The document summarizes a research paper that proposes a reversible data hiding method using histogram shifting with additional techniques to improve embedding capacity and image quality. It divides the host image into blocks to embed data, uses data compression methods like Huffman coding to compress secret data, and shifts the pixel value histogram to embed the data without causing overflow or underflow. The method uses a binary tree structure to communicate multiple peak points used for embedding and ensures reversibility through a location map recording histogram shifting information. The goal is to provide high embedding capacity with low distortion for applications requiring original image retrieval like medical and military imaging.
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 Parthipan Parthi
This document proposes a reversible data hiding scheme that can embed secret data in images for military and medical applications. It uses an iterative procedure to calculate an optimal value transfer matrix, which allows secret data and original pixel values to be recovered with good payload-distortion performance. The system embeds data by modifying pixel value estimates based on the matrix. It then extracts the secret data and recovers the original image values inversely at the receiver.
In recent years the topic of steganography has become
very popular and a lot of research is being done in this field.
Reversible data hiding is a method in which the image in which
the encrypted data is hidden is losslessly recovered. In this paper
we have proposed such a method that the previous work done
limitations can be overcome. In this paper, we embed the
encrypted data in the image by using LSB matching technique for
reserving room, so that fast, optimal and lossless steganography
is achieved. The proposed method provides total reversibility,
that is, data extraction and image recovery.
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted
images, since it maintains the excellent property that the original cover can be losslessly recovered
after embedded data is extracted while protecting the image content’s confidentiality. All previous
methods embed data by reversibly vacating room from the encrypted images, which may be subject
to some errors on data extraction and/or image restoration. In this survey paper, we discuss about
various methods and algorithms which were used for reversible data hiding (RDH) in encrypted
image to make data hiding process effortless. We also use visual cryptographic approach for
encryption which helps to protect the image during transmission. The scheme is suitable for
authentication based application where collective acceptance and decision making plays an important
role. The main goal is to retrieve the original image with lossless process and minimum computation
during image encryption /decryption by using keyless approach.
Reversible data hiding in encrypted images by reserving room before encryptionIEEEFINALYEARPROJECTS
The document proposes a novel reversible data hiding method called "reserving room before encryption" (RRBE). It reserves room in the original image prior to encryption using a traditional reversible data hiding algorithm. This allows easy embedding of data in the encrypted image without errors during extraction and recovery. Experiments show it can embed over 10 times more payload than previous methods like vacating room from encrypted images, for the same image quality. The key advantages are real reversibility without extraction or recovery errors, and improved image quality for a given payload or increased payload for acceptable quality.
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
I-frames, P-frames, and B-frames are the three major picture types or frame types used in video compression algorithms. I-frames are fully specified frames that do not require other frames to decode but are the least compressible. P-frames store only the changes from previous frames and are more compressible than I-frames but require previous frames to decode. B-frames can use both previous and forward frames for reference and achieve the highest compression but require both previous and forward frames to decode. I-frames are used as random access points and references for decoding other frames.
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3 Parthipan Parthi
This document proposes a reversible data hiding scheme that can embed secret data in images for military and medical applications. It uses an iterative procedure to calculate an optimal value transfer matrix, which allows secret data and original pixel values to be recovered with good payload-distortion performance. The system embeds data by modifying pixel value estimates based on the matrix. It then extracts the secret data and recovers the original image values inversely at the receiver.
In recent years the topic of steganography has become
very popular and a lot of research is being done in this field.
Reversible data hiding is a method in which the image in which
the encrypted data is hidden is losslessly recovered. In this paper
we have proposed such a method that the previous work done
limitations can be overcome. In this paper, we embed the
encrypted data in the image by using LSB matching technique for
reserving room, so that fast, optimal and lossless steganography
is achieved. The proposed method provides total reversibility,
that is, data extraction and image recovery.
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted
images, since it maintains the excellent property that the original cover can be losslessly recovered
after embedded data is extracted while protecting the image content’s confidentiality. All previous
methods embed data by reversibly vacating room from the encrypted images, which may be subject
to some errors on data extraction and/or image restoration. In this survey paper, we discuss about
various methods and algorithms which were used for reversible data hiding (RDH) in encrypted
image to make data hiding process effortless. We also use visual cryptographic approach for
encryption which helps to protect the image during transmission. The scheme is suitable for
authentication based application where collective acceptance and decision making plays an important
role. The main goal is to retrieve the original image with lossless process and minimum computation
during image encryption /decryption by using keyless approach.
Reversible data hiding in encrypted images by reserving room before encryptionIEEEFINALYEARPROJECTS
The document proposes a novel reversible data hiding method called "reserving room before encryption" (RRBE). It reserves room in the original image prior to encryption using a traditional reversible data hiding algorithm. This allows easy embedding of data in the encrypted image without errors during extraction and recovery. Experiments show it can embed over 10 times more payload than previous methods like vacating room from encrypted images, for the same image quality. The key advantages are real reversibility without extraction or recovery errors, and improved image quality for a given payload or increased payload for acceptable quality.
DATA HIDING IN ENCRYPTED H.264 VIDEO FORMATalphin jose
I-frames, P-frames, and B-frames are the three major picture types or frame types used in video compression algorithms. I-frames are fully specified frames that do not require other frames to decode but are the least compressible. P-frames store only the changes from previous frames and are more compressible than I-frames but require previous frames to decode. B-frames can use both previous and forward frames for reference and achieve the highest compression but require both previous and forward frames to decode. I-frames are used as random access points and references for decoding other frames.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
The document describes a method for secure image transmission that combines reversible data hiding, encryption, compression, and steganography. It involves three main steps:
1. Reversible data hiding is used to embed the original image data by reserving room before encryption. Some pixel least significant bit values are embedded in other pixels.
2. Scalable compression is then applied to further secure the image.
3. The compressed, encrypted image then has additional data hidden within it using steganography techniques for transmission.
The receiving end performs the inverse processes of extracting the data, decompressing the image, and recovering the original embedded image in a lossless and secure manner. The method aims to achieve high quality encrypted
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
The document proposes a new method for securing image steganography using visual cryptography and integer wavelet transform. The method embeds a secret image into a cover image in the following steps: 1) Apply (2 out of 2) visual cryptography to the secret image to generate two secret shares. 2) Apply a two-level integer wavelet transform to the blue channel of the cover image, resulting in four sub-bands. 3) Embed each secret share into one of the four sub-bands. 4) Combine the channels to generate the stego-image. Extraction requires applying the same transforms to the stego-image to recover the secret shares and reconstruct the secret image, without needing the original cover image. The method
With the enhance in the digital media, modification
and transfer of information is very easy. So this
work focus on transferring data by hiding in the
image. Here a robust approach is achieved by using
the skew tent map as an encryption/ decryption
algorithm at the sender and receiver side. In this
work image is transformed into inverse S-order as
the initial step of the work so little confusion can be
created for the intruder. Here whole data hiding is
done by modifying by using the modified histogram
shifting method. This approach was utilized to the
point that hiding information and image can be
effectively recovered with no information loss. An
investigation is done on the genuine dataset image.
Assessment parameter esteems and demonstrates
that the proposed work has kept up the SNR, PSNR,
Throughput, Data Hiding Execution Time and
Extraction Time values with high security of the
information.
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosCSCJournals
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. Here a novel method is proposed by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Moreover data to be embedded is shuffled using a hyper chaotic function which is difficult to be extracted from the stego image without original key. A digital water mark is also embedded which ensures integrity of the data. The proposed method has been validated against three other available RDH schemes and it is observed that the proposed scheme outperforms these RDH schemes both in visual quality and payload. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
Optimized Reversible Data Hiding Technique for Secured Data TransmissionEditor IJMTER
Reversible data hiding (RDH) is used to embed secret message into a cover image by slightly
modifying its pixel values. Embedded message and the cover image are completely recovered from the
marked content. RDH supports information hiding with the lossless compressibility of natural images.
Lossless compression, difference expansion, histogram modification, prediction-error expansion and
integer transform techniques are used for RDH process. Histogram based RDH method is divided into
two steps histogram generation and histogram modification. Histogram construction is performed with
the pixel pairs sequences and their different values. Histogram modification is carried out to embed data
into the cover image. The un-hiding process recovers the message and also the cover image.
Reversible data hiding (RDH) scheme is designed by using difference-pair-mapping (DPM)
mechanism. A sequence consisting of pairs of difference values is computed by considering each pixelpair and its context. DPM is an injective mapping defined on difference-pairs. Specifically designed
DPM is used for Reversible data embedding process. A two-dimensional difference-histogram is
generated by counting the frequency of the resulting difference-pairs. Current histogram-based RDH
methods use natural extension of expansion embedding and shifting techniques. A pixel-pair-selection
strategy is adopted to use the pixel-pairs located in smooth image regions to embed data. Capacity
distortion property is used evaluate the embedding capacity (EC).
Two dimensional difference histogram modification model is enhanced to increase the
embedding capacity. Difference Pair Mapping (DPM) model is optimized to identify pixel redundancy.
Multiple in value based pixel pair modification is allowed in the system. Histogram modification is
carried out with different frequency levels.
Lossless and reversible data hiding in encrypted images with public key crypt...LogicMindtech Nologies
IMAGE PROCESSING Projects for M. Tech, IMAGE PROCESSING Projects in Vijayanagar, IMAGE PROCESSING Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, IMAGE PROCESSING IEEE projects in Bangalore, IEEE 2015 IMAGE PROCESSING Projects, MATLAB Image Processing Projects, MATLAB Image Processing Projects in Bangalore, MATLAB Image Processing Projects in Vijayangar
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
This document summarizes a research paper that proposes a novel reversible data hiding scheme using AES encryption. The scheme consists of three phases: 1) AES encryption of the original image, 2) data embedding by modifying parts of the encrypted image, 3) data extraction and image recovery by decrypting the encrypted image and extracting the hidden data. The scheme aims to securely hide data in images while allowing perfect recovery of the original image. Experimental results show the decrypted image has a high PSNR value of 55.11dB and the hidden data can be successfully extracted.
This document proposes an efficient data steganography method called Adaptive Pixel Pair Matching (APPM) with high security. APPM hides data by substituting pixel pairs in a cover image based on a secret key. It defines an extraction function and compact neighborhood set for pixel pairs to minimize embedding distortion. APPM converts the secret message into digits of a B-ary numerical system for hiding. It calculates the optimal value of B and neighborhood set based on the image and message size. APPM generates a random embedding sequence using a key for substitution. It also provides an external password for additional security of the hidden message. The document claims this method provides better image quality and higher payload than previous pixel pair matching methods with increased security.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
The document discusses hiding confidential text data within an encrypted image using reversible data hiding techniques. It begins by introducing the concepts of reversible data hiding and meaningful image encryption. The proposed method first encrypts an original image using AES to create a pre-encrypted image. It then applies discrete wavelet transform to the pre-encrypted image to transform it into a visually meaningful encrypted image. Finally, reversible data hiding is used to hide confidential text data within the meaningful encrypted image while still allowing lossless retrieval of both the image and hidden data. The method aims to provide effective data protection with low computational cost.
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
This document proposes a reversible image data hiding technique with contrast enhancement. It aims to embed data into a cover image in a reversible manner while also enhancing the contrast of the cover image. The technique first calculates prediction errors of pixel values in the cover image. It then generates a histogram of the prediction errors and selects carriers for data embedding from peaks in the histogram. Binary secret data is embedded into the carriers by dynamically shifting the prediction error histogram. This allows data to be embedded while increasing cover image quality compared to other reversible data hiding methods. The original cover image can be recovered by extracting the embedded data and reversing the histogram shifts. The technique is meant to achieve a higher peak signal-to-noise ratio than the original cover image after data
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
The document discusses a proposed system for encrypting and authenticating images using data hiding. At the sender side, a palette image is encrypted using an encryption key. Data is then hidden in the encrypted image using a data hiding key. At the receiver side, the image is decrypted and the original image can be reconstructed after extracting the hidden data. The system aims to securely transfer images from sender to receiver while protecting the owner's privacy and allowing accurate recovery of the original image content. Several existing reversible data hiding and encrypted image techniques are reviewed and the proposed system is described as providing satisfactory data hiding capacity while maintaining high image quality after decryption.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
A secured data transmission system by reversible data hiding with scalable co...IAEME Publication
The document describes a method for secure image transmission that combines reversible data hiding, encryption, compression, and steganography. It involves three main steps:
1. Reversible data hiding is used to embed the original image data by reserving room before encryption. Some pixel least significant bit values are embedded in other pixels.
2. Scalable compression is then applied to further secure the image.
3. The compressed, encrypted image then has additional data hidden within it using steganography techniques for transmission.
The receiving end performs the inverse processes of extracting the data, decompressing the image, and recovering the original embedded image in a lossless and secure manner. The method aims to achieve high quality encrypted
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
The document proposes a new method for securing image steganography using visual cryptography and integer wavelet transform. The method embeds a secret image into a cover image in the following steps: 1) Apply (2 out of 2) visual cryptography to the secret image to generate two secret shares. 2) Apply a two-level integer wavelet transform to the blue channel of the cover image, resulting in four sub-bands. 3) Embed each secret share into one of the four sub-bands. 4) Combine the channels to generate the stego-image. Extraction requires applying the same transforms to the stego-image to recover the secret shares and reconstruct the secret image, without needing the original cover image. The method
With the enhance in the digital media, modification
and transfer of information is very easy. So this
work focus on transferring data by hiding in the
image. Here a robust approach is achieved by using
the skew tent map as an encryption/ decryption
algorithm at the sender and receiver side. In this
work image is transformed into inverse S-order as
the initial step of the work so little confusion can be
created for the intruder. Here whole data hiding is
done by modifying by using the modified histogram
shifting method. This approach was utilized to the
point that hiding information and image can be
effectively recovered with no information loss. An
investigation is done on the genuine dataset image.
Assessment parameter esteems and demonstrates
that the proposed work has kept up the SNR, PSNR,
Throughput, Data Hiding Execution Time and
Extraction Time values with high security of the
information.
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Secured Reversible Data Hiding In Encrypted Images Using Hyper ChaosCSCJournals
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. Here a novel method is proposed by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. Moreover data to be embedded is shuffled using a hyper chaotic function which is difficult to be extracted from the stego image without original key. A digital water mark is also embedded which ensures integrity of the data. The proposed method has been validated against three other available RDH schemes and it is observed that the proposed scheme outperforms these RDH schemes both in visual quality and payload. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
Optimized Reversible Data Hiding Technique for Secured Data TransmissionEditor IJMTER
Reversible data hiding (RDH) is used to embed secret message into a cover image by slightly
modifying its pixel values. Embedded message and the cover image are completely recovered from the
marked content. RDH supports information hiding with the lossless compressibility of natural images.
Lossless compression, difference expansion, histogram modification, prediction-error expansion and
integer transform techniques are used for RDH process. Histogram based RDH method is divided into
two steps histogram generation and histogram modification. Histogram construction is performed with
the pixel pairs sequences and their different values. Histogram modification is carried out to embed data
into the cover image. The un-hiding process recovers the message and also the cover image.
Reversible data hiding (RDH) scheme is designed by using difference-pair-mapping (DPM)
mechanism. A sequence consisting of pairs of difference values is computed by considering each pixelpair and its context. DPM is an injective mapping defined on difference-pairs. Specifically designed
DPM is used for Reversible data embedding process. A two-dimensional difference-histogram is
generated by counting the frequency of the resulting difference-pairs. Current histogram-based RDH
methods use natural extension of expansion embedding and shifting techniques. A pixel-pair-selection
strategy is adopted to use the pixel-pairs located in smooth image regions to embed data. Capacity
distortion property is used evaluate the embedding capacity (EC).
Two dimensional difference histogram modification model is enhanced to increase the
embedding capacity. Difference Pair Mapping (DPM) model is optimized to identify pixel redundancy.
Multiple in value based pixel pair modification is allowed in the system. Histogram modification is
carried out with different frequency levels.
Lossless and reversible data hiding in encrypted images with public key crypt...LogicMindtech Nologies
IMAGE PROCESSING Projects for M. Tech, IMAGE PROCESSING Projects in Vijayanagar, IMAGE PROCESSING Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, IMAGE PROCESSING IEEE projects in Bangalore, IEEE 2015 IMAGE PROCESSING Projects, MATLAB Image Processing Projects, MATLAB Image Processing Projects in Bangalore, MATLAB Image Processing Projects in Vijayangar
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
This document summarizes a research paper that proposes a novel reversible data hiding scheme using AES encryption. The scheme consists of three phases: 1) AES encryption of the original image, 2) data embedding by modifying parts of the encrypted image, 3) data extraction and image recovery by decrypting the encrypted image and extracting the hidden data. The scheme aims to securely hide data in images while allowing perfect recovery of the original image. Experimental results show the decrypted image has a high PSNR value of 55.11dB and the hidden data can be successfully extracted.
This document proposes an efficient data steganography method called Adaptive Pixel Pair Matching (APPM) with high security. APPM hides data by substituting pixel pairs in a cover image based on a secret key. It defines an extraction function and compact neighborhood set for pixel pairs to minimize embedding distortion. APPM converts the secret message into digits of a B-ary numerical system for hiding. It calculates the optimal value of B and neighborhood set based on the image and message size. APPM generates a random embedding sequence using a key for substitution. It also provides an external password for additional security of the hidden message. The document claims this method provides better image quality and higher payload than previous pixel pair matching methods with increased security.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
The document discusses hiding confidential text data within an encrypted image using reversible data hiding techniques. It begins by introducing the concepts of reversible data hiding and meaningful image encryption. The proposed method first encrypts an original image using AES to create a pre-encrypted image. It then applies discrete wavelet transform to the pre-encrypted image to transform it into a visually meaningful encrypted image. Finally, reversible data hiding is used to hide confidential text data within the meaningful encrypted image while still allowing lossless retrieval of both the image and hidden data. The method aims to provide effective data protection with low computational cost.
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
This document proposes a reversible image data hiding technique with contrast enhancement. It aims to embed data into a cover image in a reversible manner while also enhancing the contrast of the cover image. The technique first calculates prediction errors of pixel values in the cover image. It then generates a histogram of the prediction errors and selects carriers for data embedding from peaks in the histogram. Binary secret data is embedded into the carriers by dynamically shifting the prediction error histogram. This allows data to be embedded while increasing cover image quality compared to other reversible data hiding methods. The original cover image can be recovered by extracting the embedded data and reversing the histogram shifts. The technique is meant to achieve a higher peak signal-to-noise ratio than the original cover image after data
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
The document discusses a proposed system for encrypting and authenticating images using data hiding. At the sender side, a palette image is encrypted using an encryption key. Data is then hidden in the encrypted image using a data hiding key. At the receiver side, the image is decrypted and the original image can be reconstructed after extracting the hidden data. The system aims to securely transfer images from sender to receiver while protecting the owner's privacy and allowing accurate recovery of the original image content. Several existing reversible data hiding and encrypted image techniques are reviewed and the proposed system is described as providing satisfactory data hiding capacity while maintaining high image quality after decryption.
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
Steganography gained significance in the past few years due to the increasing need
for providing secrecy in an open environment like the internet. With almost anyone can
observe the communicated data all around, steganography attempts to hide the very existence
of the message and make communication undetectable. In this paper we propose a modern
technique with Integer Wavelet transform (IWT) and double key to accomplish high hiding
capability, high security and good visual quality. Here cover image is transformed in to
wavelet transform co-efficients and the coefficients are selected randomly by using Key-2 for
embedding the data. Key-1 is used to calculate the number of bits to be embedded in the
randomly selected coefficients. Finally the Optimum Pixel Adjustment Process(OPAP) is
applied to the stego image to reduce the data embedding error.
Data Hiding Using Reversibly Designed Difference-Pair MethodIJERA Editor
This document presents a reversible data hiding technique called the difference-pair method. The technique embeds data into digital images by modifying pixel values in a way that allows perfect recovery of the original image. It aims to increase the embedding capacity compared to previous related work. The proposed method allows modification of either the first or second pixel in a pixel-pair, providing four possible modification directions rather than just two as in prior work. This increased flexibility in pixel modifications can boost data hiding capacity while maintaining reversibility and image quality. The technique is evaluated by comparing results to existing reversible data hiding schemes.
A comparative case study on the various techniques of reversible data hidingIJLT EMAS
Secured transmission of data is an important concern
now a days. A number of techniques are available for hiding and
transmitting the data through the images. It may be a simple or a
complex technique. In the receiver part if the host image is
recovered without any loss it is said to be reversible data hiding.
In this paper it is proposed to compare the reversible and lossless
data hiding techniques where both the host image and the hidden
data can be recovered without any loss. There are many
techniques that is presented as block based, pixel based and
interpolation based techniques. In the past data was embedded in
encrypted images with irreversible data hiding and now it is
reversible .The PSNR and the data hiding capacity que for these
methods are compared in this paper.
Efficient Reversible Data Hiding Algorithms Based on Dual Predictionsipij
In this paper, a new reversible data hiding (RDH) algorithm that is based on the concept of shifting of
prediction error histograms is proposed. The algorithm extends the efficient modification of prediction
errors (MPE) algorithm by incorporating two predictors and using one prediction error value for data
embedding. The motivation behind using two predictors is driven by the fact that predictors have different
prediction accuracy which is directly related to the embedding capacity and quality of the stego image. The
key feature of the proposed algorithm lies in using two predictors without the need to communicate
additional overhead with the stego image. Basically, the identification of the predictor that is used during
embedding is done through a set of rules. The proposed algorithm is further extended to use two and three
bins in the prediction errors histogram in order to increase the embedding capacity. Performance
evaluation of the proposed algorithm and its extensions showed the advantage of using two predictors in
boosting the embedding capacity while providing competitive quality for the stego image.
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementIJERA Editor
In present world demand of high quality images, security of the information on internet is one of the most important issues of research. Data hiding is a method of hiding a useful information by embedding it on another image (cover image) to provide security and only the authorize person is able to extract the original information from the embedding data. This paper is a review which describes several different algorithms for Reversible Data Hiding (RDH). Previous literature has shown that histogram modification, histogram equalization (HE) and interpolation are the most common methods for data hiding. To improve security these methods are used in encrypted images. This paper is a comprehensive study of all the major reversible data hiding approaches implemented as found in the literature.
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...IJMER
In this paper a two stage reversible data hiding technique is proposed. At the first stage, an
interpolation technique is used to generate a cover image from the input image. The difference values
from input image and cover image is used as the carrier to embed data. At the second stage, a histogram
modification is applied on a difference image to embed data. The extraction process also works in two
stages. The proposed algorithm is expected to increase the embedding capacity as two techniques are
combined. The interpolation technique helps to keep the distortion low. Experimental results show that
the new method has higher embedding capacity than other existing methods.
IRJET- Data Embedding using Image SteganographyIRJET Journal
This document presents a method for secure communication using both steganography and cryptography techniques. It discusses embedding encrypted text into an image using discrete wavelet transform (DWT). Specifically, it first encrypts a text message using the advanced encryption standard (AES) algorithm. It then embeds the encrypted text into an image by applying DWT to decompose the image into sub-bands and hiding the data in the high frequency sub-bands. MATLAB is used to implement a graphical user interface that allows a sender to encrypt a message, embed it into an image, and send the stego-image to a receiver. The receiver interface extracts the encrypted text from the stego-image and decrypts it using AES. The method aims to
Reversible encrypted data concealment in images by reserving room approachIAEME Publication
The document summarizes a novel method for reversible encrypted data concealment in images. The proposed method reserves room in the original image before encryption using a traditional reversible data hiding algorithm like lifting wavelet transform. This makes it easy for a data hider to reversibly embed data in the encrypted image by simply filling the pre-reserved space. The method is compared to previous "vacating room after encryption" methods and shows it can embed over 10 times as large payloads with the same image quality, as well as achieve better performance in terms of PSNR and MSE. Experiments on test images demonstrate the benefits of the proposed "reserving room before encryption" approach.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
This document presents two high capacity reversible data hiding methods for encrypted images called CPE-MHCRDH and EPE-MHCRDH. The CPE-MHCRDH method corrects prediction errors in the most significant bits of pixels before encryption, allowing two bits of secret data to be embedded per pixel. The EPE-MHCRDH method directly encrypts the original image and embeds the locations of prediction errors after encryption. Both methods compress the data-hidden encrypted image losslessly using LZ77 compression. Experimental results show the proposed methods achieve better reconstructed image quality and higher embedding capacity than previous reversible data hiding in encrypted image methods.
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
The document proposes a reversible image data hiding scheme that operates in an encrypted domain. It embeds data through public key modulation without needing access to the secret encryption key. It uses a support vector machine classifier at the decoder to jointly decode the embedded message and reconstruct the original image by distinguishing encrypted from non-encrypted image patches. Experimental results on 100 test images validate that the proposed approach provides higher embedding capacity while perfectly reconstructing the original image and embedded message.
Reversible Data Hiding Using Contrast Enhancement ApproachCSCJournals
Reverse Data Hiding is a technique used to hide the object's data details. This technique is used to ensure the security and to protect the integrity of the object from any modification by preventing intended and unintended changes. Digital watermarking is a key ingredient to multimedia protection. However, most existing techniques distort the original content as a side effect of image protection. As a way to overcome such distortion, reversible data embedding has recently been introduced and is growing rapidly. In reversible data embedding, the original content can be completely restored after the removal of the watermark. Therefore, it is very practical to protect legal, medical, or other important imagery. In this paper a novel removable (lossless) data hiding technique is proposed. This technique is based on the histogram modification to produce extra space for embedding, and the redundancy in digital images is exploited to achieve a very high embedding capacity. This method has been applied to various standard images. The experimental results have demonstrated a promising outcome and the proposed technique achieved satisfactory and stable performance both on embedding capacity and visual quality. The proposed method capacity is up to 129K bits with PSNR between 42-45dB. The performance is hence better than most exiting reversible data hiding algorithms.
IRJET - Steganography based on Discrete Wavelet TransformIRJET Journal
This document presents a study on using discrete wavelet transform (DWT) for image steganography. DWT is applied to both the cover image and secret image. The secret image is embedded into the wavelet coefficients of the cover image. Arnold transformation and a private key are used to further encrypt the secret image for increased security. Experimental results on test images show that the proposed method achieves good visual quality for the stego-image, with PSNR values exceeding 36 dB. The method can hide secret data in both color and grayscale images. Future work may explore using different wavelet transforms or encryption techniques.
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
Reversible Encrypytion and Information ConcealmentIJERA Editor
Recently, a lot of attention is paid to reversible data hiding (RDH) in encrypted pictures, since it maintains the wonderful property that the initial image cover will be losslessly recovered when embedded data is extracted, whereas protects the image content that is need to be kept confidential. Other techniques used antecedently are to embed data by reversibly vacating area from the pictures, that area unit been encryted, may cause some errors on information extraction or image restoration. In this paper, we propose a unique methodology by reserving room before secret writing (i.e reserving room before encryption) with a conventional RDH algorithmic rule, and thus it becomes straightforward for hider to reversibly embed data in the encrypted image. The projected methodology is able to implement real reversibility, that is, information extraction and image recovery area unit free of any error. This methodology embedds larger payloads for constant image quality than the antecedently used techniques, like for PSNR= 40db.
Similar to High capacity histogram shifting based reversible data hiding with data compression (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
181
The main goal of this work is to implement a Histogram shifting (HS) based Reversible Data Hiding(RDH)
method that can provide a high embedding capacity with lowest distortion. First in section II the data embedding and
extraction process is explained. Also the image block division technique for improving marked image quality and the
data compression technique for improving embedding capacity is given. Results and discussions are given in section III.
Finally, concluding remarks are given in the last section.
2. METHODOLOGY
The proposed method presents a reversible data hiding method accompanied with an image block division
technique and data compression method so as to further increase the embedding capacity. An image encryption technique
is adopted to ensure the security of the host image and the secret data. For reversible data hiding, an efficient extension of
the histogram modification technique by considering the differences between adjacent pixels instead of simple pixel
value is used. A binary tree structure is used to solve the issue of communication of multiple peak points. To prevent
overflow and underflow, a histogram shifting technique that narrows the histogram from both sides adopted. To further
ensure the security of the host image the host image is encrypted using an encrypting algorithm that ensures reversibility.
2.1. Data Hiding Method
In the proposed method, for reversible data hiding, an efficient extension of the histogram modification
technique by considering the differences between adjacent pixels instead of simple pixel value is used. Since image
neighbour pixels are strongly correlated, the distribution of pixel difference has a prominent maximum. Hence there will
be lot of candidates for data embedding as shown in Fig.2. For the original histogram the count of the maximum pixel is
between 1400 and 1600. But for the difference image histogram the count is 14000.
Fig.2: a) Original histogram b) Shifted histogram
Images having an equal histogram, the histogram modification technique does not work well. While multiple
pairs of peak and minimum points are used for embedding, the pure payload is still a little low. Moreover, the histogram
modification technique carries with it an unsolved issue in that multiple pairs of peak and minimum points must be
transmitted to the recipient via a side channel to ensure successful restoration. In RDH schemes, large hiding capacities
can be obtained by repeated data hiding process. But the recipients are not able to retrieve both the embedded message
and the original image without the knowledge of peak points of every hiding process. By supplying a side
communication channel for the peak points this issue can be solved. But this side communication channel may extend the
embedded message length and therefore it may reduce the embedding capacity. So binary tree structure is introduced to
solve the issue of communication of multiple peak points.
Figure below shows an auxiliary binary tree for solving the issue of communication of multiple peak points.
Each element denotes a peak point. Assume that the number of peak points used to embed messages is 2
, where L is the
level of the binary tree. Once a pixel difference݀that satisfies ݀<2
is encountered, if the message bit to be embedded is
0, the left child of the node݀is visited. Otherwise, the right child of the node݀is visited. Higher payloads require the use
of higher tree levels, thus quickly increasing the distortion in the image beyond acceptable levels. However, the entire
recipient needs to share with the sender is the tree level L, because an auxiliary binary tree is proposed that predetermines
multiple peak points used to embed messages.
3. Proceedings of the International Conference on Emerging
Modification of a pixel may not be allowed if the pixel is saturated (0 or
underflow, a histogram shifting technique that narrows the histogram from both sides, as shown in figure below is
adopted. Assume that the number of peak points used to embed messages is
binary tree structure. Thus the histogram is shifted from both sides by
the pixel ݔthat satisfies ݀ ≤ 2
shift by
After narrowing the histogram to the range
overhead bookkeeping information. For this purpose a one bit map as the location map is created, which is equal in size
to the host image. For a pixel having grayscale value in the
Otherwise, assign 1. The location map is loss
large increase in compression ability since pixels out of the range
be embedded into the host image together with the embedded message.
Fig.3
2.2.Embedding process
The embedding process involves several steps. For an N
valueݔwhereݔdenotes the grayscale value of the pixel, 0
1) Read the host image. Determine the level L of the binary tree.
2) Shift the histogram of the host image from both sides
overhead bookkeeping information that will be embedded into the image itself with payload.
3) Scan the image host image in an inverse s
݀݅ ൌ ൜
ݔ ݂݅
ݔ׀ିଵ െ ݔ ,׀
International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
182
Fig.3: Auxiliary binary tree
Modification of a pixel may not be allowed if the pixel is saturated (0 or 255). To prevent overflow and
underflow, a histogram shifting technique that narrows the histogram from both sides, as shown in figure below is
adopted. Assume that the number of peak points used to embed messages is 2
, where L is the level of the propo
binary tree structure. Thus the histogram is shifted from both sides by 2
units to prevent overflow and underflow since
2
units afterembedding takes place.
After narrowing the histogram to the rangeሾ 2
, 255-2
], the histogram shifting information is recorded as the
overhead bookkeeping information. For this purpose a one bit map as the location map is created, which is equal in size
to the host image. For a pixel having grayscale value in the rangeሾ 2
, 255-2
], assign a value 0 in the location map.
The location map is loss lessly compressed by the run-length coding algorithm, which will yield a
large increase in compression ability since pixels out of the rangeሾ 2
, 255-2
], are few. The overhead information will
be embedded into the host image together with the embedded message.
Fig.3: a) Original histogram b) Shifted histogram
The embedding process involves several steps. For an N-pixel 8-bit grayscale host image H with a pixel
denotes the grayscale value of the pixel, 0 ≤ i ≤ N -1,ݔϵ [0, 255].
1) Read the host image. Determine the level L of the binary tree.
2) Shift the histogram of the host image from both sides by 2
units. The histogram shifting information is recorded as
overhead bookkeeping information that will be embedded into the image itself with payload.
3) Scan the image host image in an inverse s-order. Calculate the pixel difference ݀ between pixels
݂݅ ݅ ൌ 0 ,
.݁ݏ݅ݓݎ݄݁ݐ
Trends in Engineering and Management (ICETEM14)
31, December 2014, Ernakulam, India
255). To prevent overflow and
underflow, a histogram shifting technique that narrows the histogram from both sides, as shown in figure below is
, where L is the level of the proposed
units to prevent overflow and underflow since
the histogram shifting information is recorded as the
overhead bookkeeping information. For this purpose a one bit map as the location map is created, which is equal in size
assign a value 0 in the location map.
length coding algorithm, which will yield a
are few. The overhead information will
bit grayscale host image H with a pixel
units. The histogram shifting information is recorded as
between pixels ݔିଵand ݔ.
(1)
4. Proceedings of the International Conference on Emerging
4) Create location map using difference image same size as that of
image).
ܽ݉_݊݅ݐܽܿܮ ൌ ൜
0,
1,
5) Compress the location map using run length encoding.
6) Convert the compressed location map to binary.
7) Read the message to be hidden and convert to binary.
8) Combine the message and location map in binary form.
9) Embed the combination of message and location map into histogram shifted image using pixel difference image as
follows.
Scan the whole image in the same inverse s
݀ 2
,shift ݔby 2
units.
ݕ ൌ ቐ
ݔ ݂݅ ݅ ൌ
ݔ 2
, ݂݅ ݀ 2
ܽ݊݀ ݔ ݔ
ݔ െ 2
, ݂݅ ݀ 2
ܽ݊݀ ݔ ൏ ݔ
Where ݕ is the watermarked value of pixel.
10) If݀ ൏ 2
, modify xi according to the message bit.
ݕ ൌ ൜
ݔ ሺ݀ ܾሻ, ݂݅
ݔିሺ݀ ܾሻ, ݂݅
Where b is a message bit to be embedded and b
After hiding the secret data using the embedding technique, the host image together with the hidden data is
encrypted as a whole to get the output image. At the receiver side, the encrypted image is read as the
decrypting the image the secret data can be extracted using the following extraction procedure.
International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
183
4) Create location map using difference image same size as that of difference image (which is same size as that of host
݂݅ ݈݁ݔ݅ ∈ ሾ2
, 255 െ 2
ሿ
ܱ݁ݏ݅ݓݎ݄݁ݐ
5) Compress the location map using run length encoding.
6) Convert the compressed location map to binary.
7) Read the message to be hidden and convert to binary.
8) Combine the message and location map in binary form.
e and location map into histogram shifted image using pixel difference image as
Scan the whole image in the same inverse s-order. If
ൌ 0
ݔିଵ
ݔିଵ
is the watermarked value of pixel.
according to the message bit.
݂݅ ݔ ݔିଵ
ݔ ൏ ݔିଵ
message bit to be embedded and b ϵ {0, 1}.
After hiding the secret data using the embedding technique, the host image together with the hidden data is
encrypted as a whole to get the output image. At the receiver side, the encrypted image is read as the
decrypting the image the secret data can be extracted using the following extraction procedure.
Fig.4: Flow diagram for data embedding
Trends in Engineering and Management (ICETEM14)
31, December 2014, Ernakulam, India
difference image (which is same size as that of host
(2)
e and location map into histogram shifted image using pixel difference image as
(3)
(4)
After hiding the secret data using the embedding technique, the host image together with the hidden data is
encrypted as a whole to get the output image. At the receiver side, the encrypted image is read as the input image. After
decrypting the image the secret data can be extracted using the following extraction procedure.
5. Proceedings of the International Conference on Emerging
2.3. Extraction process
This process extracts both overhead information and payload from the
recovers the host image. Let L be the level of the proposed binary tree. For an N
pixel valueݕ, where ݕdenotes the gray scale value of the
1) Scan the watermarked image W in an inverse s
2) If |ݕ− ݔିଵ| < 2ାଵ
, extract message bit b by
Where ݔିଵ denotes the restored value of
3) Restore the original value of host pixel
4) Repeat Step 2 until the embedded message is
5) Extract the overhead information from the extracted message. If a value 1 is assigned in the location i, restore to its
original state by shifting it by units. Otherwise, no shifting is required.
Fig.5. shows the complete flow diagram for d
2.4. Encryption and Decryption
To further ensure the security of the host image the host image is encrypted using an encrypting algorithm that
ensures reversibility. A key Based Algorithm using logistic map
sequence is generated using a logistic mapping.
key is used to encrypt and decrypt the image. T
each pixel in the image. The encryption scheme based on logistic Map has higher decorrelating ability.
ݔሺ݊ሻ ൌ 1 െ 2 ൈ ݔሺ݊ െ 1ሻ ൈ
| |
| |
2 , if | | 2 and
2 , if | | 2 and
i i
i i i i i
i i
i i i i i
i
L L
i i i i i
L L
i i i
y x
y y x x
y x
y y x x
x
y y x y x
y y x
+ − < <
− − < > =
+ − ≥ <
− − ≥
,iy
International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
184
This process extracts both overhead information and payload from the watermarked image and losslessly
recovers the host image. Let L be the level of the proposed binary tree. For an N-pixel 8-bit watermarked image W with a
denotes the gray scale value of the݅௧
pixel,0 ≤ i ≤ N-1, ݕ ϵ [0, 255].
1) Scan the watermarked image W in an inverse s-order.
, extract message bit b by
ܾ ൌ ቊ
0 ݂݅ ݕ׀ െ ݔିଵ ݊݁ݒ݁ ݏ݅׀
1 ݂݅ ݕ׀ െ ݔିଵ ݀݀ ݏ݅ ׀
denotes the restored value of ݕିଵ
3) Restore the original value of host pixel ݔby
4) Repeat Step 2 until the embedded message is extracted.
5) Extract the overhead information from the extracted message. If a value 1 is assigned in the location i, restore to its
original state by shifting it by units. Otherwise, no shifting is required.
shows the complete flow diagram for data extraction process.
To further ensure the security of the host image the host image is encrypted using an encrypting algorithm that
ey Based Algorithm using logistic map is used for encryption and decryption [6][7]. A key
sequence is generated using a logistic mapping. Image pixels are rearranged and XORed with the selected key.
key is used to encrypt and decrypt the image. The given difference equations is used to generate an 8
each pixel in the image. The encryption scheme based on logistic Map has higher decorrelating ability.
ൈ ݔሺ݊ െ 1ሻ
Fig.5: Flow diagram for data extraction
11
1 1
11
1 1
1
1 1
1
1
| |
, if | | 2 andy
2
| |
, if | | 2 andy
2
2 , if | | 2 and
2 , if | | 2 and
Li i
i i i i i
Li i
i i i i i
L L
i i i i i
L L
i i i
y x
y y x x
y x
y y x x
y y x y x
y y x
+−
− −
+−
− −
+
− −
+
−
−
+ − < <
−
− − < >
+ − ≥ <
− − ≥ 1
, otherwise
i iy x−>
Trends in Engineering and Management (ICETEM14)
31, December 2014, Ernakulam, India
watermarked image and losslessly
bit watermarked image W with a
(5)
(6)
5) Extract the overhead information from the extracted message. If a value 1 is assigned in the location i, restore to its
To further ensure the security of the host image the host image is encrypted using an encrypting algorithm that
is used for encryption and decryption [6][7]. A key
Image pixels are rearranged and XORed with the selected key. The same
to generate an 8-bit binary "key" for
each pixel in the image. The encryption scheme based on logistic Map has higher decorrelating ability.
(7)
6. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
185
2.5. Block Division for Improving Marked Image Quality
To enhance the data hiding capacity and visual quality a block division technique is proposed. In the proposed
approach, the input image is divided into blocks and then histogram shifting is done on each block. Amount of
information that can be embedded within image blocks are more as compared with embedding within a single image.
This technique consists of three main stages. 1) Dividing the image into two blocks 2) Processing stage
3) Embedding stage. First stage consists of dividing the image into two main blocks. Processing stage includes
generating the histogram of each block and taking the difference of histogram after histogram modification. After
histogram modification, secret data embedding and extraction can be performed with the same embedding and extraction
algorithm which discussed earlier. In the previous method embedding and extraction is done with a single image. In
block division method data embedding is done after dividing the image into blocks. Data embedding and extraction is
performed with the two blocks separately.
There are so many advantages while considering the histogram of image blocks than a single image. It is
possible to distribute the embedded bits along the whole image. Image blocks have narrower histogram and thus it helps
in selecting the suitable peak and zero points which may increase the quality of watermarked image.
2.6. Data Compression for Improving Embedding Capacity
In the proposed technique, if the data embedded in the image is increased, the image quality deteriorates. So, we
cannot embed sufficiently large data into the cover image. To overcome this problem prior to embedding secret data is
pre-processed first and then this pre-processed data is embedded into the host image. For pre-processing data
compression techniques can be used [8].
Data compression involves encoding information using fewer bits than the original representation. The general
principle of data compression algorithms on text files is to transform a string of characters into a new string which
contains the same information but with new length as small as possible. In this thesis two lossless compression methods,
Huffman coding and LZW coding are used to compress the text data. Lossless algorithms are typically used for text, and
lossy for images and sound where a little bit of loss in resolution is often undetectable, or at least acceptable. The
compression efficiency of the two methods is compared with respect to data embedding capacity limit.
2.6.1. Huffman Coding
Huffman algorithm is the oldest and most widespread technique for data compression. It was developed by
David A. Huffman and used in compression of many type of data such as text, image, audio, and video. It is based on
building a full binary tree for the different symbols that are in the original file after calculating the probability for each
symbol and put them in descending order. After that, we derive the code words for each symbol from the binary tree,
giving short code words for symbols with large probabilities and longer code words for symbols with small probabilities.
Suppose that we have a test file that uses only five characters A, B, C, D, E. Frequency of each character is shown in the
table.
TABLE I: Descending frequencies for symbols
Symbol Frequency
E 32
D 27
C 12
B 12
A 17
Each character is considered as a node. Start by choosing the two smallest nodes, combine them into a new tree
and the root of this new tree is the sum of the weight of the small nodes. Replace those two nodes with the new tree. By
repeating this, the complete Huffman tree can be obtained as shown in Fig.6. Suppose that we have a test file that uses
only five characters A, B, C, D, E. Frequency of each character is shown in the table I.
7. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
186
Fig.6: Huffman tree
Now we assign codes to the tree by placing a 0 on every left branch and a 1 on every right branch. A traversal of
the tree from root to leaf gives the Huffman code for that particular leaf character. Code word is only completed when
leaf node is reached. Then we get the code word for each symbol from the binary tree as in Table II.Note that no code is
the prefix of another code. With this Huffman code the given Text: EAEBCD can be coded as 11001101001110. Since
there are six characters in the text when ASCII encoding is used text is 48 bit long. But with Huffman coding the same
text require only 14 bits. Thus Huffman encoding can be effectively used to compress data. Due to the prefix property of
the Huffman code, the codes are uniquely decodable.
TABLE II: Code words for each symbol
2.6.2. LZW Coding
LZW is a general compression algorithm capable of working on almost any type of data. LZW compression
creates a table of strings commonly occurring in the data being compressed, and replaces the actual data with references
into the table. The table is formed during compression at the same time at which the data is encoded and during
decompression at the same time as the data is decoded. The algorithm is surprisingly simple. LZW compression replaces
strings of characters with single codes. It does not do any analysis of the incoming text. Instead, it just adds every new
string of characters it sees to a table of strings. Compression occurs when a single code is output instead of a string of
characters. During encoding, LZW algorithm identifies repeated sequences in the data and replaces them with a unique
code in the dictionary as shown in Fig.3.10. Data compression occurs when all characters except the last character is
replaced with the index found in dictionary. During decompression the index is replaced by the corresponding entry in
the dictionary.
2.6.3. Lower Bound of PSNR
The pixel x୧whose differenced୧is larger than peak point will be either increased or decreased by 1 in the data
embedding process with one peak point. Therefore, in the worst case, all pixel values will be increased or decreased by 1.
That is, the resulted the mean squared error (MSE) is (N-1)/N, which is almost equal to 1 when N is large enough. Thus,
the lower bound of PSNR for the watermarked image generated from the embedding process with one peak point is
ܴܲܵܰሺ݀ܤሻ ൌ 10 × ݈݃ଵ ቀ
ଶହହమ
ெௌா
ቁ ≥ 48.13 dB (8)
Symbol Frequency Code word
E 32 11
D 27 10
A 17 0
B 12 10
C 12 11
8. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
187
As a result, the lower bound of PSNR for the watermarked image generated by our proposed algorithm with one
peak point is theoretically proved larger than 48 dB, which is also supported by numerous experiments. The MSE and
PSNR are better will be the quality of the watermarked or reconstructed image. Greater the value of the peak point i.e.
smooth regions, more number of bits can be embedded within the image.
3. RESULT AND DISCUSSION
Performance of the proposed algorithm is tested with six different datasets of size 256×256 with 8 bit resolution.
The method is applied on six test images of size 256×256 as shown in Fig.7.
Fig.7: Test images
Variation of the PSNR for different values of L (0 to 4) is analyzed. Table 4.1 summarizes the variation of
PSNR (dB) with tree level from 0 to 4 for different images. As table shows, distortion of image increases and PSNR
values decreases with rise in the value of L.
The output images obtained upon the application of proposed method on image 1 for L value equals 1 is
TABLE III: Variation of PSNR (dB) for different values of L
given below. Obviously, the watermarked image hardly can be distinguished from the original image. The host image
can be reconstructed without any damage.
Host Image
256*256
PSNR values for different L values
0 1 2 3 4
Image 1 52.04 47 42.52 38.38 34.72
Image 2 52.13 46.84 42.10 38.14 34.34
Image 3 51.88 45.91 40.79 36.48 34.05
Image 4 54.69 50.54 46.63 43.37 41.04
Image 5 51.50 45.91 40.79 36.48 34.05
Image 6 51.77 46.44 41.73 37.61 34.18
Image 5 Image 6Image 4
Image 1 Image 2 Image 3
9. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
188
Fig.8: Output images a) Input image b) Embedded image c) Encrypted image d) Decrypted image
e) Reconstructed image
To improve the visual image quality of the watermarked image a block division technique is adopted. Here data
embedding is done after dividing the image into two blocks. Firstly, image is divided into two blocks as shown in Fig.9.
Then histogram of each block is plotted. After histogram modification, data is embedded into each block using the
proposed embedding algorithm.
Fig.10. shows the histogram of image after dividing it into two blocks and histogram of them after histogram
modification. Histogram of individual image blocks makes it possible to distribute the message bits along the whole
image and also improves the image quality.
Fig.9: Image after block division
Table IV shows that PSNR is more when embedding is performed after dividing the image into blocks when
compared with the embedding performed in a single image. Higher the PSNR, higher will be the image quality. Thus
block division technique can effectively use to improve the marked image quality.
(a) (b)
(e)(d)
(c)
10. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
189
Fig.10: Histogram of the input image and image blocks
TABLE IV: Variation of PSNR for a single image and image after block division
Tree Level
L
PSNR of whole
Image
PSNR of two blocks
Average PSNR after
block division
0 56.656
57.082
56.683
56.284
1 52.113
52.650
52.116
51.583
2 47.553
48.229
47.586
46.942
3 43.288
44.079
43.344
42.609
4 39.664 40.475 39.695
Fig.11. shows the data embedding and extraction process for block division technique. Since the secret data is
embedded into the two image blocks separately, there will be two embedded image blocks. The two reconstructed image
blocks after secret data extraction can combine without any distortion and the complete reconstructed image can be
obtained as shown in figure.
11. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
190
Fig.11: Output images for block division method a) Input image b) Embedded image for left block c) Embedded image
for right block d) reconstructed image for left block e) Reconstructed image for right half
f) Complete reconstructed image
The histogram shifting technique based on pixel differences itself can provide a higher embedding capacity. To
further improve the data hiding capacity secret data is compressed before data embedding. Two lossless data
compression methods Huffman encoding and LZW coding are used.
Table V shows the variation of PSNR and MSE with and without Huffman coding. The PSNR values with
Huffman data compression are greater than that without compression. Thus data compression using Huffman coding can
provide higher embedding capacity.
Similar results can be obtained with the LZW coding.PSNR values with LZW coding is higher than that without
compression.
TABLE V: Variation of PSNR and MSE with and without Huffman coding
L With data compression
(Huffman Coding)
Without data compression
PSNR MSE PSNR MSE
0 52.040 0.04 52.040 0.04
1 47.094 1.267 47.039 1.285
2 42.534 3.627 42.511 3.647
3 38.392 9.414 38.377 9.447
Table VI compare the embedding capacity of the two compression methods.Higher PSNR values can be
obtained with the Huffman coding compared with LZW coding. Thus better compression is occurring with Huffman
coding. Also Huffman coding is easier to implement.
TABLE VI: PSNR value comparison for Huffman coding and LZW coding
L
Without data
compression
Huffman
coding
LZW coding
0 52.048 52.048 52.048
1 47.135 7.139 47.140
2 42.559 42.562 42.560
3 38.408 38.409 38.407
Fig.12 shows the comparison of tree level, L versus the peak signal to noise ratio for the text data without data
compression, with Huffman coding and LZW coding. PSNR values are plotted against tree level, L.Higher PSNR values
with data compression schemes indicates that, when the text data is
(a) (b) (c)
(d) (e) (f)
12. Proceedings of the International Conference on Emerging
(a)
Fig.12: Comparison of PSNR values a) With Hu
compressed more data bits can be embedded with
the data compression techniques together with the histogram shifting techniques can improve the embedding capacity
and watermarked image quality.
4. CONCLUSION
The proposed method presents a reversible data hiding method accompanied with an encryption method so as to
ensure the security of the host image and the security of the message or data hidden in the host image. For reversible data
hiding, an efficient extension of the histog
pixels instead of simple pixel value is used. A binary tree structure is used to solve the problem of communicating pairs
of peak points. Distribution of pixel differences is used t
A histogram shifting technique is used to prevent overflow and underflow. The method ensures reversibility by showing
higher rate of PSNR values. The encryption method ensures reversibility
block division technique helps to distribute the message bits along the whole image and improves the visual quality of
the image and the hiding capacity. Two lossless data compression techniques, Huffman enc
used in conjunction with HS to further improve the embedding capacity.
In the future, the research can be extended in the following direction. The one are to promote data capacity and
stego-image quality at the same time. The propo
image, in the future the wasting capacity of extra information can reduce.
REFERENCES
[1] R.norcen, M.podesser, A.pommer,
Image Data”, Computers in Biology and Medicine 33,
[2] Sunil Lee, Chang D. Yoo, “Reversible Image Watermarking Based on Integer
2007.
[3] J. Tian, “Reversible data embedding using a difference expansion,” I
vol. 13, no. 8, pp. 890–896, Aug.2003.
[4] ZhenfeiZhaoa, HaoLuoc,, Jeng
modification and sequential recovery “International Journal of Electronics and
[5] Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,”
vol. 16, no. 3, pp. 354–362, Mar.
[6] N.K. Pareek, VinodPatidar, K.K. Sud, Discrete chaotic cryptography using external
(2003) 75–82.
[7] G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption based on 3D chaotic maps”,
Fractals 21 (2004)749–761.
[8] Mikhail.J.Atallah, “Text data compression,” in Algorithms and Theory of computation
pp. 12-1 - 12-21, 2009.
[9] Shamim Ahmed Laskar and Kattamanchi Hemachandran, “Steganography Based
Efficient Data Hiding”, International
Issue 2, 2013, pp. 31 - 44, ISSN Print: 0976
International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
191
(a) (b)
Comparison of PSNR values a) With Huffman coding b) With LZW coding
compressed more data bits can be embedded with the same image and hence it will improve the embedding capacity. So
the data compression techniques together with the histogram shifting techniques can improve the embedding capacity
presents a reversible data hiding method accompanied with an encryption method so as to
ensure the security of the host image and the security of the message or data hidden in the host image. For reversible data
hiding, an efficient extension of the histogram modification technique by considering the differences between adjacent
pixels instead of simple pixel value is used. A binary tree structure is used to solve the problem of communicating pairs
of peak points. Distribution of pixel differences is used to achieve large hiding capacity while keeping the distortion low.
A histogram shifting technique is used to prevent overflow and underflow. The method ensures reversibility by showing
higher rate of PSNR values. The encryption method ensures reversibility of the host image in addition to security. Image
block division technique helps to distribute the message bits along the whole image and improves the visual quality of
the image and the hiding capacity. Two lossless data compression techniques, Huffman enc
used in conjunction with HS to further improve the embedding capacity.
In the future, the research can be extended in the following direction. The one are to promote data capacity and
image quality at the same time. The proposed scheme still need to record extra information for restoring the cover
image, in the future the wasting capacity of extra information can reduce.
A.pommer, H.Schmidt and A.Uhl, “Confidential storage and Transmission of
Computers in Biology and Medicine 33, pp.277-292, 2003.
Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform
J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol.,
896, Aug.2003.
HaoLuoc,, Jeng-ShyangPand, “Reversible data hiding based on multilevel
recovery “International Journal of Electronics and Communications,
Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol.
362, Mar. 2006.
N.K. Pareek, VinodPatidar, K.K. Sud, Discrete chaotic cryptography using external
G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption based on 3D chaotic maps”,
Mikhail.J.Atallah, “Text data compression,” in Algorithms and Theory of computation
nd Kattamanchi Hemachandran, “Steganography Based on Random Pixel Selection
International Journal of Computer Engineering & Technology (IJCET), Volume
44, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Trends in Engineering and Management (ICETEM14)
31, December 2014, Ernakulam, India
ffman coding b) With LZW coding
the same image and hence it will improve the embedding capacity. So
the data compression techniques together with the histogram shifting techniques can improve the embedding capacity
presents a reversible data hiding method accompanied with an encryption method so as to
ensure the security of the host image and the security of the message or data hidden in the host image. For reversible data
ram modification technique by considering the differences between adjacent
pixels instead of simple pixel value is used. A binary tree structure is used to solve the problem of communicating pairs
o achieve large hiding capacity while keeping the distortion low.
A histogram shifting technique is used to prevent overflow and underflow. The method ensures reversibility by showing
of the host image in addition to security. Image
block division technique helps to distribute the message bits along the whole image and improves the visual quality of
the image and the hiding capacity. Two lossless data compression techniques, Huffman encoding and LZW coding is
In the future, the research can be extended in the following direction. The one are to promote data capacity and
sed scheme still need to record extra information for restoring the cover
Confidential storage and Transmission of Medical
Integer Wavelet Transform”,
Trans. Circuits Syst. Video Technol.,
based on multilevel histogram
Communications, 2010.
Trans. Circuits Syst. Video Technol.,
N.K. Pareek, VinodPatidar, K.K. Sud, Discrete chaotic cryptography using external key, Phys. Lett. A 309
G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption based on 3D chaotic maps”, Chaos Solitons
Mikhail.J.Atallah, “Text data compression,” in Algorithms and Theory of computation Handbook., CRC press,
n Random Pixel Selection for
ournal of Computer Engineering & Technology (IJCET), Volume 4,