State, Nigeria
Email: ogundokun.roseline@lmu.edu.ng
1. INTRODUCTION
Steganography can be described as an art and science of securing information communication where
the secret data is hidden in his file and it application areas include communication of data, military,
healthcare, voting system and so on. Due to rapid growth of the multimedia and internet, confidential
message is commonly stored in digital media and transmitted via the internet [1]-[11]. Steganography is
derived from Greek words Stego which means cover and Grafia which denotes writing put together covered
writing. Information is hidden in the images in image steganography [12]-[15]. Capacity, security and
robustness are the three-different aspect of information hiding that oppose each other [16]-[24]. Some
categories of documents hiding methodologies are watermarking, steganography and reversible data hiding
(RDH). Watermarking refers to an order of numeral bits positioned in a digital concealment object that
recognize the document’s patent information [25], [26]. Steganography convert message and also modifies
the image in a way that merely the disseminator of the message and the projected receiver would be able to
discover the message while being sent [27]-[31]. In RDH, concealment object holds the secret data as well
[32]-[34]. Information like patient’s personal details, medical history such as past test results and current test
reports are the data of a patient that needs to be protected [35]. The methods that can be used to protect
patient’s information can be categorized into two ways [35].
− Patient’s ID with the report shouldn’t be incorporated so as to maintain the patient’s privacy.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4157 - 4164
4158
− It will be difficult for an attacker to extract an information when he gains access to the patient’s reports
and this will rely on the strength of the steganography algorithm and proper management of the key
between the concerned parties such as the medical practitioner and the client
Though these techniques work well, they possess certain limitations also. Hence, it is established in
this research that steganography can be used to protect medical information in digital form by embedding the
patient’s reports and identification into a cover image and this can only be access by an authorized person
that is the person having the confidential stego key.
2. LITERATURE REVIEW
The method used for this research is downloading of many past literatures and the ones relating to
this study were reviewed and conclusions were drawn from the survey conducted. The steganography
algorithm surveyed here is least significant bit technique (LSB).
2.1. Steganography
Steganography can be described as an art and science of securing information communication where
the secret data is hidden in his file and its application areas include communication of data, military,
healthcare, voting system and so on [36]. Steganography is derived from Greek words Stego which means
cover and Grafia which denotes writing put together covered writing. Information is hidden in the images in
image steganography [37]. Capacity, security and robustness are the three-different aspect of information
hiding that oppose each other [38]. There are various steganography techniques used based on the
information to be hidden is shown in Figure 1.
Figure 1. General model for steganography [39]
2.2. Method of information hiding
This can be categorized into three stages namely: Embedding, Attacking and Extracting stages.
Figure 2 displayed the stages.
Figure 2. Process of data hiding [35]
3. Int J Elec & Comp Eng ISSN: 2088-8708
Efficiency of LSB steganography on medical information (Oluwakemi Christiana Abikoye)
4159
In Figure 1, the embedding algorithm and the undisclosed key are used to entrench the undisclosed
information into the concealment object (text, image, audio and video) which gives stego image, the stego
image is then transmitted over a channel (network) while in the attacking stage, the stego image can be
attached or becomes degraded by certain noise and this implies that the stego image can be transformed or
damaged and lastly in the extracting phase, the undisclosed documents is extracted from the stego image via
using the same algorithm and undisclosed key which was applied in the embedding stage.
The following factors are considered in designing a perfect data hiding system
− Imperceptibility
− Security
− Capacity
− Robustness
− Embedding complexity
2.3. Steganography methods
The methods of Steganography can be classified into seven categories, in spite of the fact that in
some cases, accurate or precise classification is not possible [40] and this is shown in Figure 3. Figure 4
displays the image steganography categories that had been in trend and used by different researchers.
Figure 3. Categories of steganography [41]
Figure 4. Classification of medical image steganography [38]
2.4. Related works
Masoud and Ghazi [42] proposed the improvement of the least significant digit (LSD). Digital
Watermark method rooted on optimizing the chosen pixels in the protected image. The exact reliability was
not attained through the unsystematic choosing of pixel’s value. In this research work, authors implemented
the use of the least significant digit (LSD) Digital Watermark Technique and at the same time the method of
optimizing preference are employed. Optimizing preference lessens the quantity of pixel's value that are
going to be altered. The digital watermark and digital cover image are in gray scale. The handling domain is
in spatial domain.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4157 - 4164
4160
Muhammad et al. [43] postulated an innovative structure aimed at rightfulness of optical
constituents by means of steganography. It makes use of gleaming level surface of contributed representation
for concealed records entrenching utilizing Morton Scrutinizing- precise least significant bits replacement
technique. The undisclosed records were scrambled by means of trio- parallel encoded process preceding
implanting, enhancing an extra steady safety for validation.
Juneja and Sandhu [44] put forward an invulnerable robust method of information. Two components
based Least significant bit (LBS) procedures for enclosing hidden documents in the LSB’s of blue
components and partial green components of arbitrary constituent points in the boundaries of the image. They
further their study by coming up with a flexible LSB centered steganography for inserting documents
established on records existing in LSB’s of red, green and blue constituents of arbitrarily preferred picture
elements over flat regions. They also integrated an advanced encryption standard (AES) in the proposed
method which makes it more robust.
Thiyagarajan et al. [45] suggested an advanced elevated dimension of steganography structure by
means of 3 dimensional geometrical representations. The process re-trilaterated a proportion of a three-sided
engagement and implants the confidential communication into a recently incorporated location of a triangular
mesh. The algorithm presented by the study also opposed against consistent assurance conversions such as
selecting, spinning and escalating. The stego password is produced out of the piece of information to be
implanted. The embedment is carried out with the use of the vertices of the triangle.
Priya et al. [46] postulated a peculiar scheme grounded on LSB. Entrenching of data is executed
making use of a set of picture elements as a component, whereas LSB of the primary element convey a single
portion of communication and an assignment to 2 picture elements values convey 1 extra portion of the
report. The approach put forward by the authors displays more superior enhanced achievement in positions of
misrepresentation and protection in opposition to prevailing steganalysis. A threshold is being used for
embedding in the sharper edge regions. The study as well compared and contrasts the PSNR value for
flexible and non-flexible procedures of records concealing in grey proportion and hue drawing.
Sharmila and Shanthakumari [47] presented an algorithm that works on colour images (JPEG). In
order to make better the robustness of the system, the edges of the image are being selected for data hiding.
The section situated at the stronger boundaries make available extra complex arithmetical characteristics and
besides they are extremely reliant or relying on the image contents. Alterations are effortlessly noticed in
smooth regions than at the sharper edges. RGB constituents are disconnected or detached and are based on a
share key in the embedding techniques, single or extra constituents are chosen. The protected representation
is bisected into non-coinciding segments. Every batch is being revolved with an unsystematic ratio controlled
by a protected password. The outcome presentation is reorganized as a line angle A by raster browsing. The
concealed idea is scrambled by means of LSBMR; 2 hidden portions could be implanted in the direction of
every entrenching division. Using a threshold, the piece of information is entrenched following the
computation of the dimensions calculation by means of a verge.
Fahim et al. [48] recommended noise filtering in the beginning prior to the implantation.
Subsequently to obtain at acquiring point, automated repetition is used for inaccuracy discernment and
amendment. Encryption and data hiding are integrated in a single step in order to have a protected
dissemination of data. Anchor representations as well as confidential documents are converted into portion
stream. RGB values before scrambling of protected communication center cleaning is employed. The
contribution values are transformed to ASCII and subsequently to binary, the anchor representations red,
green and blue values are transformed to binate. Replacement is executed letter by letter by means of
encoding password. Conceal bit stream is used to substitute the LSB of each and every pixel octet.
Inaccuracy discovered and correction establishes accurate transferal of data.
Luo et al. [49] suggested a boundary flexible system that could determine the entrenching parts
specified the proportions as concerns confidential piece of information and the variance between two
successive pixels in the cover image. The scheme first initializes some variables in the data implanting stage,
and these variables are used for roughly calculation of the capacity of the chosen regions. In the end, stego
image is acquired subsequent to pre-processing. A region adaptive scheme is put in an application directed
towards spatial LSB region along with the divergence in the midst of 2 neighboring constituent is applied as a
standard for area choosing and LSB identical Reconsidered by way of documents masking process.
Yang and Tsai [50] predicted an approach to intensify the histogram-based reversible data hiding
technique. The predictive stages used for the technique are two. The greatest part of the pixels is forecasted
by their dual neighborhood constituent together with quartet immediate constituent in the file-established and
chess-panel established method. The differentiation amount of every picture element amidst the authentic
model and the stego-model stay within the bound of ±1. Constituent in different files will be projected by
constituents in the uniform (alike) files or with the order reversed, in interleaving forecast. The implanting
procedure requires using the foretelling inaccurate substance of different files to create a histogram to
5. Int J Elec & Comp Eng ISSN: 2088-8708
Efficiency of LSB steganography on medical information (Oluwakemi Christiana Abikoye)
4161
implant the confidential documents. The foretelling inaccurate substances are transformed towards acquiring
the stego-model.
Chandramouli and Memon [51] recommended adaptive steganographic methods that are concerned
with protecting information without giving rise to statistically important alteration. It is electronically
concealed on the condition that the proportionate degradation of the likelihood frequency of protected
message and stego-models is <=m. LSB steganography remains a great deal easy, effortless, simple and
uncomplicated. The steganographic proportion or volume of LSB core images are investigated taking
advantages of probability approach and execution of steganalysis is computed as well. The composition of an
inactive protector is examined exclusively. For safety measure, information is encrypted in preparatory for
implanting. LSB based approaches alter pixel worth by ± 1 or exclude them without alteration. The purpose
of a steganalyst is to roughly calculate if at any time I have concealed information. (I in this scenario mean
Catalogue (index) record a particular that indicates the average deducted protected object).
Gupta et al. [52] suggested a new method of LSB that is the enhanced least significant bit (ELSB)
because it was found out that the existing least significant bit algorithm has been examined and discovered to
have an extra volume of alteration. The performance of LSB was enhanced because communication is
secreted in just a unit of the 3 colors of the pixel that is BLUE color of the conveyor image. This reduces the
alteration level of the image that is inattentive to a person eye.
Zaher [53] presented a novel steganography method. The method postulates an enhanced system
above the conventional LSB technique. The principal goal of the presented work is to intensify quantity of
documents to be concealed in the convoying image as well as to surge safety by carrying out data encryption.
The benefit of our steganography procedure is that it can conceal greater volume of data than conventional
LSB. The key drawback of the procedure if the text flips between small and capital in each character then the
size will increase not decrease because of control symbols but it can be said that such scenario is rare.
Masoud et al. [54] study article postulated that steganography in image bits by means of Genetic
Algorithm is centered on the before implanting hiding procedures. It assists to discover perfect places in
transfer or images to warehouse the information with the fewer alterations of fragments. Consequently, to
accomplish this, its breakdown is conveyed to translate communication strings as well as the LSBs towards
the blocks for transporting the genetic algorithm. The vital file happened to be produced later following the
discovery of the particular positions to entrenched information, meanwhile the crucial file is used for
communication extraction drive as well. The recommended process investigated established than an effective
process obtainable on ground is centered on slightest alterations in the model image then the histogram
established it.
Kumar and Sharma [55] established a recently developed document obscuring method which is
Harsh-LSB originated from LSB insertion on images. Hash-LSB with RSA procedure aimed at information
secreting as well as stipulating additional safekeeping of documents. The establishment method makes use of
Hash function to advance individual exceptional pattern for entrenching the data. Firstly, Hash function
assists to locate the precise locations of smallest substantial fragment of every RGB pixel’s and subsequent
these communication fragments are entrenched into RGB pixels individually. Here the protected image is
disjointed into portions and values acquired by Hash functions are utilized to warehouse the undisclosed
documents at specific portions. Here the undisclosed communication is converted into binary buts such that
pixel value is in sequence 3,3,2 for RGB concealed image plus to offer more level of safekeeping.
Information secreted in scrambled prior to warehousing it in the concealed image and entrenched documents
in conceal image yields a stego image.
Indresh et al. [34] postulated a steganography procedure through the means of Multidirectional
Block established pixel-worth contrasting alongside with extraordinary payload capability. While edge
sections can endure powerful alteration so the document are entrenched in the specific section reasonable
than level sections as well as a lesson the feature alteration of the stego-image. The best selection
methodology aimed at the location point is used and this methodology can be use in an application for gray
image as well as color image. Table 1 (see in appendix) presented the overall performances of data hiding
methods in spatial domain and it was noticed that most researchers takes note of imperceptibility and payload
as compared to robustness.
3. CONCLUSION
In conclusion, the significance of medical image security during transmission was presented and the
study made available a complete knowledge about the evolving of information hiding techniques in spatial
domains, which are applied to securing all medical information such as text, image, audio, video. In can be
suggested that there should be more attention in the need to increase the robustness of an embedding
algorithm and an implementation of hybrid approaches would be better than the existing data hiding
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4157 - 4164
4162
techniques as this will enhanced the security of medical information. Therefore, it is suggested that a novel
approach needs to be established which will possess extra information hiding capacity and against to the
resistance of attacks.
4. FUTURE WORK
It is suggested that another information hiding algorithm is combined with the steganography
algorithm to have a robust security level while communicating the medical information so that it will be very
difficult for a hacker or intruder to break into the hidden information.
APPENDIX
Table 1. Performance evaluation of image data hiding techniques
Method Data Hiding Resistance to Attacks Domain Complexity
LSB Based Steganography High Low Spatial Simple
Compression based RDH Steganography Low Moderate Spatial Complex
Edge-Adaptive Steganography Average Low Spatial Simple
PVP Based High Low Spatial Simple
BPCS Based Steganography High High Spatial Complex
REFERENCES
[1] B. A, Usha, N. K. Srinath, K. Narayan, and K. N. Sangeetha, “A Secure Data Embedding Technique in Image
Steganography for Medical Images,” International Journal of Advanced Research in Computer and
Communication Engineering, vol. 3, no. 8, pp. 7753–7775, 2014.
[2] A. O. Christiana, A. N. Oluwatobi, G. A. Victory, and O. R. Oluwaseun, “A Secured One Time Password
Authentication Technique using (3, 3) Visual Cryptography Scheme,” Journal of Physics: Conference Series,
vol. 1299, no. 1, 2019, Art. No. 012059.
[3] N. O. Akande, C. O. Abikoye, M. O. Adebiyi, A. A. Kayode, A. A. Adegun, R. O. Ogundokun, “Electronic
Medical Information Encryption Using Modified Blowfish Algorithm,” Lecture Notes in Computer Science
(including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11623 LNCS,
pp. 166–179, 2019.
[4] A. K. Singh, “Robust and distortion control dual watermarking in LWT domain using DCT and error correction
code for color medical image,” Multimedia Tools and Applications, vol. 78, no. 21, pp. 30523–30533, 2019,
doi: 10.1007/s11042-018-7115-x.
[5] B. Santoso, “Color-based microscopic image steganography for telemedicine applications using pixel value
differencing algorithm,” in Journal of Physics: Conference Series, vol. 1175, no. 1, Mar. 2019, Art. No. 012057.
[6] J. Liu, J. Li, K. Zhang, U. A. Bhatti, and Y. Ai, “Zero-watermarking algorithm for medical images based on dual-
tree complex wavelet transform and discrete cosine transform,” Journal of Medical Imaging and Health
Informatics, vol. 9, no. 1, pp. 188–194, 2019.
[7] T. Yuvaraja and R. S. Sabeenian, “Performance analysis of medical image security using steganography based on
fuzzy logic,” Cluster Computing, vol. 22, no. 2, pp. 3285–3291, 2019.
[8] R. F. Mansour and E. M. Abdelrahim, “An evolutionary computing enriched RS attack resilient medical image
steganography model for telemedicine applications,” Multidimensional Systems and Signal Processing, vol. 30,
no. 2, pp. 791–814, 2019.
[9] M. Ulutas, G. Ulutas, and V. V. Nabiyev, “Medical image security and EPR hiding using Shamir's secret sharing
scheme,” Journal of Systems and Software, vol. 84, no. 3, pp. 341–353, 2011.
[10] H. Al-Dmour and A. Al-Ani, “Quality optimized medical image information hiding algorithm that employs edge
detection and data coding,” Computer methods and programs in biomedicine, vol. 127, pp. 24–43, 2016,
doi: 10.1016/j.cmpb.2016.01.011.
[11] G. Ke, H. Wang, S. Zhou, and H. Zhang, “Encryption of medical image with most significant bit and high capacity
in piecewise linear chaos graphics,” Measurement, vol. 135, pp. 385–391, 2019.
[12] R. L. Biradar, “Secure medical image steganography through optimal pixel selection by EH-MB pipelined
optimization technique,” Health and Technology, pp. 1–17, 2019.
[13] R. Karakış, I. Güler, İ. Capraz, and E. Bilir, “A novel fuzzy logic-based image steganography method to ensure
medical data security,” Computers in biology and medicine, vol. 67, pp. 172–183, 2015,
doi: 10.1016/j.compbiomed.2015.10.011.
[14] A. Boonyapalanant, M. Ketcham, and M. Piyaneeranart, “Hiding Patient Injury Information in Medical Images
with QR Code,” in International Conference on Computing and Information Technology, pp. 258–267, Jul. 2019,
doi: 10.1007/978-3-030-19861-9_25.
[15] S. K. Patel, C. Saravanan, and V. K. Patel, “Cloud-based Reversible Dynamic Secure Steganography Model for
embedding pathological report in medical images,” International Journal of Computers and Applications, pp. 1–9,
2019.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Efficiency of LSB steganography on medical information (Oluwakemi Christiana Abikoye)
4163
[16] P. Kamal, and G. Jindal, “Review of Different Steganographic techniques on Medical images regarding their
efficiency,” International Journal of Innovations in Engineering and Technology (IJIET), vol. 2, no. 1,
pp. 176–180, 2013
[17] S. Elsherif, G. Mostafa, S. Farrag, and W. Alexan, “Secure message embedding in 3d images,” in 2019
International Conference on Innovative Trends in Computer Engineering (ITCE), Feb. 2019, pp. 117–123,
doi: 10.1109/ITCE.2019.8646685.
[18] S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh, “SVD-based robust image
steganographic scheme using RIWT and DCT for secure transmission of medical images,” Measurement, vol. 139,
pp. 426–437, 2019.
[19] Y. S. Abdulsalam, O. M. Olaniyi, and A. Ahmed, “Securing electronic health system using crystographic
technique,” International Journal of Telemedicine and Clinical Practices, vol. 3, no. 2, pp. 132–155, 2019,
doi: 10.1504/IJTMCP.2019.100037.
[20] O. N. Akande, O. C. Abikoye, A. A. Kayode, O. T. Aro, and O. R. Ogundokun, “A Dynamic Round Triple Data
Encryption Standard Cryptographic Technique for Data Security,” Lecture Notes in Computer Science (including
subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 487–499, 2020,
doi: 10.1007/978-3-030-58817-5_36.
[21] M. M. Hashim, M. S. Taha, A. H. M. Aman, A. H. A. Hashim, M. S. M., Rahim, and S. Islam, “Securing Medical
Data Transmission Systems Based on Integrating Algorithm of Encryption and Steganography,” in 2019 7th
International Conference on Mechatronics Engineering (ICOM), Oct. 2019, pp. 1–6.
[22] R. O. Ogundokun, O. C. Abikoye, S. Misra, and J. B. Awotunde, “Modified Least Significant Bit Technique for
Securing Medical Images,” Lecture Notes in Business Information Processing, vol. 402, pp. 553–565, 2020,
doi: 10.1007/978-3-030-63396-7_37.
[23] R. L. Biradar, “Secure medical image steganography through optimal pixel selection by EH-MB pipelined
optimization technique,” Health and Technology, pp. 1–17, 2019.
[24] S. K. Patel, C. Saravanan, and V. K. Patel, “Cloud-based Reversible Dynamic Secure Steganography Model for
embedding pathological report in medical images,” International Journal of Computers and Applications, pp. 1–9,
2019.
[25] X. Wu, J. Li, R. Tu, J. Cheng, U. A. Bhatti, and J. Ma, “Contourlet-DCT based multiple robust watermarkings for
medical images,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 8463–8480, 2019,
doi: 10.1007/s11042-018-6877-5.
[26] F. W. Alsaade, “Watermarking system for the security of medical image databases used inTelemedicine,” Res. J.
Inform. Technol., vol. 8, pp. 88–97, 2016.
[27] S. Arunkumar, S. Vairavasundaram, K. S. Ravichandran, and L. Ravi, “RIWT and QR factorization-based hybrid
robust image steganography using block selection algorithm for IoT devices,” Journal of Intelligent and Fuzzy
Systems, vol. 36, no. 5, pp. 4265–4276, 2019.
[28] R. Thanki and S. Borra, “Fragile watermarking for copyright authentication and tamper detection of medical
images using compressive sensing (CS) based encryption and contourlet domain processing,” Multimedia Tools
and Applications, vol. 78, no. 10, pp. 13905–13924, 2019.
[29] C. Irawan, E. H. Rachmawanto, C. A. Sari, and M. Doheir, “Hybrid Encryption using Confused and Stream Cipher
to Improved Medical Images Security,” in Journal of Physics: Conference Series, vol. 1201, no. 1,
May 2019, Art. No. 012022.
[30] B. Praveen, D. Samanta, G. Prasad, C. R. Kumar, and M. L. M. Prasad, “Protecting Medical Research Data Using
Next Gen Steganography Approach,” in International Conference on Information, Communication and Computing
Technology, Oct. 2019, pp. 340–348.
[31] S. I. Nipanikar and V. H. Deepthi, “A multiple criteria-based cost function using wavelet and edge transformation
for medical image steganography,” Journal of Intelligent Systems, vol. 27, no. 3, pp. 331–347, 2018,
doi: 10.1515/jisys-2016-0095.
[32] B. A. Usha, N. K. Srinath, K. Narayan, and K. N. Sangeetha, “A secure data embeddin technique in image
steganography for medical images,” International Journal of Advanced Research in Computer and Communication
Engineering., vol. 3, no. 8, pp. 7753- 7756, 2014.
[33] O. C. Abikoye, U. A. Ojo, J. B. Awotunde, and R. O. Ogundokun, “A safe and secured iris template using
steganography and cryptography,” Multimedia Tools and Applications, vol. 79, no. 31–32, pp. 23483–23506, 2020,
doi: 10.1007/s11042-020-08971-x.
[34] Y. Indresh and V. Vikash, “An Enhanced Image Steganographic Method with High Payload Capacity using
Multidirectional Block Based PixelValue Differencing,” International Journal of Innovative Research in Computer
and Communication Engineering, vol. 1, no. 8, pp. 1888-1896, 2013.
[35] G. Santhi, and B. Adithya, “A Survey on Medical Image Protection Using Various Steganography Techniques,”
Advances in Natural and Applied Sciences, vol. 11, no. 12, pp. 89–94, 2017.
[36] B. A. Usha, N. K. Srinath, K. Narayan, and K. N. Sangeetha, “A secure data embeddin technique in image
steganography for medical images,” Int. J. Adv. Res. Comput. Commun. Eng, vol. 3, no. 8, pp. 7753-7756, 2014.
[37] O. C. Abikoye, U. A. Ojo, J. O. Awotunde, and R. O. Ogundokun, “A safe and secured iris template using
steganography and cryptography,” Multimedia Tools and Applications, 2020, doi: 10.1007/s11042-020-08971-x.
[38] Kamal P. and Jindal G., “Review of Different Steganographic techniques on Medical images regarding their
efficiency,” International Journal of Innovations in Engineering and Technology (IJIET), vol. 2, no. 1,
pp. 176–180, 2013.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 11, No. 5, October 2021 : 4157 - 4164
4164
[39] P. A. K. Maganbhai, and K. Chouhan, “A Study and literature Review on Image Steganography,” International
Journal of Computer Science and Information Technologies (IJCSIT), vol. 6, no. 1, pp. 685–688, 2015.
[40] S. Katzenbeiser and F. A. P. Petitcolas, “Information Hiding Techniques for Steganography and Digital
Watermarking,” Artech House, Computer Security series, Boston, London, 1999.
[41] R. Islam, A. W. Naji, A. A. Zaidan, and B. B. Zaidan, “New system for secure cover file of hidden data in the
image page within executable file using statistical steganography techniques,” arXiv preprint arXiv:1002.2416,
2010.
[42] N. A. Masoud and I. S. Ghazi, “4 A Modification of Least Significant Digit (LSD) Digital Watermark Technique,”
International Journal of Computer Applications, vol. 179, no. 32, pp. 4–6, 2018.
[43] K. Muhammad, J. Ahmad, S. Rho, and S. W. Baik, “Image steganography for authenticity of visual contents in
social networks,” Multi Tools Appl, pp. 1–20, 2017.
[44] M. Juneja and P. Sandhu, “An Improved LSB Based Steganography Technique for RGB Color Images,”
International Journal of Computer and Communication Engineering, vol. 2, no. 4, pp. 513–517, 2013,
doi: 10.7763/IJCCE.2013.V2.238.
[45] P. Thiyagarajan, V. Natarajan, G. Aghila, V. Pranna, and R Anitha, “Pattern Based 3D Image Steganography,” 3D
Research center, Kwangwoon University and Springer 2013, 3DR Express, pp. 1–8, 2013,
doi: 10.1007/3DRes.01(2013)1.
[46] S. S. Priya, K. Mahesh, and K. Kuppusamy, “Efficient Steganography Method to Implement Selected Least
Significant Bits in Spatial Domain,” International Journal of Engineering Research and Applications, vol. 2,
no. 3, pp. 2632–2637, 2012.
[47] B. Sharmila and R Shanthakumari., “Efficient Adaptive Steganography for Colour Images Based on LSBMR
Algorithm,” ICTACT Journal on Image and Video Processing, vol. 2, no. 3, pp. 387–392, 2012.
[48] I. A. Fahim, K. B. Fateha, and U. A. K. Farid, “An Investigation into Encrypted Message Hiding Through Images
Using LSB,” International Journal of Engineering Science and Technology (IJEST), vol. 3, no. 2, pp. 948–960,
2011.
[49] W. Luo, F. Huang, and J. Huang, “Edge Adaptive Image Steganography Based on LSB Matching Revisited,” IEEE
Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201–214, 2010,
doi: 10.1109/TIFS.2010.2041812.
[50] C. H. Yang and M. H. Tsai, “Improving Histogram-based Reversible Data hiding by Interleaving Predictions,” IET
Image Processing, vol. 4, no. 4, pp. 223–234, 2010.
[51] R. Chandramouli and N. Memon, “Analysis of LSB Based Image Steganography Techniques,” IEEE Article,
pp. 1019–1022, 2001, doi: 10.1109/ICIP.2001.958299.
[52] S. Gupta, G. Gujral, and N. Aggarwal, “Enhanced Least Significant Bit Algorithm for Image Steganography,”
International Journal of Computational Engineering and Management (IJCEM), vol. 15, no. 4, pp. 40–42, 2012.
[53] M. A. Zaher, “Modified Least Significant Bit (MLSB),” Computer and Information Science, vol. 4, no. 1,
pp. 60–67, 2011.
[54] N. Masoud, A. Hanani, and K. Ronak, “Steganography in Image Segments using Genetic Algorithm,” IEEE Fifth
International Conference on Advanced Computing and Communication Technologies, 2015, pp. 102–107,
doi: 10.1109/ACCT.2015.57.
[55] A. Kumar and R. Sharma, “A secure image steganography based on RSA algorithm and hash-LSB technique,”
International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 7,
pp. 363–372, 2013.
BIOGRAPHIES OF AUTHORS
Oluwakemi Christiana Abikoye is an Associate Professor at the Department of Computer
Science, Faculty of Communication and Information Sciences, University of Ilorin, Ilorin,
Nigeria. She received her B.Sc, M.Sc. and Ph.D degrees in Computer Science from University of
Ilorin, Ilorin. She is the author or coauthor of more than 50 papers in international national and
local refereed journals and conference contributions. Her research interests include
Cryptography, Computer and Communication Network (Cyber) Security, Biometrics, Human
Computer Interaction and Text and Data Mining.
Roseline Oluwaseun Ogundokun is a Lecturer at the Department of Computer Science,
College of Pure and Applied Sciences, Landmark University, Omu Aran, Kwara State, Nigeria,
she holds Bachelor of Science in Management Information System from Covenant University,
Ota; Master of Science in Computer Science from the University of Ilorin, Ilorin; Post Graduate
Diploma in Education (PGDE) from the National Teachers’ Institute (NTI), Kaduna and;
currently a PhD student in the Department of Computer Science, University of Ilorin, Ilorin. Her
research interests include Steganography and Cryptography, Information Security, Artificial
Intelligence, Data Mining, Information Science and Human Computer Interaction.