The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of
camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia
content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access
from suspicion of the existence of confidential information exchanged during communication channels
between the connected parties. In this paper, an integrated image steganographic system is designed to
conceal images, messages or together where the mainly deliberate the improvement of embedding capacity
through embedding text with image simultaneously. For that purpose, used matrix partition to partition the
secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify
the better performance of the proposed algorithms.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of
camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia
content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access
from suspicion of the existence of confidential information exchanged during communication channels
between the connected parties. In this paper, an integrated image steganographic system is designed to
conceal images, messages or together where the mainly deliberate the improvement of embedding capacity
through embedding text with image simultaneously. For that purpose, used matrix partition to partition the
secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify
the better performance of the proposed algorithms.
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachCSCJournals
While it is possible to make a patient's medical images available to a practicing radiologist online e.g. through open network systems inter connectivity and email attachments, these methods don't guarantee the security, confidentiality and tamper free reliability required in a medical information system infrastructure. The possibility of securely and covertly transmitting such medical images remotely for clinical interpretation and diagnosis through a secure steganographic technique was the focus of this study.
We propose a method that uses an Enhanced Least Significant Bit (ELSB) steganographic insertion method to embed a patient's Medical Image (MI) in the spatial domain of a cover digital image and his/her health records in the frequency domain of the same cover image as a watermark to ensure tamper detection and nonrepudiation. The ELSB method uses the Marsenne Twister (MT) Pseudo Random Number Generator (PRNG) to randomly embed and conceal the patient's data in the cover image. This technique significantly increases the imperceptibility of the hidden information to steganalysis thereby enhancing the security of the embedded patient's data.
In measuring the effectiveness of the proposed method, the study adopted the Design Science Research (DSR) methodology, a paradigm for problem solving in computing and Information Systems (IS) that involves design and implementation of artefacts and methods considered novel and the analytical testing of the performance of such artefacts in pursuit of understanding and enhancing an existing method, artefact or practice.
The fidelity measures of the stego images from the proposed method were compared with those from the traditional Least Significant Bit (LSB) method in order to establish the imperceptibility of the embedded information. The results demonstrated improvements of between 1 to 2.6 decibels (dB) in the Peak Signal to Noise Ratio (PSNR), and up to 0.4 MSE ratios for the proposed method.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
Hide text depending on the three channels of pixels in color images using the...IJECEIAES
At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
Towards A More Secure Web Based Tele Radiology System: A Steganographic ApproachCSCJournals
While it is possible to make a patient's medical images available to a practicing radiologist online e.g. through open network systems inter connectivity and email attachments, these methods don't guarantee the security, confidentiality and tamper free reliability required in a medical information system infrastructure. The possibility of securely and covertly transmitting such medical images remotely for clinical interpretation and diagnosis through a secure steganographic technique was the focus of this study.
We propose a method that uses an Enhanced Least Significant Bit (ELSB) steganographic insertion method to embed a patient's Medical Image (MI) in the spatial domain of a cover digital image and his/her health records in the frequency domain of the same cover image as a watermark to ensure tamper detection and nonrepudiation. The ELSB method uses the Marsenne Twister (MT) Pseudo Random Number Generator (PRNG) to randomly embed and conceal the patient's data in the cover image. This technique significantly increases the imperceptibility of the hidden information to steganalysis thereby enhancing the security of the embedded patient's data.
In measuring the effectiveness of the proposed method, the study adopted the Design Science Research (DSR) methodology, a paradigm for problem solving in computing and Information Systems (IS) that involves design and implementation of artefacts and methods considered novel and the analytical testing of the performance of such artefacts in pursuit of understanding and enhancing an existing method, artefact or practice.
The fidelity measures of the stego images from the proposed method were compared with those from the traditional Least Significant Bit (LSB) method in order to establish the imperceptibility of the embedded information. The results demonstrated improvements of between 1 to 2.6 decibels (dB) in the Peak Signal to Noise Ratio (PSNR), and up to 0.4 MSE ratios for the proposed method.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
Hide text depending on the three channels of pixels in color images using the...IJECEIAES
At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 6, December 2023, pp. 6797~6805
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i6.pp6797-6805 6797
Journal homepage: http://ijece.iaescore.com
Hiding algorithm based fused images and Caesar cipher with
intelligent security enhancement
Huda Hussein Abed, Aqeel Sajjad Shaeel, Ruaa Shallal Abbas Annoze
Engineering Technical College-Najaf, Al-Furat Al-Awsat Technical University, Najaf, Iraq
Article Info ABSTRACT
Article history:
Received Mar 18, 2023
Revised May 21, 2023
Accepted Jun 4, 2023
The process of sending confidential data through the communication media
and in complete secrecy is now necessary, whether the data is related to
patients, a particular military operation, or a specified office. On the other
hand, with the development of various ciphering algorithms, and information
hiding algorithms, there is a need to obtain ciphered and hidden data
securely without the need to exchange secret keys between the two ends of
the communication. In this paper, a hiding algorithm based on fused images
and Caesar cipher with intelligent methods to strengthen the security of
confidential information is proposed. Firstly, fused image scattering is
obtained using 1’s complement and circularly shifting the bits of fused
pixels by specified positions before the hiding process. Secondly, the keys
for the Caesar cipher are derived from the length of secret information
according to the mathematical equation. Thirdly, strengthen the security of
Caesar’s cipher by taking a 1’s complement of each letter in the cipher data.
The results guarantee the security of the presented algorithm.
Keywords:
1’s complement
Caesar cipher
Fused images
Hiding algorithm
Intelligent methods
This is an open access article under the CC BY-SA license.
Corresponding Author:
Huda Hussein Abed
Department of Communication Techniques Engineering, Engineering Technical College-Najaf, Al-Furat
Al-Awsat Technical University
Najaf, Iraq
Email: eng.huda2020@atu.edu.iq
1. INTRODUCTION
Due to the open nature of the internet, users face the danger of having their private information
intercepted or distorted while taking advantage of the convenient electronic information exchange made
possible by highly evolved internet and information technology. Thus, it is crucial to create secure
communication methods [1]. The most important methods for information security are ciphering and
information hiding [2]. Ciphering is a method for encoding and manipulating private data so that only
authorized users may access or use it [3]. The science of information hiding is called steganography [4]. It is
done by obscuring the existence of the information by blending it into other data [5]. A variety of digital
mediums, such as image, video, audio, and text, can be utilized to conceal sensitive information [6], [7]. The
information hiding idea is illustrated in Figure 1.
The vast majority of currently used methods to conceal information rely on image hiding algorithm.
This method principally meets the imperceptibility criteria of hiding algorithm by making the little
modifications made to the image imperceptible to the human visual system. Some of the image hiding
algorithms used are spatial domain method, where the secret information is directly embedded in the pixel
intensity, such as least significant bit technique, and another method of the image hiding algorithms is
transform domain, where the secret information is concealed in the frequency domain of an earlier
transformed image [8].
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6797-6805
6798
Figure 1. Depicts the information hiding idea [9]
The major problem of data concealing strategies is to include the most information possible while
maintaining the image’s quality, security, and method resilience to electronic attacks by hackers. Due to the
vast number of available digital images on the web and the ease with which the images are used in a hiding
process, several schemes have been proposed to hide data in images. Researchers have made an effort to
create contemporary strategies to deal with the rapid evolution of hiding techniques [10].
Abdur et al. [11] described a hybrid security method that combines watermarking, steganography,
and encryption. It consists of three essential parts: firstly, the secret image is ciphered utilizing the secret key.
Secondly, the encrypted image embedded into the cover image utilizing the least significant bit (LSB)
method to obtain the stego-image. Thirdly, the ownership of the stego-image has been ensured by using
watermarking in spatial and frequency domains, respectively. Their suggested method offers great security
against threats and assaults. Lotlikar [12] proposed data hiding method-based cryptography algorithms. The
primary goal of their proposed method is to offer a safe means of sending and receiving sensitive and
significant data between users in the form of images.
Susanto et al. [13] proposed a method for combination two security techniques, steganography and
cryptography. The steganography technique is based on LSB that has benefits in data embedding capability
and secret data imperceptibility. Since the LSB approach is so straightforward and predictable, additional
encryption techniques are used to increase communication security. The secret data is encrypted using hybrid
Beaufort Vigenere (HBV) before embedding it. HBV encryption is a combination of Vigenère cipher and
Beaufort algorithm in order to increase data security.
Alabaichi et al. [14] proposed an image steganography utilizing LSB and secret map approaches
that performs by applying 3D Chebyshev and 3D logistic maps in order to achieve excellent security. The
proposed method is based on the idea of performing random embedding and choosing a pixel from the cover
image. The suggested approach is thoroughly assessed using a variety of metrics, including correlation
coefficient, homogeneity, information entropy, histogram, concealing capacity, key sensitivity, peak signal-
to-noise ratio (PSNR), mean square error (MSE), and image fidelity. As a result, their proposed method
effectively conceals sensitive information while maintaining a stego-image with high visual quality.
Almayyahi et al. [15] focused on creating a safe technique for concealing information in images
using LSB. The Huffman algorithm is used to compress the secret message before it is moved on to the
embedding step. Exclusive-NOR (XNOR) operation and the Fibonacci algorithm are then used to choose
which pixels to insert secret information. These procedures lead to the creation of a stego-image with two
secret keys. The evaluation step of their proposed method demonstrates both the rising security and
imperceptibility.
Almazaydeh [8] presented an image steganographic method utilizing a canny edge detector that
depends on embedding the private message bits using variable LSB length of one channel from the red,
green, and blue (RGB) cover image. The blue channel was chosen because a steganography-based study
revealed that blue color intensity is seen visually as being less distinct than red and green colors. Private bits
are hidden up to four LSB bits which are chosen using a random number generator.
Ogundokun and Abikoye [16] proposed a modified LSB approach capable of concealing and
preserving medical data in order to address the essential authentication problem. Their proposed method
employed a logical bit shift operation. Their suggested protected medical information system was shown to
be effective in concealing medical data and producing undetected stego-image.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Hiding algorithm based fused images and Caesar cipher with intelligent security … (Huda Hussein Abed)
6799
An image steganography technique-based Alpha blending is proposed in [17] by utilizing Haar
discrete wavelet transform (DWT). DWT is utilized for both the cover image and the secret image. The secret
image is ciphered first and then fused to create the stego-image.
Nezami et al. [18] suggested a method that employs the hash function for steganography, and the
Caesar cipher and Vigenère to encrypt the message before the hiding process. The proposed approach uses a
cover image in the spatial to hide encrypted data. Comparing the suggested method to the conventional LSB
steganography methodologies, security and speed are improved.
This paper introduces security procedures for confidential information by combining ciphering and
information hiding techniques. Confidential information is ciphered using Caesar cipher with an intelligent
method to generate Caesar key by deriving it from the length of confidential information according to a
mathematical equation. Thus, the Caesar key exchange between the two ends of the connection is not
required.
After that, a 1’s complement is taken for each character in the encoding data to provide a second
level of security, then the 1’s complementary form is hidden using an information hiding technique in the
spatial domain with intelligent methods for creating the medium of hiding technique. The hiding medium is
created by fusing two images, then scattering the resultant fused image by 1’s complement and circularly
shifting the bits of fused pixels with specified positions before the hiding process. Thus, the security of the
spatial domain pixels is reinforced.
The paper is categorized into the following categories: section 2 introduces the principle of Caesar
cipher and fused image. In section 3, details of the proposed algorithm are presented. In section 4, the
detailed results were summarized and discussed. Finally, section 5 is considered to be the conclusion of the
paper.
2. PRINCIPLE OF CAESAR CIPHER AND FUSED IMAGE
2.1. Caesar cipher
Caesar cipher is an example of a substitution cipher, where each letter in the plaintext is changed to
a letter that is moved a predetermined number of positions down the alphabet. Modular arithmetic is used to
illustrate the encryption [19], [20]. Julius Caesar, the invention’s name, is another name for the Caesar cipher
[19]. For instance, if the shift was 3, A would become D, B would become E, and C would become F [21] as
demonstrated in Figure 2.
One of the Caesar cipher’s biggest flaws is that, even in cipher-text only scenarios, it is readily
cracked. Various methods that break the text of the codes have been discovered utilizing frequency analysis
and pattern words. One method is to employ brute force in order to match the frequency distribution for the
letters. Because there are a finite number of shifts that might occur [22].
2.2. Fused images
Image fusion is the technique of taking the visually significant information from two or more
images and merging them together to create a single fused image [23]. It is crucial that the image fusion be
carried out without using any sort of final image distortion [24]. Figure 3 depicts the wavelet-based image
fusion algorithm. The source images are decomposed into approximate coefficient and detailed coefficient at
the necessary level utilizing DWT. The fusion rule is used to merge the approximate and detailed coefficients
of both source images. By using inverse discrete wavelet transform (IDWT), the fused image is produced
[25].
Figure 2. depicts the process of Caesar
cipher [21]
Figure 3. depicts the process of the fused image [25]
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6797-6805
6800
3. METHOD
The different steps employed to provide security in the proposed method are demonstrated in detail
according to the following parts. Part 1 explains the detailed steps that are performed to reinforce the security
of the pixels in the spatial domain before the hiding process, while the detailed steps to enhance the security
of confidential data are explained in part 2. Finally, the entire proposed schemes at the sending and receiving
ends, respectively, are shown in Figures 4 and 5.
Figure 4. The steps employed for the sending part
5. Int J Elec & Comp Eng ISSN: 2088-8708
Hiding algorithm based fused images and Caesar cipher with intelligent security … (Huda Hussein Abed)
6801
Figure 5. The steps employed for the receiving part
Part 1: the steps of the security procedure for creating the medium of hiding are explained as:
a) Fuse two cover images of the same size after reading them to create a fused image.
b) The positions of pixels for the fused image are shifted circularly by half its size in each dimension. Thus,
the location of the corners for the fused image is replaced.
c) The 1’s complements for each pixel of the fused image are obtained and saved as a complementary
image. After that, the bits per pixel are shifted by 3 locations to the left and saved as a shifted image.
Finally, an XOR operation is performed between the complementary image and the shifted image to
create a scrambled fused image with new pixel values used to hide secret bits.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6797-6805
6802
Part 2: the steps of the security procedure for confidential data before hiding are explained as:
a) After reading the secret text, it will be encrypted using Caesar cipher with a new method of formation the
Caesar key depending on the length of confidential data according to a mathematical equation.
b) The 1’s complement for each letter in the cipher data is obtained to provide a second level of security.
4. RESULTS AND DISCUSSION
The execution of the suggested algorithm is performed by using MATLAB (R2021a). Two
grayscale cover images of the same size are required to observe the achievement of the algorithm in offering
security for secret information. The database of the signal and image processing institute “SIPI image
database” is utilized for the examination. The steps employed for the proposed scheme at the sending part are
demonstrated with detailed in the following Figures. Figure 6 illustrates the steps employed for the process of
fusing two cover images, the first cover image in Figure 6(a), the first cover image after applying DWT in
Figure 6(b), the second cover image in Figure 6(c), the second cover image after applying DWT in
Figure 6(d), the process of fusing two cover images in frequency domain in Figure 6(e), and applying IDWT
for the fused images in Figure 6(f). Figure 7(a) illustrates the corner replacement of the fused images, 1’s
complement for the pixels in Figure 7(b) and scrambled fused images in Figure 7(c). Figure 8(a) illustrates
the secret information, cipher of secret information using the Caesar algorithm in Figure 8(b), and 1’s
complement of Caesar cipher in Figure 8(c). Figure 9 illustrates the steps employed for the formation of a
Ceasar key.
(a) (b) (c)
(d) (e) (f)
Figure 6. The steps employed for the process of fusing two cover images (a) 1st
cover image, (b) decomposed
1st
cover image using DWT, (c) 2nd
cover image, (d) decomposed 2nd
cover image using DWT, (e) fused two
cover images, and (f) fused images in special domain
As illustrated in Figures 6 and 7, several security steps are performed to reinforce the security of the
spatial domain pixels before the hiding process, so the attacker cannot know the pixel values utilized in the
hiding process. On the other hand, two security steps are implemented to enhance the security of confidential
data before the hiding process, as shown in Figures 8. In addition, the formation of the Caesar key based on
the number of characters for the secret data enhances the Caesar cipher secrecy, as the exchanging process of
the Caesar key between the sending and receiving parties is not required.
Table 1 shows the Caesar key for the different lengths of confidential data and the time required for
the encryption and decryption processes, respectively. According to the Caesar key shown in Table 1, the key
7. Int J Elec & Comp Eng ISSN: 2088-8708
Hiding algorithm based fused images and Caesar cipher with intelligent security … (Huda Hussein Abed)
6803
is changed depending on the length of the confidential data, so it is possible to add data to the original secret
data to obtain a different key instead of exchanging a new key between the two ends of the connection.
(a) (b) (c)
Figure 7. The steps employed for enhancing the security of fused images (a) fused images with corner
replacement, (b) 1’s complement for the pixels, and (c) scrambled fused images
(b)
(c)
(a)
Figure 8. The steps employed for enhancing the security of secret information (a) secret information,
(b) cipher of secret information using Caesar algorithm, and (c) 1’s complement of Caesar cipher
Figure 9. The formation of Ceasar key
Table 1. The performance of the Caesar cipher with the formation of key
The number of characters Caesar key Time required for the encryption Time required for the decryption
278 characters 8 0.002117 seconds 0.000634 seconds
626 characters 14 0.006566 seconds 0.002610 seconds
1093 characters 18 0.017665 seconds 0.000320 seconds
5. CONCLUSION
In this paper, a reliable algorithm for protecting confidential information utilizing fused images is
proposed, where four levels of security are provided for the secret information. Firstly, confidential
information is encrypted using Caesar cipher with a new method for the formation of the Caesar key. After
that, the cipher form of encrypted data is complemented using 1’s complement. That procedure enhances the
security of Caesar cipher and thus provides a second level of security for secret information. A third level for
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 6, December 2023: 6797-6805
6804
security is provided using fused two cover images, then scattering the resulting cover image by 1’s
complement and circularly shifting the bits of fused pixels with specified positions before the hiding process.
Finally, the fourth level of security is provided by the hiding technique in the spatial domain, where the
complemented form of cipher information is concealed in the scrambled fused image utilizing the LSB
technique. Simulation results demonstrate that the proposed approach provides higher security for
confidential information.
REFERENCES
[1] S. Song, J. Zhang, X. Liao, J. Du, and Q. Wen, “A novel secure communication protocol combining steganography and
cryptography,” Procedia Engineering, vol. 15, pp. 2767–2772, 2011, doi: 10.1016/j.proeng.2011.08.521.
[2] A. A. AL-Shaaby and T. AlKharobi, “Cryptography and steganography: New approach,” Transactions on Networks and
Communications, vol. 5, no. 6, Dec. 2017, doi: 10.14738/tnc.56.3914.
[3] E. Agrawal and J. Jain, “A review on various methods of cryptography for cyber security,” International Journal on Recent and
Innovation Trends in Computing and Communication (IJRITCC), vol. 6, no. 7, 2018.
[4] E. Zinaly and A. Naghipour, “Audio steganography to protect the confidential information: A survey,” International Journal of
Computer Applications, vol. 169, no. 1, pp. 22–29, Jul. 2017, doi: 10.5120/ijca2017914561.
[5] M. Begum and M. S. Uddin, “Digital image watermarking techniques: a review,” Information, vol. 11, no. 2, Feb. 2020, doi:
10.3390/info11020110.
[6] M. Hassaballah, M. A. Hameed, and M. H. Alkinani, “Introduction to digital image steganography,” in Digital Media
Steganography, Elsevier, 2020, pp. 1–15.
[7] A. Rehman, T. Saba, T. Mahmood, Z. Mehmood, M. Shah, and A. Anjum, “Data hiding technique in steganography for
information security using number theory,” Journal of Information Science, vol. 45, no. 6, pp. 767–778, Dec. 2019, doi:
10.1177/0165551518816303.
[8] L. Almazaydeh, “Secure RGB image steganography based on modified LSB substitution,” International Journal of Embedded
Systems, vol. 12, no. 4, 2020, doi: 10.1504/IJES.2020.107644.
[9] S. Atawneh and P. Sumari, “Hybrid and blind steganographic method for digital images based on DWT and chaotic map,”
Journal of Communications, vol. 8, no. 11, pp. 690–699, 2013, doi: 10.12720/jcm.8.11.690-699.
[10] Z. S. Younus and M. K. Hussain, “Image steganography using exploiting modification direction for compressed encrypted data,”
Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 6, pp. 2951–2963, Jun. 2022, doi:
10.1016/j.jksuci.2019.04.008.
[11] M. Abdur, R. Ahmed, M. Adnan, and A. Ahmed, “Digital image security: fusion of encryption, steganography and
watermarking,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 5, 2017, doi:
10.14569/IJACSA.2017.080528.
[12] S. Lotlikar, “Image steganography and cryptography using three level password security,” International Journal for
Research in Applied Science and Engineering Technology, vol. V, no. IV, pp. 1370–1374, Apr. 2017,
doi: 10.22214/ijraset.2017.4244.
[13] A. Susanto, D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, R. R. Ali, and I. U. W. Mulyono, “Dual security method for
digital image using hbv encryption and least significant bit steganography,” Journal of Physics: Conference Series, vol. 1201,
no. 1, May 2019, doi: 10.1088/1742-6596/1201/1/012024.
[14] A. Alabaichi, M. A. A. K. Al-Dabbas, and A. Salih, “Image steganography using least significant bit and secret map techniques,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 935–946, Feb. 2020, doi:
10.11591/ijece.v10i1.pp935-946.
[15] A. A. Almayyahi, R. Sulaiman, F. Qamar, and A. Essa, “High-security image steganography technique using XNOR operation
and fibonacci algorithm,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 10, 2020, doi:
10.14569/IJACSA.2020.0111064.
[16] R. O. Ogundokun and O. C. Abikoye, “A safe and secured medical textual information using an improved LSB image
steganography,” International Journal of Digital Multimedia Broadcasting, pp. 1–8, Mar. 2021, doi: 10.1155/2021/8827055.
[17] S. S. Tevaramani and R. J, “Image steganography performance analysis using discrete wavelet transform and alpha
blending for secure communication,” Global Transitions Proceedings, vol. 3, no. 1, pp. 208–214, Jun. 2022,
doi: 10.1016/j.gltp.2022.03.024.
[18] Z. I. Nezami, H. Ali, M. Asif, H. Aljuaid, I. Hamid, and Z. Ali, “An efficient and secure technique for image steganography using
a hash function,” PeerJ Computer Science, vol. 8, Nov. 2022, doi: 10.7717/peerj-cs.1157.
[19] B. Purnama and A. H. H. Rohayani, “A new modified Caesar cipher cryptography method with Legible Ciphertext from a
message to be encrypted,” Procedia Computer Science, vol. 59, pp. 195–204, 2015, doi: 10.1016/j.procs.2015.07.552.
[20] G. N. Salmi and F. Siagian, “Implementation of the data encryption using Caesar cipher and Vernam cipher methods based on
CrypTool2,” Journal of Soft Computing Exploration, vol. 3, no. 2, Sep. 2022, doi: 10.52465/joscex.v3i2.86.
[21] Y. N. A. Taher, K. A. Ameen, and A. M. Fakhrudeen, “An efficient hybrid technique for message encryption using Caesar cipher
and deoxyribonucleic acid steganography,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS),
vol. 28, no. 2, pp. 1096–1104, Nov. 2022, doi: 10.11591/ijeecs.v28.i2.pp1096-1104.
[22] A. Jain, R. Dedhia, and A. Patil, “Enhancing the security of Caesar cipher substitution method using a randomized approach for
more secure communication,” International Journal of Computer Applications, vol. 129, no. 13, pp. 6–11, Nov. 2015, doi:
10.5120/ijca2015907062.
[23] S. Jadhav, “Image fusion based on wavelet transform,” International Journal of Engineering Research, vol. 3, no. 7, pp. 442–445,
Jul. 2014, doi: 10.17950/ijer/v3s7/707.
[24] H. A. H. Mahmoud, “A novel image fusion scheme using wavelet transform for concealed weapon detection,” International
Journal of Advanced Computer Science and Applications, vol. 11, no. 2, 2020, doi: 10.14569/IJACSA.2020.0110239.
[25] V. Naidu and J. Raol, “Pixel-level image fusion using wavelets and principal component analysis,” Defence Science Journal,
vol. 58, no. 3, pp. 338–352, May 2008, doi: 10.14429/dsj.58.1653.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Hiding algorithm based fused images and Caesar cipher with intelligent security … (Huda Hussein Abed)
6805
BIOGRAPHIES OF AUTHORS
Huda Hussein Abed Assistant Lecturer at Communication Techniques
Engineering Department, Engineering Technical College-Najaf, AL-Furat Al-Awsat Technical
University. She received Bachelor’s and master’s degrees in Communication Techniques from
Engineering Technical College-Najaf, AL-Furat Al-Awsat Technical University, Iraq in 2010
and 2019, respectively. Her current research interests include communication security, digital
image processing, steganography, and digital communication. She can be contacted at email:
eng.huda2020@atu.edu.iq.
Aqeel Sajjad Shaeel works at Laser and Optoelectronics Tech. Eng. Department,
Engineering Technical College-Najaf, AL-Furat Al-Awsat Technical University. He received
the B.Sc. in Electrical Engineering from University of Babylon. He received a M.Sc. in
communication engineering from Amirkabir University of Technology. His research interests
include LEO Satellite, information security, IoT, digital communication. He can be contacted
at email: aqeelsajjad1@gmail.com.
Ruaa Shallal Abbas Annoze received her Bachelor of Communication Technical
Engineering from Engineering Technical Collage-Najaf, Iraq, in 2006, and her M.Tech. of
Communication System Engineering in the Department of Electronics and Communication
Engineering in SHIATS, Allahabad, India, in 2014. She is currently a Ph.D. student at Tabriz
university. Her area of interest includes digital signal processing, beam and channel estimation,
and Antennas Design. She can be contacted at email: coj.rua@atu.edu.iq.