This document summarizes a research paper on multilevel audio steganography. The paper proposes two types of multilevel steganography models (TYPE-I and TYPE-II) to increase security and capacity. TYPE-I embeds a single message into multiple covers, while TYPE-II embeds multiple messages into a single cover. The paper describes the encoding and decoding process for each model using examples. It also presents experimental results on imperceptibility, capacity, and security of the proposed schemes using audio clips, finding the embedded audio maintains similar quality to original clips.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
This document describes a mini project on steganography submitted by four students to fulfill the requirements of a computer science degree. It includes a cover page, certificates from advisors and department heads, acknowledgements, a declaration page, and a table of contents. The project involves developing an application for hiding secret messages in digital images using the least significant bit steganography technique. It covers encoding a message into an image, decrypting the message from the stego-image, and a user manual for the application. The objective is to explore data hiding and extraction techniques for secure communication.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
This document describes a mini project on steganography submitted by four students to fulfill the requirements of a computer science degree. It includes a cover page, certificates from advisors and department heads, acknowledgements, a declaration page, and a table of contents. The project involves developing an application for hiding secret messages in digital images using the least significant bit steganography technique. It covers encoding a message into an image, decrypting the message from the stego-image, and a user manual for the application. The objective is to explore data hiding and extraction techniques for secure communication.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
The document discusses steganography, which is the art of hiding information within other files like images. It explains how early Greeks used steganography by engraving messages in wood and covering it with wax. Modern steganography uses computers to hide information by changing the least significant bit of image file bytes, which is imperceptible to the human eye. The document also provides an overview of a proposed steganography application that allows users to hide text within an image file and later extract the hidden text.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
Steganography is a method of hiding secret message in other innocuous looking object so that
its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is
hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method
used in this paper is called append insertion steganography method. This method is chosen as an attempt
to remove the limitation of message format, which appears in many popular steganography methods. To
scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the
message with a secret passphrase. A special block of bytes is used to identify and verify the original
message so it can be recovered while retaining its integrity. The C# programming language and .NET
Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file
contains exactly one message file. In the testing, five random files are used as secret message. Their
integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their
integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm
is proven feasible but only for personal use as some improvements still have to be implemented.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
The document provides an overview of steganography, discussing various techniques for hiding secret messages in digital files like images, audio, and video. It describes methods for embedding data in the frequency and spatial domains of digital files. The paper also compares steganography to encryption and digital watermarking, outlining the goals and measures of different steganography techniques.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
This document presents a new method for combining steganography and cryptography without changing the quality of the cover image. The method embeds secret messages by finding the bits in the message that match bits in the most significant bit (MSB) of cover images. It stores the indices of the matching bit positions. The indices are then encrypted using the Data Encryption Standard (DES) cryptographic algorithm. Experiments show that the proposed method can securely hide messages in images without degrading image quality. Larger cover images allow hiding more data but require more time for the bit-matching process. Adding noise to cover images starts degrading hidden messages at a mean squared error of 0.00049.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
This document provides an overview of concepts in image steganography. It defines key terms like cover object, stego object, and discusses the prisoner's problem framework for steganography. It also discusses different approaches to defining steganographic security, including defining it based on the distinguishability of cover and stego object probability distributions or the error rates of a warden's detection test. The document reviews how security is quantified using relative entropy between distributions.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
The document summarizes information about 7 popular rock music magazines in the UK, including their price, frequency of publication, typical page count, regular content sections, and approach to feature articles. The magazines range from weekly publications like Kerrang and NME to monthly magazines such as Classic Rock, Q, Rocksound, and Big Cheese. All include news, reviews, interviews, and profiles of new artists and albums.
Este documento contiene información sobre plantas y remedios mágicos africanos. Explica los nombres de varias plantas utilizadas en la medicina tradicional yoruba de Nigeria e Ile-Ife, y proporciona instrucciones para realizar diferentes rituales y remedios, como proteger la casa y el cuerpo, vencer enemigos, quitar brujerías y curar problemas de salud.
Este documento describe una observación participante de una "escuelita espiritual" en La Habana, Cuba. La autora describe el ritual que incluye oraciones, canto, mensajes espirituales y la posesión de un médium por un espíritu gitano. Explica que el espiritismo en Cuba funciona como un filtro que une diferentes tradiciones religiosas africanas y crea un continuo entre los espíritus. El espiritismo proporciona un espacio para comunicarse con los muertos y evolucionar espiritualmente.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document discusses various techniques for hiding secret information in digital video files for secure communication, known as video steganography. It begins by explaining steganography and comparing it to cryptography. It then discusses different video steganography methods, including least significant bit and spread spectrum approaches. It also covers combining steganography with encryption algorithms like AES. Previous research on video steganography is summarized, focusing on techniques that embed data in wavelet coefficients or motion vectors. The document concludes that further research could explore hiding moving images within video files using steganography and cryptography methods.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
The document provides an overview of steganography, discussing various techniques for hiding secret messages in digital files like images, audio, and video. It describes methods for embedding data in the frequency and spatial domains of digital files. The paper also compares steganography to encryption and digital watermarking, outlining the goals and measures of different steganography techniques.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
This document presents a new method for combining steganography and cryptography without changing the quality of the cover image. The method embeds secret messages by finding the bits in the message that match bits in the most significant bit (MSB) of cover images. It stores the indices of the matching bit positions. The indices are then encrypted using the Data Encryption Standard (DES) cryptographic algorithm. Experiments show that the proposed method can securely hide messages in images without degrading image quality. Larger cover images allow hiding more data but require more time for the bit-matching process. Adding noise to cover images starts degrading hidden messages at a mean squared error of 0.00049.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
This document provides an overview of concepts in image steganography. It defines key terms like cover object, stego object, and discusses the prisoner's problem framework for steganography. It also discusses different approaches to defining steganographic security, including defining it based on the distinguishability of cover and stego object probability distributions or the error rates of a warden's detection test. The document reviews how security is quantified using relative entropy between distributions.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
The document summarizes information about 7 popular rock music magazines in the UK, including their price, frequency of publication, typical page count, regular content sections, and approach to feature articles. The magazines range from weekly publications like Kerrang and NME to monthly magazines such as Classic Rock, Q, Rocksound, and Big Cheese. All include news, reviews, interviews, and profiles of new artists and albums.
Este documento contiene información sobre plantas y remedios mágicos africanos. Explica los nombres de varias plantas utilizadas en la medicina tradicional yoruba de Nigeria e Ile-Ife, y proporciona instrucciones para realizar diferentes rituales y remedios, como proteger la casa y el cuerpo, vencer enemigos, quitar brujerías y curar problemas de salud.
Este documento describe una observación participante de una "escuelita espiritual" en La Habana, Cuba. La autora describe el ritual que incluye oraciones, canto, mensajes espirituales y la posesión de un médium por un espíritu gitano. Explica que el espiritismo en Cuba funciona como un filtro que une diferentes tradiciones religiosas africanas y crea un continuo entre los espíritus. El espiritismo proporciona un espacio para comunicarse con los muertos y evolucionar espiritualmente.
El airdrop es un sistema de riego innovador creado en Australia a raíz de un concurso. es autosustentable y su funcionamiento está basado en el escarabajo nubilian, que recolecta agua aparir de la humedad del aire
Islamic banks make money through various Sharia-compliant financing contracts that do not involve interest, including deferred sales contracts like murabaha and istisna'a, and profit-and-loss sharing contracts like mudaraba and musharaka. Murabaha involves the bank purchasing an asset for a customer and reselling it at a markup. Mudaraba is a partnership between the bank and an entrepreneur where profits are shared according to a predetermined ratio but losses are borne solely by the bank. These contracts allow Islamic banks to finance various products and services like mortgages, working capital, and car/equipment purchases in a way that is permissible under Islamic law.
El documento analiza el desarrollo del turismo religioso en La Habana y las acusaciones de mercantilismo hacia las religiones de origen africano como la santería. En la difícil situación económica actual, estas religiones se han convertido en una forma lucrativa para mejorar la situación material de los cubanos, aunque también han generado críticas. El autor pretende reflexionar sobre este fenómeno cuestionando la distinción entre lo sagrado y profano, y entre lo cultural, religioso y económico, ya que todas estas dimensiones están rel
1) O documento discute a importância de se criar uma cultura de pensamento na escola, ensinando estratégias de metacognição aos estudantes.
2) É importante fazer perguntas abertas que ativem o pensamento crítico dos alunos, ao invés de perguntas de respostas fechadas.
3) O professor deve reforçar habilidades de pensamento, guiando os alunos na prática desses raciocínios e fazendo perguntas reflexivas.
Este documento describe la larga tradición de artesanía en la ciudad sagrada de Ilé-Ifé en Nigeria, que se remonta a épocas antiguas. Explica que diferentes familias se especializaban en industrias como el tejido, la alfarería, la escultura en piedra, madera y marfil, y la fundición de metales como el bronce. También proporciona ejemplos de artesanos actuales que continúan practicando estas tradiciones, como Lamidi Oke, quien funde objetos de bronce, y Ben Olu
Эволюция управления требованиями в ЖЦ информационной системыEvgeny Savitsky
Процесс управления требованиями меняется в зависимости от стадии жизненного цикла продукта. В начале, когда нет требований лучше использовать легковесные практики, например, Scrum и User Story. По мере развития продукта необходимо документировать требования и принятые технические решения. Таким образом, на этапе эксплуатации и поддержки продукта вы сможете организовать процесс разработки основанный на требованиях и добиться высокой эффективности и качества при внесении изменений.
Solitons Solutions to Some Evolution Equations by ExtendedTan-Cot Methodijceronline
The proposed extended Tan-Cot method is applied to obtain new exact travelling wave solutions to evolution equation. The method is applicable to a large variety of nonlinear partial differential equations, the Fifth-order nonlinear integrable equation, the symmetric regularized long wave equation, the higher-order wave equation of Kdv type, and Benney-Luke equation. The Extended Tan-Cot method seems to be powerful tool in dealing with nonlinear physical models
The document summarizes key details from the Clinica 100 league table, which ranks the top medical technology companies based on annual sales. Johnson & Johnson remained the top company, but Medtronic is poised to take the number one spot in next year's ranking following its acquisition of Covidien. Significant mergers and acquisitions in the industry over 2014 and 2015 resulted in leadership changes within the top 10. The rankings provide insight into industry consolidation and changing dynamics among leading medtech companies.
Analysis and Design of Information Systems Financial Reports with Object Orie...ijceronline
Micro, Small and Medium Enterprises (SMEs) are a group effort proved resistant to a wide range of economic crisis shocks. But in the operation of their business financial management is still not transparent and are also still mixed between business finance and personal finance. So that needs to be done with good financial management. In this research, analysis and information system design financial reports as a basis for the development of the system. Software development life cycle (SDLC) using the model of the object oriented approach. With object-oriented approach, the tools used by the notation Unified Modelling Language (UML). In object-oriented approach all systems applications are Viewed as a collection of objects that allow organisasi interloking and end users to Easily understand logical entities. Object-oriented approach Provides the benefits of the reuse of codes and saves the time for developing quality product.
MTN resolved its $1.671 billion fine issue with Nigeria and will pay it over 3 years. Liquid Telecom acquired Neotel for R6.55 billion. International deals included Microsoft acquiring LinkedIn for $26.2 billion, Salesforce acquiring Demandware for $2.8 billion, and Softbank acquiring ARM Holdings for £24.3 billion. Local developments saw MTN SA decommissioning its Mobile Money offering and Telkom merging its Telkom Business unit into Business Connexion.
Time-Cost Trade-Off Analysis in a Construction Project Problem: Case Studyijceronline
In construction project, cost and time reduction is crucial in today’s competitive market respect. Cost and time along with quality of the project play vital role in construction project’s decision. Reduction in cost and time of projects has increased the demand of construction project in the recent years. Trade-off between different conflicting aspects of projects is one of the challenging problems often faced by construction companies. Time, cost and quality of project delivery are the important aspects of each project which lead researchers in developing time-cost trade-off model. These models are serving as important management tool for overcoming the limitation of critical path methods frequently used by company. The objective of time-cost trade-off analysis is to reduce the original project duration with possible least total cost. In this paper critical path method with a heuristic method is used to find out the crash durations and crash costs. A regression analysis is performed to identify the relationship between the times and costs in order to formulize an optimization problem model. The problem is then solved by Matlab program which yields a least cost of $60937 with duration 129.50 ≈130 days. Applying this approach, the result obtained is satisfactory, which is an indication of usefulness of this approach in construction project problems.
The PMA.Vision mixing station from Sartorius allows users to easily manage paint mixing jobs from mobile devices through a web-based software. It features an integrated mixing module that allows jobs to be processed independently without a dedicated PC. Job results are stored locally and can be used for stock control and reporting. The system provides benefits such as simplified installation and reduced costs compared to traditional PC-based systems.
El documento describe las tutorías académicas, definidas como la enseñanza personalizada e individualizada por un profesor. Explica que las tutorías tienen el objetivo de mejorar el rendimiento académico de los estudiantes y contribuir a su formación integral. Además, detalla las diferentes modalidades de tutorías (presencial, virtual, individual, grupal), el perfil del tutor, sus funciones de apoyo al desarrollo personal y académico de los estudiantes, y la planeación, desarrollo y evaluación de las sesiones de tutor
Este documento discute la influencia brasileña en Dahomey durante el siglo XIX. Destaca el papel de Félix Francisco de Souza y Domingo Martínez, dos comerciantes brasileños que jugaron un papel clave en la transición de Dahomey del comercio de esclavos al comercio legítimo. También analiza cómo la caída del Imperio de Oyo y el retorno de esclavos liberados de Brasil contribuyeron al establecimiento de la comunidad afro-brasileña en Dahomey y a la constru
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
This document provides an overview of image steganography techniques. It discusses how steganography can be used to hide secret information in digital images in order to provide secure transmission of data. The document first defines steganography and cryptography. It then describes the Least Significant Bit (LSB) substitution technique, which is a common steganography method that replaces the LSB of image pixel values with bits of secret data. The document outlines the proposed system for embedding and extracting secret messages from an image using LSB substitution. It presents the procedures for encryption by hiding a file within an image and decryption by extracting the hidden file. The document discusses security, invisibility and robustness as important considerations for steganography techniques.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
This document proposes a system to hide information using four algorithms for image steganography. The system first encrypts data using a modified AES algorithm. It then encrypts the encrypted data using a modified RSA algorithm. Next, it uses a fuzzy stream algorithm to add ambiguity. Finally, it hides the encrypted data in the least significant bits of cover images using LSB steganography. The document evaluates the proposed system using metrics like PSNR, MSE, and SSIM to analyze image quality and the ability to hide data imperceptibly compared to other techniques. It selects four color images as cover files and tests the system on them.
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
The document proposes an enhanced steganography-based approach to protect secret data by embedding it within audio files using a two-level protection system. Encryption using 3-DES is used as the first level of defense, while hiding data in the least significant bit of the audio samples creates the second level. The proposed approach achieves better performance than similar methods in terms of PSNR, SSIM, and correlation between the original and stego audio files. Experimental results show the system is suitable for hiding secret textual data and increases the bit error rate only slightly even when duplicating the hidden text.
The document proposes a new algorithm for hiding an image within a video clip. The algorithm embeds the first and second rows of the image into the first and last rows of each video frame. It does this for the red, green, and blue color channels. To extract the image, it takes the first and last rows of each frame and reconstructs the first two rows of the embedded image. The algorithm was implemented in MATLAB. Experimental results showed the hidden image was visually indistinguishable from the original video and had improved image quality compared to other methods. PSNR values between 30-31 dB demonstrated the effectiveness of the proposed approach.
Nesting of five modulus method with improved lsb subtitution to hide an image...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
The document provides an introduction to stenography, which is the ancient art of hiding messages so they are not detectable. It discusses how stenography aims to hide the existence of a message, while cryptography scrambles it so it cannot be understood. It then reviews traditional stenography methods used before digital means, and outlines some key terms like cover image and stego image. The document proposes an edge adaptive scheme for digital image stenography and discusses advantages like messages not attracting attention. It also reviews some applications of stenography like digital watermarking and discusses the technique's future scope.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Enhanced Secret Communication Using Multilevel Audio Steganography (20)
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
Enhanced Secret Communication Using Multilevel Audio Steganography
1. ISSN (e): 2250 – 3005 || Volume, 06 || Issue, 10|| October – 2016 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 6
Enhanced Secret Communication Using Multilevel Audio
Steganography
K. Bhowal1
, D. Chanda(Sarkar)2
, S. Biswas3
, P.P. Sarkar4
1, 2, 3, 4
DETS, University of Kalyani, Kolkata, India.
I. INTRODUCTION
The main aim of Steganography is to hide secret information in digital cover. The modification of the cover
caused by embedding secret information remains invisible to the third party observer. This is possible by
designing a suitable embedding algorithm and choosing an appropriate cover. That means, there will be no
significant difference between original cover and modified cover. Thus, secret information not only are hidden
inside the cover, but the fact of the secret information transmission is also hidden. Each Steganographic method
may be characterized by following requirements. First, undetectability is defined as the inability of detecting
secret information inside the cover. In fact, the distortion of the embedded cover convinces the adversary to
analyze the statistical properties of the cover and compare them to the distinctive properties of that cover. So,
imperceptibility or inaudibility is directly proportional to the undetectability. Second, embedding capacity is
defined as an amount of secret information can be transmitted using a particular algorithm per unit of time.
Third, Steganographic cost, which defines the amount of distortion of the cover caused due to the secret
information embedding procedure. The Steganographic cost depends on the cover used as a carrier and
embedding algorithm.
For each Steganographic method, there is always a trade-off between maximizing embedding capacity and
remaining secret information undetected. Therefore, a certain level of tuning between embedding capacity and
undetectability is required. As long as embedding and extracting algorithm remains secret to the adversary, it
can be used to transmit confidential information freely. But, if the both algorithms are known to the adversary,
anyone may be able to extract the secret information. The problem may be solved by using the encryption
algorithm. The encryption algorithm AES may be used to encrypt secret information before embedding process.
So, in this case, extracted information will not be readable. Still, there is a problem with this approach. Because,
the encryption key and the encrypted information are transmitted using the same embedding method. Thus, the
encryption key and the secret information both will be discovered on detection. On the other hand, embedding
capacity may be compromised due to embedding of key in cover. The Multilevel Steganography was originally
proposed by Al-Najjar for picture steganography in [1]. The basic idea in this paper was to hide a decoy image
into LSB positions of the cover and the original secret information is embedded into the LSB positions of the
decoy image.
Confidential information hiding takes normally two general methods: encryption and steganography [2, 3, 4]. In
encryption, information will hide using an encoding method that only authorized persons with the proper key
can decode it. On the other hand, Steganography hides information such a way that there is hidden information
ABSTRACT
The paper presents multilevel audio Steganography, which describes a new model for hidden
communication in secret communication technology. In multilevel Steganography, at least two
embedding methods are used in such a way that the second method will use the first method as a
carrier. This approach has several potential benefits in hidden communication. It can be used to
increase the level of security while transmitting the confidential information over public channels or
internet. It can also be used to provide two or more information hiding solutions simultaneously.
Another important advantage is that the lower-level embedding / extracting method and upper-level
embedding / extracting method are interrelated in terms of functionality and this makes the hidden
communication harder to detect. If the cover object is decoded by any adversary, he/she only obtains
a decoy message or a partial message. The performance of the proposed scheme in terms of
imperceptibility, capacity & security is measured through different experiments and results are
included in this paper.
Keywords: Audio Steganography, Multilevel Steganography, Secret Communication, Information
security, Imperceptibility, Embedding Capacity, Discrete Wavelet Transform
2. Enhanced Secret Communication Using Multilevel Audio Steganography
www.ijceronline.com Open Access Journal Page 7
is not specious to the regular observer. The secret raw information can be inserted directly or some
transformation can be applied to it before the hiding process. Normally, transformations include encryption,
compression, transformation or a combination of digital transformation techniques. An example is the hiding of
a text-object into another text-object [5]. A method of hiding plain text into an audio signal is proposed in [4].
Another method is proposed in [4], where audio is hidden in an image object. In [6], audio is hidden in an image
after performing encryption and compression. The hiding an image into another image is proposed in [5, 7] and
hiding an image into a video is proposed in [5, 8].
The information hiding techniques are developed for the protection of medical information in [9]. This paper
suggests a multiple-layer data hiding technique in spatial domain. It utilizes a reduced difference expansion
method to embed the bitstream in the least significant bits (LSBs) of the expanded differences. By using the
reduced difference expansion method, a large amount of data is embedded in a medical image whose quality can
also be maintained. Moreover, the original image can be restored after extracting the hidden data from the stego-
image.
In this paper, multilevel audio steganography is proposed to address the above stated problems. The proposed
approach extends the concept of steganography to use it in more general purpose.
1.1 Classification based on the area of application:
Multilevel steganography can be categorized based on the requirement of its application. Embedding capacity is
the basic requirement in some of the applications where imperceptibility may be compromised in a certain level.
On the other hand, imperceptibility is the main requirement in some of the applications where embedding
capacity may be compromised in a certain level. So, the multilevel steganography may be classified as like
below:
i) Single message multiple covers - multilevel steganography denoted as TYPE-I
A message is embedded in multiple covers using several embedding functions to increase the level of
security of the system. This approach provides better imperceptibility, but embedding capacity may be
compromised in most of the cases.
ii) Single cover multiple messages - multilevel steganography denoted as TYPE-II
Multiple messages are embedded in a single digital cover using several related embedding functions to
increase the embedding capacity of the system. This approach provides better embedding capacity, but
imperceptibility may be compromised in most of the cases.
II. PROPOSED METHOD
In this section, TYPE-I and TYPE-II types of multilevel steganography models are discussed.
2.1 Single message multiple covers - multilevel steganography model (TYPE-I)
Suppose, the Message is denoted as M, the Covers are denoted as Ci, the Intermediate Covers or stego-covers
are denoted as Ii. Here, the value of i depends on the level of steganography is to be performed.
The message M is passed through the transformation Ti. The transformations may include compression,
encryption or a transforms like Discrete Cosine Transform (DCT), Fourier Transform (FT) or Discrete Wavelet
Transform (DWT), etc. Sometimes a combination of techniques may be used as required by the particular
application.
Message embedding and extracting operations are performed by the embedding and extracting function pairs
embed() and extract() and denoted by f and f’ respectively. The message embedding function may vary to
improve the steganography attributes like imperceptibility, capacity, and robustness.
Ti = I means no transformation is applied. In the blind system, hidden information is extracted without using
cover Ci at the receiving end.
The TYPE-I multilevel steganography model (for i = 3) is presented in Figure 1 and Figure 2.
At the sender end, in phase 1, secret message M is embedded in cover object C1 using transformation T1 and
embedding function f1 and stego-object I1 is generated. In the next phase, stego-object I1 is hidden in another
new cover object C2 using transformation T2 and embedding function f2 and stego-object I2 is generated. This
process is continued as per the requirement of the application. There are three level of embedding process is
shown in Figure 1.
At the receiver end, according to the above 2 level embedding process, in phase 1, stego-object I1 is generated
from stego-object I2 and applying T2’ transformation and f2’ embedding function. In the next phase, secret
message M is generated from stego-object I1 by applying T1’ transformation and f1’ embedding function. There
are three level of extraction process shown in Figure 2.
3. Enhanced Secret Communication Using Multilevel Audio Steganography
www.ijceronline.com Open Access Journal Page 8
Figure .1: TYPE-I Multilevel Steganography model at the sender end for Level = 3
Figure 2: TYPE-I Multilevel Steganography model at the receiver end for Level = 3
2.1.1 Example of TYPE-I: 2 level steganography
Secret Message Embedding Process:
Level-1: for i = 1
The cover is a grayscale image (C1) and Message is a text message (M). Here, transmission T1 is an encryption
process. That means, secret message is encrypted using some standard encryption algorithm. The encrypted
secret message bits are embedded at the 2nd
LSB position of each pixel value of the cover image. The
embedding function f1 is defined as f1(mbit) = C1.LSB(2) and f1 is used to generate Intermediate cover or stego-
cover I1.
Leve-2: for i = 2
In this step, the cover is an audio signal (C2) and Intermediate Cover or stego-cover is I1. I1 is generated in the
previous step and it is an embedded image. The image is converted to a bit stream and each bit is embedded at
the 1st
LSB position of each audio sample of the audio signal. Here, transformation T2 = I and the embedding
function f2 is defined as f2(ibit) = C2.LSB(1) and f2 is used to generate Intermediate cover or stego-cover I2.
Secret Message Extraction Process:
Leve-2: for i = 2
The Intermediate Cover (I2) is an embedded audio signal and the embedded image bits are extracted from the 1st
LSB position of each audio sample. Here, transformation T2’ = I and the extracting function f2’ is defined as
f2’(ibit) = I2.LSB(1) and f2’is used to generate Intermediate cover or stego-cover I1.
Level-1: for i = 1
The Intermediate Cover (I1) is an embedded image and the message bits are extracted from the 2nd
LSB position
of each pixel value of the embedded image. Here, transmission T1’ is a decryption process of the corresponding
encryption algorithm used during embedding process. The extraction function f1’ is defined as f1’(mbit) =
I1.LSB(2) and f1’is used to generate secret message M.
2.2 Single cover multiple messages - multilevel steganography model (TYPE-II):
Suppose, the Cover is denoted as C, the Messages are denoted as Mi, the Intermediate Covers or stego-covers
are denoted as Ii. Here, the value of i depends on the level of steganography is to be performed.
The messages Mi are passed through the transformation Ti as like previous section. The TYPE-II multilevel
steganography model (for i = 3) is presented in Figure 3 and Figure 4.
4. Enhanced Secret Communication Using Multilevel Audio Steganography
www.ijceronline.com Open Access Journal Page 9
Figure 3: TYPE-II Multilevel Steganography model at the sender end for Level = 3
Figure 4: TYPE-II Multilevel Steganography model at the receiver end for Level = 3
At the sender end, in phase 1, secret message M1 is embedded in cover object C using transformation T1 and
embedding function f1 and stego-object I1 is generated. In the next phase, another message M2 is hidden in
stego-object I1 using transformation T2 and embedding function f2 and stego-object I2 is generated. This process
is continued as per the requirement of the application. There are three level of embedding process is shown in
Figure 3.
At the receiver end, according to the above 2 level embedding process, in phase 1, message M2 is generated
from stego-object I2 and applying T2’ transformation and f2’ embedding function. In the next phase, secret
message M1 is generated from stego-object I1 by applying T1’ transformation and f1’ embedding function. There
are three level of extraction process shown in Figure 4.
2.2.1 Example of TYPE-II: 2 level steganography
Secret Message Embedding Process:
Level-1: for i = 1
The cover is an audio clip (C) and the two secret messages are M1 and M2. Here, transmission T1 is Discrete
Wavelet Transform (DWT) and Inverse DWT (IDWT) of audio signal. The M1 message bits are embedded at
the 2nd
LSB position of each DWT coefficient of the audio signal. The embedding function f1 is defined as
f1(mbit) = C.LSB(2) and f1 and IDWT are used to generate Intermediate cover or stego-cover I1.
Leve-2: for i = 2
In this step, the cover is an Intermediate Cover or stego-cover (I1). I1 is generated in the previous step and it is an
embedded audio signal. The M2 message bits are embedded at the 1st
LSB position of each audio sample of the
audio signal. Here, transformation T2 = I and the embedding function f2 is defined as f2(mbit) = C.LSB(1) and f2
is used to generate Intermediate cover or stego-cover I2.
Secret Message Extracting Process:
Leve-2: for i = 2
The Intermediate Cover (I2) is an embedded audio signal and the M2 message bits are extracted from the 1st
LSB
position of each audio sample. Here, transformation T2’ = I and the extracting function f2’ is defined as f2’(abit)
= I2.LSB(1) and f2’is used to generate Intermediate cover or stego-cover I1.
Level-1: for i = 1
The Intermediate Cover (I1) is an embedded audio and the message bits are extracted from the 2nd
LSB position
of each DWT coefficient of the embedded audio signal. Here, transmission T1’ is DWT and IDWT of the
embedded audio signal. The extraction function f1’ is defined as f1’(abit) = I1.LSB(2) and f1’is used to generate
secret message M1.
III. EXPERIMENTAL RESULTS AND DISCUSSION
Proposed algorithm has been tested on 10 audio sequences from different music styles (classic, jazz, country,
pop, rock, etc.). All the Clips are 44.1 kHz sampled mono audio files, represented by 16 bits per sample, and
5. Enhanced Secret Communication Using Multilevel Audio Steganography
www.ijceronline.com Open Access Journal Page 10
length of the clips ranged from 10 to 20 seconds. An image and the all audio clips are used to test TYPE-I type
of algorithm and all the audio clips are used to test TYPE-II algorithm.
3.1 Imperceptibility Test
The main basic requirement is the imperceptibility in most of the applications. That means, after hiding secret
messages in audio signals, quality of the embedded audio signals should remain same as original audio signals.
The Subjective Difference Grade (SDG), Objective Difference Grade (ODG) and Signal-to-Noise Ratio (SNR)
is used to measure the imperceptibility of the proposed method. The SDG and ODG listening tests use the 5-
grade scale shown in Table 1.
Table 1: Subjective and objective grades for audio quality measurement
Audio quality Subjective difference
grade (SDG)
Objective difference
grade (ODG)
Imperceptible 5 0.0
Perceptible, but not annoying 4 -1.0
Slightly annoying 3 -2.0
Annoying 2 -3.0
Very annoying 1 -4.0
3.1.1 Objective Quality Measurements
Objective Difference Grade (ODG) is a suitable measurement of audio quality, since it is assumed to provide a
precise model of the Subjective Difference Grade (SDG) results that may be obtained by listening tests of a
group of expert listeners. In this work, the ODG measurements of different audio clips are provided using the
advanced ITU-R BS.1387 standard [10] and calculated using the Opera software [11] which is implemented by
maintaining ITU-R BS.1387 standard. ODG values for TYPE-I and TYPE-II approaches are reported in Table 2
and Table 3 respectively for different types of audio signals.
3.1.2 Subjective Quality Evaluation
Subjective quality measurements [12, 13] have been performed to evaluate the imperceptibility of our proposed
data hiding scheme. The ten participants were nominated for these subjective listening tests, five of them were
experts in music and the rest of the five was general listeners. All of the participants are presented with the
original and the embedded digital audio signals and were asked to report any difference between them, using
five-points SDG as given in Table 1. The output of the subjective tests is an average of the quality ratings called
a Mean Opinion Score (MOS). SDG values for TYPE-I and TYPE-II approaches are reported in Table 2 and
Table 3 respectively for different types of audio signals.
3.1.3 Signal-to-Noise Ratio (SNR) Measurement
The signal-to-noise ratio (SNR) value is used to make the difference between the original and embedded audio
signal [14]. Normally, if the SNR value is higher than 50 dB, then the secret data which are hidden in the audio
signal are imperceptible to the human auditory system. The SNR values are calculated using equation no. (1) for
different embedded audio signals. The original audio signal is denoted x(i), i = 1 to N while the stego audio
signal is denoted as y(i), i = 1 to N.
The ODG, SDG, and SNR values are evaluated for different audio signals. Here, 2 level multilevel
steganography is performed for TYPE-I and TYPE-II models. The results are presented in Table 2 and Table 3
of TYPE-I and TYPE-II models respectively. For simplicity, 10 audio clips are denoted as A1, A2, A3, A4, A5,
A6, A7, A8, A9 and A10.
Table 2: ODG, SDG & SNR values for different audio clips (TYPE-I, Level = 2)
Audio Types Objective Difference
Grade (ODG)
Subjective Difference
Grade (SDG)
Signal-to-Noise
Ratio (SNR(dB))
A1 -0.52 4.9 90.15
A2 -0.72 4.8 89.31
A3 -0.70 4.8 88.93
A4 -0.49 4.9 90.41
A5 -0.50 4.9 90.22
A6 -0.51 4.9 90.16
A7 -0.68 4.8 89.25
A8 -0.69 4.8 89.36
A9 -0.52 4.9 90.19
A10 -0.73 4.8 89.14
6. Enhanced Secret Communication Using Multilevel Audio Steganography
www.ijceronline.com Open Access Journal Page 11
Table 3: ODG, SDG & SNR values for different audio clips (TYPE-II, Level = 2)
Audio
Types
Objective Difference
Grade (ODG)
Subjective Difference
Grade (SDG)
Signal-to-Noise Ratio
(SNR(dB))
A1 -0.51 5.0 92.25
A2 -0.63 4.9 91.41
A3 -0.61 4.9 91.63
A4 -0.52 5.0 92.43
A5 -0.49 5.0 92.54
A6 -0.50 5.0 92.35
A7 -0.64 4.9 91.55
A8 -0.59 4.9 91.57
A9 -0.49 5.0 92.36
A10 -0.53 4.9 91.78
3.2 Embedding Capacity Analysis:
One of the basic requirements of the secret communication using steganography is increasing the embedding
capacity by keeping the imperceptibility in a desired level. In the proposed system, if TYPE-II approach is
followed, multiple messages may be embedded in a single cover object by designing appropriate transforms and
embedding functions.
3.3 Security Analysis:
Security is another very important requirement of hidden communication using steganography. In TYPE-I
approach, a message is hidden in a cover object and that stego-cover object is hidden in another cover object,
and so on. This approach increases the level of security of the system. Again, number of level is used during the
embedding process in multilevel steganography is very important information at the receiving end. That means,
security may be increased by varying the number of levels during embedding process. Along with this, any of
the encryption algorithms may be used at a transformation phase of the system to increase the security of the
system.
3.4 Comparative Study:
In this section, a comparative study is performed with the very recent works on audio steganography as well as
audio watermarking proposed by different authors. Actually, impartial comparison is very difficult, because
every approach have its own characteristics and also designed to fulfill certain basic requirement. Anyway, most
of the algorithm have some common characteristics like embedding capacity, imperceptibility etc. Here,
comparisons are performed based on embedding capacity and imperceptibility (SNR & ODG) of the system and
reported in Table 4.
Table 4: Comparative studies among different works
Algorithm Capacity (bps) SNR (dB) ODG
[15] 2 42.8 to 44.4 -1.66 <ODG<-1.88
[16] 4.3 29.5 Not reported
[17] 3k 30.55 -0.6
[18] 2k-6k Not reported -0.6 < ODG <-1.7
[19] 11 k 30 -0.7
[20] 64 30-45 -1< ODG
[21] 4-512 Not reported -1 < ODG
[22] 8 Not reported -3 < ODG < -1
Proposed 44100 92.54 -0.49 < ODG < -0.64
IV. CONCLUSION
In this work, two multilevel steganography models are proposed. Normally, requirement of data hiding
application are varied from application to application. The proposed models are designed such a way that the
customization may be done as per the requirement of a particular application. That means, number of
embedding and extracting levels, number of messages to be hidden, and number of cover objects to be used etc.
are customizable. The suggested model enhances the security level of the steganography technique. The stego-
object usually does not seem suspicion, since it looks similar to the original object for the general observer. An
adversary may be satisfied with the decoy as the hidden message and may not use additional tools to look
further. The authorized receivers have information about the hidden message, as well as the information
required to extract the message. Hence, it can be concluded that the proposed models enhanced potentially more
security to information hiding.
7. Enhanced Secret Communication Using Multilevel Audio Steganography
www.ijceronline.com Open Access Journal Page 12
REFERENCES
[1] A. J. Al-Najjar. The Decoy: Multi-Level Digital Multimedia Steganography Model. In Proc. of 12th WSEAS International
Conference on Communications, Heraklion, Greece, July 23-25, 2008.
[2] R. J. Anderson, F. A. P. Petitcolas. On the Limits of the Steganography. IEEE Journal of Selected Areas in Communications. 16:
474-481, 1998.
[3] D. Artz. Digital Steganography: Hiding Data within Data. IEEE Internet Computing. pages 75-80, May-June 2001.
[4] D. Vitaliev. Digital Security and Privacy for Human Rights Defenders. The International Foundation for Human Right Defenders.
Pages 77-81, Feb. 2007.
[5] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn. Information Hiding - A Survey. Proceedings of the IEEE, special issue on
protection of multimedia content, 87:1062-1078, July 1999.
[6] A. J. Al-Najjar, A. K. Alvi, S. U. Idrees, A. M. Al-Manea. Hiding Encrypted Speech Using Steganography. MIV’07, WSEAS 2007,
pages 275-281, Sept. 15-17, Beijing, China, 2007.
[7] L. M. Marvel. Image Steganography for Hidden Communication, Ph.D. Dissertation, University of Delaware, Spring 1999.
[8] M. Solanki. Multimedia Data Hiding: From Fundamental Issues to Practical Techniques, Ph.D. Dissertation, University of
California, Santa Barbara, US, December 2005.
[9] D. C. Lou, M. C. Hu, J. L. Liu. Multiple layer data hiding scheme for medical images. Computer Standards and Interfaces 31: 329–
335, 2009.
[10] T. Thiede, W. C. Treurniet, R. Bitto, C. Schmidmer, T. Sporer, J. G. Beerens, C. Colomes, M. Keyhl, G. Stoll, K. Brandenburg, and
B. Feiten. PEAQ - The ITU standard for objective measurement of perceived audio quality. J. AES. 48: 3–29, 2000.
[11] OPTICOM OPERA software site, [Online]. Available: http://www.opticom.de/products/opera.html
[12] M. Unoki, K. Imabeppu, D. Hamada, A. Haniu, and R. Miyauchi. Embedding limitations with digital-audio watermarking method
based on cochlear delay characteristics. J. Inf. Hiding Multimedia Signal Process. 2: 1–23, 2011.
[13] S. Wang and M. Unoki. Speech watermarking method based on formant tuning. IEICE Trans. Inf. Syst. E98-D: 29–37, 2015.
[14] S. R. Quackenbush, T. P. Barnwell III, and M. A. Clements. Objective Measures of Speech Quality. Prentice Hall, Englewood
Cliffs, 1988.
[15] S. Xiang, H. J. Kim, and J. Huang. Audio watermarking robust against time-scale modification and mp3 compression. Signal
Process. 88: 2372–2387, Oct. 2008.
[16] M. Mansour and A. Tewfik. Data embedding in audio using time-scale modification. IEEE Trans. Speech Audio Process. 13: 432–
440, May 2005.
[17] M. Fallahpour and D. Megías. High capacity audio watermarking using fft amplitude interpolation. IEICE Electron. Express,
6:1057–1063, 2009.
[18] M. Fallahpour and D. Megías. High capacity method for real-time audio data hiding using the fft transform. in Advances in
Information Security and Its Application. Berlin, Germany: Springer-Verlag, pages 91–97, 2009.
[19] M. Fallahpour and D. Megías. High capacity audio watermarking using the high frequency band of the wavelet domain. in
Multimedia Tools and Applications. New York, NY, USA: Springer, vol. 52, pages 485–498, 2011.
[20] X. Kang, R. Yang, and J. Huang. Geometric invariant audio watermarking based on an LCM feature. IEEE Trans. Multimedia, 13:
181–190, Apr. 2011.
[21] M. Unoki and D. Hamada. Method of digital-audio watermarking based on cochlear delay characteristics. Int. J. Innovat. Comput.,
Inf. Control, 6:1325–1346, Mar. 2010.
[22] A. Nishimura. Audio data hiding that is robust with respect to aerial transmission and speech codecs. Int. J. Innovat. Comput., Inf.
Control, 6: 1389–1400, Mar. 2010.