ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient.
Steganography has been practised for thousands of years, but in the last two decades steganography has been introduced to digital media. Digital steganography techniques typically focus on hiding messages inside image and audio files; in comparison, the amount of research into other digital media formats (such as video) is substantially limited.
In this talk we will discuss the history of steganography and the categories of steganographic technique before briefly discussing image and audio steganography and how to build such tools. The main body of our talk will focus on how video files are coded and the steganographic techniques that can be used to hide messages inside video files.
The principles discussed in this talk will be illustrated with live demos.
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient.
Steganography has been practised for thousands of years, but in the last two decades steganography has been introduced to digital media. Digital steganography techniques typically focus on hiding messages inside image and audio files; in comparison, the amount of research into other digital media formats (such as video) is substantially limited.
In this talk we will discuss the history of steganography and the categories of steganographic technique before briefly discussing image and audio steganography and how to build such tools. The main body of our talk will focus on how video files are coded and the steganographic techniques that can be used to hide messages inside video files.
The principles discussed in this talk will be illustrated with live demos.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
An Implementation of I2C Slave Interface using Verilog HDLIJMER
The focus of this paper is on implementation of Inter Integrated Circuit (I2C) protocol
following slave module for no data loss. In this paper, the principle and the operation of I2C bus protocol
will be introduced. It follows the I2C specification to provide device addressing, read/write operation and
an acknowledgement. The programmable nature of device provide users with the flexibility of configuring
the I2C slave device to any legal slave address to avoid the slave address collision on an I2C bus with
multiple slave devices. This paper demonstrates how I2C Master controller transmits and receives data to
and from the Slave with proper synchronization.
The module is designed in Verilog and simulated in ModelSim. The design is also synthesized in Xilinx
XST 14.1. This module acts as a slave for the microprocessor which can be customized for no data loss.
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionMd. Ariful Hoque
An efficient implementation of RSA algorithm for speech data encryption and decryption. At first, five hundred Bangla speech words were recorded from six different speaker and stored as RIFF (.wav) file format. Then our developed program was used to extract data from these words and this data were stored in a text file as integer data. Finally, we used our implemented program to encrypt and decrypt speech data.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
Problem faced by today’s communicators is not only security but also the speed of communication. This paper provides a mechanism that increases the speed of communication by reducing the size of content; for this data compression method is used and security factor is added by using Steganography. Firstly, the focus has been made on Data Compression and Steganography. Finally, proposed technique has been discussed. In Proposed technique first data is compressed to reduce the size of the data and increase the data transfer rate. Thereafter on compressed data state table operation is applied to improve the security. Then, this is used as the input to the LSB technique of Steganography. At receiver end, firstly the LSB extraction technique is used, thereafter the state table operation in reverse form is applied and finally the original data is obtained. Hence our proposed technique is effective that can reduce data size, increase data transfer rate and provide the security during communication.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The word steganography has Greek origins and means ‘concealed writing.’
The original practice can be traced back to around 440 BC when the ancient Greeks hid messages within wax tablets by writing messages on the wood before applying a wax surface (Herodotus 1987).
Another early recorded use of steganography occurred in ancient Greece when messengers tattooed messages on their shaved heads and concealed the messages with the hair that grew over them afterwards, a technique also used by German spies in the early 20th century (Newman 1940).
With computers having GHz of processing speed, information / data either stored or in
transmission has become more and more vernalable to hostile eavesdropping, theft,
wiretapping etc. This urges us to devise new data hiding techniques to protect and secure data
of vital significance. Steganography is a method of securing data by obscuring the contents in
another media (called Cover) in which it is saved / transmitted. This doctorial thesis proposal will
present a new Steganographic Technique for hiding data in (ASCII) text files together with its
Software implementation, a research area in Steganography which is considered as
toughest among all, to address.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
The present day technology demands eco-friendly developments. In this era the
composite material are playing a vital roal in different field of Engineering .The composite materials
are using as a principle materials. Nowaday the composite materials are utilizing as a important
component of engineering field .Where as the importance of the applications of composites is well
known, but thrust on the use of natural fibres in it for reinforcement has been given priority for some
times. But changing from synthetic fibres to natural fibres provides only half green-composites. A
partial green composite will be achieved if the matrix component is also eco-friendly. Keeping this in
view, a detailed literature surveyed has been carried out through various issues of the Journals
related to this field. The material systems used are sunnhemp fibres. Some epoxy and hardener has
been also added for stability and drying of the bio-composites. Various graphs and bar-charts are
super-imposed on each other for comparison among themselves and Graphs is plotted on MAT LAB
and ORIGIN 6.0 software. To determining tensile strengths, Various properties for different biocomposites
have been compared among themselves. Comparison of the behaviour of bio-composites of
this work has been also compare with other works. The bio-composites developed in this work are
likely to get applications in fall ceilings, partitions, bio-degradable packagings, automotive interiors,
sports things (e.g. rackets, nets, etc.), toys etc.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
The proposal of this paper is to present Spring Framework which is widely used in
developing enterprise applications. Considering the current state where applications are developed using
the EJB model, Spring Framework assert that ordinary java beans(POJO) can be utilize with minimal
modifications. This modular framework can be used to develop the application faster and can reduce
complexity. This paper will highlight the design overview of Spring Framework along with its features that
have made the framework useful. The integration of multiple frameworks for an E-commerce system has
also been addressed in this paper. This paper also proposes structure for a website based on integration of
Spring, Hibernate and Struts Framework.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
In this paper we introduce and characterize some new generalized locally closed sets
known as
δ
ˆ
s-locally closed sets and spaces are known as
δ
ˆ
s-normal space and
δ
ˆ
s-connected space and
discussed some of their properties
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
"Natural language processing" here refers to the use and ability of systems to process
sentences in a natural language such as English, rather than in a specialized artificial computer
language such as C++. The systems of real interest here are digital computers of the type we think of as
personal computers and mainframes. Of course humans can process natural languages, but for us the
question is whether digital computers can or ever will process natural languages. We have tried to
explore in depth and break down the types of ambiguities persistent throughout the natural languages
and provide an answer to the question “How it affects the machine translation process and thereby
machine learning as whole?” .
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...IJMER
Pipelines are the least expensive and most effective method for the oil transportation.
Due to high viscosity of crude oil, the pressure drop and pumping power requirements are very high.
So it is necessary to bring down the viscosity of crude oil. Heated pipelines are used reduce the oil
viscosity by increasing the oil temperature. Electrical heating and direct flame heating are the common
method used for heating the oil pipeline. In this work, a new application of Parabolic Trough Collector
in the field of oil pipeline transport is introduced for reducing pressure drop in oil pipelines. Oil
pipeline is heated by applying concentrated solar radiation on the pipe surface using a Parabolic
Trough Collector in which the oil pipeline acts as the absorber pipe. 3-D steady state analysis is
carried out on a heated oil pipeline using commercial CFD software package ANSYS Fluent 14.5. In
this work an effort is made to investigate the effect of concentrated solar radiation for reducing
pressure drop in the oil pipeline. The results from the numerical analysis shows that the pressure drop
in oil pipeline is get reduced by heating the pipe line using concentrated solar radiation. From this
work, the application of PTC in oil pipeline transportation is justified.
Comparing Various SDLC Models On The Basis Of Available MethodologyIJMER
There are various SDLC models widely accepted and employed for developing software.
SDLC models give a theoretical guide line regarding development of the software. Employing proper
SDLC allows the managers to regulate whole development strategy of the software. Each SDLC has its
advantages and disadvantages making it suitable for use under specific condition and constraints for
specified type of software only. We need to understand which SDLC would generate most successful
result when employed for software development. For this we need some method to compare SDLC
models. Various methods have been suggested which allows comparing SDLC models. Comparing SLDC
models is a complex task as there is no mathematical theorem or physical device available. The essence
of this paper is to analyse some methodologies that could result in successful comparison of the SDLC
models. For this we have studied various available tools, techniques and methodologies and have tried
to extract most simple, easy and highly understandable method for comparing SDLC models.
Comparing Various SDLC Models On The Basis Of Available Methodology
Steganography and Its Applications in Security
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638 ISSN: 2249-6645
Steganography and Its Applications in Security
Ronak Doshi, 1 Pratik Jain, 2 Lalit Gupta3
1, 2,3Department of Electronics and telecommunication, Pune University, India
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
I. INTRODUCTION
The word steganography is of Greek origin and means "covered, or hidden writing". It is the science of hiding
information. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to
hide the data from a third party. In steganography information can be hidden in carriers such as images, audio files, text files,
and video and data transmissions. When message is hidden in the carrier a stego carrier is formed for example a stego-image.
It will be perceived to be as close as possible to the original carrier or cover image by the human senses. Steganography and
cryptography are closely related. Cryptography scrambles messages so they cannot be understood. Steganography, on the
other hand, will hide the message so that there is no knowledge of the existence of the message in the first place.
Steganography includes the concealment of information within computer files. In digital steganography, electronic
communications may include steganographic coding inside of a transport layer, such as a document file, image file, program
or protocol.[1]
Steganography today, however, is significantly more sophisticated, allowing a user to hide large amounts of
information within image and audio files. These forms of steganography often are used in conjunction with cryptography so
that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the
information (an often difficult task in and of itself) and then decrypt it.
In this paper, a security thesis is proposed which imposes the concept of secrecy over privacy for messages in
various formats.
II. HISTORY
Steganographic techniques have been used for centuries. Steganography has been widely used in historical times,
especially before cryptographic systems were developed.
The first known application dates back to the ancient Greek times, when messengers tattooed messages on their
shaved heads and then let their hair grow so the message remained unseen.
A different method from that time used wax tables as a cover source. Text was written on the underlying wood and
the message was covered with a new wax layer. The tablets appeared to be blank so they passed inspection without question.
During World War 2 invisible ink was used to write information on pieces of paper so that the paper appeared to the
average person as just being blank pieces of paper. Liquids such as urine, milk, vinegar and fruit juices were used, because
when each one of these substances is heated they darken and become visible to the human eye.
Another clever invention in Steganographia was the "Ave Maria" cipher. The book contains a series of tables, each
of which has a list of words, one per letter. To code a message, the message letters are replaced by the corresponding words.
If the tables are used in order, one table per letter, then the coded message will appear to be an innocent prayer.
All of these approaches to steganography have one thing in common -- they hide the secret message in the physical
object which is sent. The cover message is merely a distraction, and could be anything. Of the innumerable variations on this
theme, none will work for electronic communications because only the pure information of the cover message is transmitted.
Nevertheless, there is plenty of room to hide secret information in a not-so-secret message. It just takes ingenuity.
III. IMPLEMENTATION OF STEGANOGRAPHY
Secrets can be hidden inside all sorts of cover information. The following formula provides a very generic
description of the pieces of the steganographic process:
cover_medium + hidden_data + stego_key = stego_medium (1)
www.ijmer.com 4634 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638 ISSN: 2249-6645
In this context, the cover_medium is the file in which we will hide the hidden_data, which may also be encrypted using the
stego_key. The resultant file is the stego_medium (which will, of course be the same type of file as the cover_medium).
There are four ways to implement steganography:
1. Using text.
2. Using images.
3. Using audio files.
4. Using video files.[2]
3.1 Text Steganography:
Text steganography can be classified in three basic categories - format-based, random and statistical generation and
linguistic method. Format-based methods used physical text formatting of text as a place in which to hide information.
Generally, this method modifies existing text in order to hide the steganographic text. Insertion of spaces, deliberate
misspellings distributed throughout the text, resizing the fonts are some of the many format-based methods being used in text
steganography. However, Bennett has stated that those format-based methods managed to trick most of the human eyes but it
cannot trick once computer systems have been used. Random and statistical generation is generating cover text according to
the statistical properties. This method is based on character sequences and words sequences. The hiding of information within
character sequences is embedding the information to be appeared in random sequence of characters. This sequence must
appear to be random to anyone who intercepts the message.[5]
A second approach for character generation is to take the statistical properties of word-length and letter frequency in
order to create “words” (without lexical value) which will appear to have the same statistical properties as actual words in a
given language. The hiding of information within word sequences, the actual dictionary items can be used to encode one or
more bits of information per word using a codebook of mappings between lexical items and bit sequences, or words
themselves can encode the hidden information.
The final category is linguistic method which specifically considers the linguistic properties of generated and
modified text, frequently uses linguistic structure as a place for hidden messages. In fact, steganographic data can be hidden
within the syntactic structure itself.
Example:
Sender sends a series of integer number (Key) to the recipient with a prior agreement that the secret
message is hidden within the respective position of subsequent words of the cover text. For example the series is „1, 1, 2, 3,
4, 2, 4‟and the cover text is “A team of five men joined today”. So the hidden message is “Atfvoa”. A “0” in the
number series will indicate a blank space in the recovered message. The word in the received cover text will be skipped if the
number of characters in that word is less than the respective number in the series (Key) which shall also be skipped
during the process of message unhide.
3.2 Image Steganography:
The most widely used technique today is hiding of secret messages into a digital image. This steganography
technique exploits the weakness of the human visual system (HVS). HVS cannot detect the variation in luminance of color
vectors at collection of color pixels. The individual pixels can be represented by their optical higher frequency side of the
visual spectrum. A picture can be represented by a characteristics like 'brightness', 'chroma' etc. Each of these characteristics
can be digitally expressed in terms of 1s and 0s.
For example: a 24-bit bitmap will have 8 bits, representing each of the three color values (red, green, and blue)
at each pixel. If we consider just the blue there will be 2 different values of blue. The difference between 11111111 and
11111110 in the value for blue intensity is likely to be undetectable by the human eye. Hence, if the terminal
recipient of the data is nothing but human visual system (HVS) then the Least Significant Bit (LSB) can be used
for something else other than color information.
3.2.1 LSB Coding
The simplest approach to hiding data within an image file is called least significant bit (LSB) insertion. In this
method, we can take the binary representation of the hidden_data and overwrite the LSB of each byte within the
cover_image. If we are using 24-bit color, the amount of change will be minimal and indiscernible to the human eye. As an
example, suppose that we have three adjacent pixels (nine bytes) with the following RGB encoding:
10010101 00001101 11001001
10010110 00001111 11001010
10011111 00010000 11001011
Now suppose we want to "hide" the following 9 bits of data (the hidden data is usually compressed prior to being hidden):
101101101. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been
changed):
10010101 00001100 11001001
10010111 00001110 11001011
10011111 00010000 11001011
www.ijmer.com 4635 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638 ISSN: 2249-6645
Note that we have successfully hidden 9 bits but at a cost of only changing 4, or roughly 50%, of the LSBs.
Fig. 1.Original image Fig. 2. Embedded image
Example of still imagery steganography. Left hand side image is the original cover image, whereas right hand side
does embedding a text file into the cover image make the stego image
3.2.2 Masking And Filtering:
Masking and filtering techniques are mostly used on 24 bit and grey scale images. They hide information in a way
similar to watermarks on actual paper and are sometimes used as digital watermarks. Masking images entails changing the
luminance of the masked area. The smaller the luminance change, the less of a chance that it can be detected.
Masking is more robust than LSB insertion with respect to compression, cropping, and some image processing.
Masking techniques embed information in significant areas so that the hidden message is more integral to the cover image
than just hiding it in the “noise” level. This makes it more suitable than LSB with, for instance, lossy JPEG images.
3.3 Audio Steganography:
Steganography, in general, relies on the imperfection of the human auditory and visual systems. Audio
steganography takes advantage of the psychoacoustical masking phenomenon of the human auditory system [HAS].
Psychoacoustical or auditory masking property renders a weak tone imperceptible in the presence of a strong tone in its
temporal or spectral neighborhood. This property arises because of the low differential range of the HAS even though the
dynamic range covers 80 dB below ambient level. Frequency masking occurs when human ear cannot perceive frequencies
at lower power level if these frequencies are present in the vicinity of tone- or noise-like frequencies at higher level.
Additionally, a weak pure tone is masked by wide-band noise if the tone occurs within a critical band. This
property of inaudibility of weaker sounds is used in different ways for embedding information. Embedding of data by
inserting inaudible tones in cover audio signal has been presented recently. [3]
In audio steganography, secret message is embedded into digitized audio signal which result slight altering of
binary sequence of the corresponding audio file. The list of methods that are commonly used for audio steganography are
listed and discussed below.
• LSB coding
• Parity coding
• Phase coding
• Spread spectrum
• Echo hiding
3.3.1 LSB Coding:
Sampling technique followed by Quantization converts analog audio signal to digital binary sequence.
Fig. 3. Sampling of the Sine Wave followed by Quantization process.
In this technique LSB of binary sequence of each sample of digitized audio file is replaced with binary equivalent of
secret message.
www.ijmer.com 4636 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638 ISSN: 2249-6645
3.3.2 Parity Coding:
Instead of breaking a signal down into individual samples, the parity coding method breaks a signal down into
separate regions of samples and encodes each bit from the secret message in a sample region‟s parity bit. If the parity bit of a
selected region does not match the secret bit to be encoded, the process flips the LSB of one of the samples in the region.
Thus, the sender has more of a choice in encoding the secret bit, and the signal can be changed in a more unobtrusive
fashion.
3.3.3 Phase coding:
Human Auditory System (HAS) can‟t recognize the phase change in audio signal as easy it can recognize noise in
the signal. The phase coding method exploits this fact. This technique encodes the secret message bits as phase shifts in the
phase spectrum of a digital signal, achieving an inaudible encoding in terms of signal-to- noise ratio.
3.3.4 Spread spectrum:
In the context of audio steganography, the basic spread spectrum (SS) method attempts to spread secret information
across the audio signal‟s frequency spectrum as much as possible. This is analogous to a system using an implementation of
the LSB coding that randomly spreads the message bits over the entire sound file. However, unlike LSB coding, the SS
method spreads the secret message over the sound file‟s frequency spectrum, using a code that is independent of the actual
signal. As a result, the final signal occupies a bandwidth in excess of what is actually required for transmission.
3.3.5 Echo Hiding:
In echo hiding, information is embedded in a sound file by introducing an echo into the discrete signal. Like the
spread spectrum method, it too provides advantages in that it allows for a high data transmission rate and provides superior
robustness when compared to the noise inducing methods. If only one echo was produced from the original signal, only one
bit of information could be encoded. Therefore, the original signal is broken down into blocks before the encoding process
begins. Once the encoding process is completed, the blocks are concatenated back together to create the final signal.
3.4 Video Steganography:
Video files are generally a collection of images and sounds, so most of the presented techniques on images and
audio can be applied to video files too. When information is hidden inside video the program or person hiding the information
will usually use the DCT (Discrete Cosine Transform) method. DCT works by slightly changing each of the images in the
video, only so much that it is not noticeable by the human eye. To be more precise about how DCT works, DCT alters values
of certain parts of the images, it usually rounds them up. For example, if part of an image has a value of 6.667 it will round it
up to 7. [6]
The great advantages of video are the large amount of data that can be hidden inside and the fact that it is a moving
stream of images and sounds. Therefore, any small but otherwise noticeable distortions might go by unobserved by humans
because of the continuous flow of information.
IV. STEGANALYSIS
The art of detecting Steganography is referred to as Steganalysis. Steganalysis is the process of identifying
steganography by inspecting various parameter of a stego media. The primary step of this process is to identify a suspected
stego media. After that steganalysis process determines whether that media contains hidden message or not and then try to
recover the message from it. In cryptanalysis, it is clear that the intercepted message is encrypted and it certainly contains the
hidden message because the message is scrambled. But in the case of steganalysis this may not be true. The suspected media
may or may not be with hidden message. The steganalysis process starts with set of suspected information streams. Then the
set is reduced with the help of advance statistical methods.[4]
In the case of Visual detection steganalysis technique, a set of stego images are compared with original cover
images and note the visible difference. Signature of the hidden message can be derived by comparing numerous images.
Cropping or padding of image also is a visual clue of hidden message because some stego tool is cropping or padding blank
spaces to fit the stego image into fixed size. Difference in file size between cover image and stego images, increase or
decrease of unique colors in stego images can also be used in the Visual Detection steganalysis technique.
Scientists and researchers are trying new methods to try and discover ways of detecting hidden files and rendering
them useless. The U. S. Government has contracted Wetstone Technologies to work with the U.S. Air Force to research
algorithms that can be used to discover embedded files in digital, audio and video format. Steganalysis is the technique to
detect steganography or defeat steganography. The research to device strong steganographic and steganalysis technique is a
continuous process.
V. APPLICATIONS
Steganography can be used anytime you want to hide data. There are many reasons to hide data but they all boil
down to the desire to prevent unauthorized persons from becoming aware of the existence of a message. With these new
techniques, a hidden message is indistinguishable from white noise. Even if the message is suspected, there is no proof of its
existence. In the business world steganography can be used to hide a secret chemical formula or plans for a new invention.
www.ijmer.com 4637 | Page
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638 ISSN: 2249-6645
Steganography can also be used for corporate espionage by sending out trade secrets without anyone at the company being
any the wiser. [7]
Terrorists can also use steganography to keep their communications secret and to coordinate attacks. All of this
sounds fairly nefarious, and in fact the obvious uses of steganography are for things like espionage. But there are a number
of peaceful applications. The simplest and oldest are used in map making, where cartographers sometimes add a tiny
fictional street to their maps, allowing them to prosecute copycats. A similar trick is to add fictional names to mailing lists as
a check against unauthorized resellers.
Most of the newer applications use steganography like a watermark, to protect a copyright on information. Photo
collections, sold on CD, often have hidden messages in the photos which allow detection of unauthorized use. The same
technique applied to DVDs is even more effective, since the industry builds DVD recorders to detect and disallow copying
of protected DVDs.
VI. FUTURE
In today‟s world, we often listen a popular term “Hacking”. Hacking is nothing but an unauthorized access of data
which can be collected at the time of data transmission. With respect to steganography this problem is often taken as
Steganalysis.
Steganalysis is a process in which a steganalyzer cracks the cover object to get the hidden data. So, whatever be the
technique will be developed in future, degree of security related with that has to be kept in mind. It is hoped that Dual
Steganography, Steganography along with Cryptography may be some of the future solution for this above mentioned
problem.
VII. CONCLUSION
Steganography is a fascinating and effective method of hiding data that has been used throughout history. Methods
that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are
many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method
for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more
that you know about its features and functionality, the more ahead you will be in the game.
In this paper, different techniques are discussed for embedding data in text, image, and audio/video signals as cover
media. I have presented a brief overview of a very exciting and fast paced area of computer security. This technology has
many in the security field worried as the possible harm that may be done to both government and private industries. As pc‟s
become more powerful this technology will grow substantially and become much more main stream. There are already
hundreds of steganography programs available that can be used on text, audio and graphic files. The government and many
private companies are researching ways to best detect the use of steganography on files. As steganalysis becomes more
mature it will be implemented as a standard security tool the way firewalls, virus detection software and intrusion detection
programs currently are.
REFERENCES
Books:
[1] Compression Algorithms for Real Programmers, Wayner Peter. 2000
[2] Disappearing Cryptography: Being and Nothingness on the Net, Wayner Peter. 1996
[3] Secure Steganography for Audio Signals
Journal Papers:
[4] Steganography and steganalysis-Robert Krenn, Internet Publication, March 2004
http://www.krenn.nl/univ/cry/steg/article.pdf
[5] Steganography, http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213717,00.html
[6] Johnson, Neil F., “Steganography”, 2000 http://www.jjtc.com/stegdoc/index2.html
[7] The WEPIN Store, “Steganography (Hidden Writing)”, 1995, http://www.wepin.com/pgp/stego.html
www.ijmer.com 4638 | Page