1) The document proposes using spread spectrum image steganography (SSIS) to securely store data in the cloud by hiding data within digital images. SSIS spreads a message across a digital image as low-power noise to make the hidden data imperceptible.
2) When a user uploads data to the cloud, SSIS software would encrypt the data multiple times within an image. Even if hackers access the encrypted image, they cannot decrypt the data without knowing how many times the user encrypted it.
3) This provides double security by encrypting data within an image format and ensuring hackers cannot decrypt without the encryption key information known only to the authorized user.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
Present days processing of the image compression is the main protective representation with considerable data
process on each image progression. Traditionally more number of techniques were introduced for during
efficient progression in image compression on the data set representation process of application development. A
content owner encrypts the original uncompressed image using an encryption key. Then, a data hider may
compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to
accommodate some additional data. With an encrypted image containing additional data, if a receiver has the
data hiding key, receiver can extract the additional data though receiver does not know the image content. If the
receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one. If
the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the
original content.\
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
In this paper, we are going to have survey on different data hiding techniques and our main focus is on†Reversible data hiding in encrypted imagesâ€Â. In recent year the security of the sensitive data has become of prime and supreme importance and concern. To protect this data or secret information from unauthorized person we use many data hiding techniques like stegnography, cryptography and RDH. In this paper we will discuss on one such data hiding technique called Reversible Data Hiding (RDH). In this instead of embedding data in encrypted images directly, some pixels are estimated before encryption so that additional data can be embedded in the estimating errors. Without the encryption key, one cannot get access to the original image. A RC4 algorithm is applied on the rest pixels of the image and a special encryption scheme is designed to encrypt the estimating errors.Our paper presents a survey on various data hiding techniques and their comparative analysis.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
The protection of multimedia data is becoming very
important. The protection of this multimedia data can be done
with encryption or data hiding algorithms. To decrease
transmissions time the data transmission necessary.
Recently, more and more attention is paid to reversible data
hiding (RDH) in encrypted image. It maintains original area
could be perfectly restored after extraction of the hidden
message. In previous method embed data by reversibly vacating
area from the encrypted images, which may be subject to some
errors on data extraction and/or image restoration. A novel
method by reserving area before encryption with a traditional
RDH algorithm, and thus it is easy for the data hider to
reversibly embed data in the encrypted image. The proposed
method can achieve real reversibility, that is data extraction and
image recovery are free of any error. The hidden data can be
retrieved as and when required. The methods that are used in
reversible data hiding techniques like Lossless embedding and
encryption.
This deals with the image steganography as well as with the
different security issues, general overview of cryptography
approaches and about the different steganography
algorithms like Least Significant Bit (LSB) algorithm ,
JSteg, F5 algorithms. It also compares those algorithms in
means of speed, accuracy and security.
We present a case of murder with a blunt object.
On the body of the deceased were identified specific traces in
the form of suffusions. Four people were suspected for the
murder. During the investigative four pairs of sneakers were
obtained. A full forensic examination was performed which
excluded three of the four pairs of suspected shoes. The forth
pair was a match. This kind of research is extremely important
in forensic practice and theory, as they allow forensic experts
to identify the objects that left specific traces on the body of a
victim or deceased. They are also extremely important during
investigation of criminal offenses, especially when there is more
than one suspect.
Tonsillitis is a disease that can be found in every
part of the world. Moreover, it is one of the main causes
intervening for heart attack and pneumonia. It has been reported
that there are a large number of people having died because of
heart attack and pneumonia. To improve data transfer rates, this
paper proposes Gabor filter design with efficient noise reduction
and less power consumption usage is proposed in this paper.
Using textural properties of anatomical structures the filter
design is suitable for detecting the early stages of disease. The
code for Gabor filter will be developed in MATLAB
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
Scalable Image Encryption Based Lossless Image CompressionIJERA Editor
Present days processing of the image compression is the main protective representation with considerable data
process on each image progression. Traditionally more number of techniques were introduced for during
efficient progression in image compression on the data set representation process of application development. A
content owner encrypts the original uncompressed image using an encryption key. Then, a data hider may
compress the least significant bits of the encrypted image using a data hiding key to create a sparse space to
accommodate some additional data. With an encrypted image containing additional data, if a receiver has the
data hiding key, receiver can extract the additional data though receiver does not know the image content. If the
receiver has the encryption key, can decrypt the received data to obtain an image similar to the original one. If
the receiver has both the data hiding key and the encryption key, can extract the additional data and recover the
original content.\
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd and 3rd LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
In this paper, we are going to have survey on different data hiding techniques and our main focus is on†Reversible data hiding in encrypted imagesâ€Â. In recent year the security of the sensitive data has become of prime and supreme importance and concern. To protect this data or secret information from unauthorized person we use many data hiding techniques like stegnography, cryptography and RDH. In this paper we will discuss on one such data hiding technique called Reversible Data Hiding (RDH). In this instead of embedding data in encrypted images directly, some pixels are estimated before encryption so that additional data can be embedded in the estimating errors. Without the encryption key, one cannot get access to the original image. A RC4 algorithm is applied on the rest pixels of the image and a special encryption scheme is designed to encrypt the estimating errors.Our paper presents a survey on various data hiding techniques and their comparative analysis.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
The protection of multimedia data is becoming very
important. The protection of this multimedia data can be done
with encryption or data hiding algorithms. To decrease
transmissions time the data transmission necessary.
Recently, more and more attention is paid to reversible data
hiding (RDH) in encrypted image. It maintains original area
could be perfectly restored after extraction of the hidden
message. In previous method embed data by reversibly vacating
area from the encrypted images, which may be subject to some
errors on data extraction and/or image restoration. A novel
method by reserving area before encryption with a traditional
RDH algorithm, and thus it is easy for the data hider to
reversibly embed data in the encrypted image. The proposed
method can achieve real reversibility, that is data extraction and
image recovery are free of any error. The hidden data can be
retrieved as and when required. The methods that are used in
reversible data hiding techniques like Lossless embedding and
encryption.
This deals with the image steganography as well as with the
different security issues, general overview of cryptography
approaches and about the different steganography
algorithms like Least Significant Bit (LSB) algorithm ,
JSteg, F5 algorithms. It also compares those algorithms in
means of speed, accuracy and security.
We present a case of murder with a blunt object.
On the body of the deceased were identified specific traces in
the form of suffusions. Four people were suspected for the
murder. During the investigative four pairs of sneakers were
obtained. A full forensic examination was performed which
excluded three of the four pairs of suspected shoes. The forth
pair was a match. This kind of research is extremely important
in forensic practice and theory, as they allow forensic experts
to identify the objects that left specific traces on the body of a
victim or deceased. They are also extremely important during
investigation of criminal offenses, especially when there is more
than one suspect.
Tonsillitis is a disease that can be found in every
part of the world. Moreover, it is one of the main causes
intervening for heart attack and pneumonia. It has been reported
that there are a large number of people having died because of
heart attack and pneumonia. To improve data transfer rates, this
paper proposes Gabor filter design with efficient noise reduction
and less power consumption usage is proposed in this paper.
Using textural properties of anatomical structures the filter
design is suitable for detecting the early stages of disease. The
code for Gabor filter will be developed in MATLAB
This paper presents the details on the
experimental investigation carried out to get the desired fresh
properties of the SCC. Tests were performed on various mixtures
to obtain the required SCC. In the present research work we
have replaced 15% of cement with class F fly ash. By varying the
quantity of water and sand the mortar mix was prepared. Later
varying percentage of coarse aggregate was added to the mortar
to obtain the desired SCC.
A Broadband Wireless Access technology known as
Worldwide Interoperability for Microwave Access (WiMAX) is
based on IEEE 802.16 standards. It uses orthogonal frequency
division multiple accesses (OFDMA) as one of its multiple access
technique. Major design factors of OFDMA resource allocation are
scheduling and burst allocation. To calculate the appropriate
dimensions and location of each user’s data so as to construct the
bursts in the downlink subframe, is the responsibility of burst
allocation algorithm. Bursts are calculated in terms of number of
slots for each user. Burst Allocation Algorithm is used to overcome
the resource wastage in the form of unused and unallocated slots per
frame. It affects the Base station performance in mobile WiMAX
systems. In this Paper, HOCSA (Hybrid One Column Striping with
Non Increasing Area) algorithm is proposed to overcome frame
wastage. HOCSA is implemented by improving eOCSA algorithm
and is evaluated using MATLAB. HOCSA achieves significant
reduction of resource wastage per frame, leading to more
exploitation of the WiMAX frame.
Мы организовываем 5 недель активностей, которые взорвут вашу группу! Что сделать, чтобы полюбиться участникам? Как создать элиту группы? Как заполучить доверие и лояльность? Об этом в нашей презентации!
M-Commerce is the latest initiative by the mobile
internet technology. The movement of new technology has
become a trend in the market. The brand leaders in the market
always try several initiatives to capture the market as well as new
customers and m-commerce is the new way to the industry to link
with their customers easily. The need of mobile commerce to
businessman is very vital. The role of new technology was moving
very prompt in the market. The role of technology helps the
industry to promote their products for each mobile internet user
customer with the help of mobile applications and software. MCommerce
has an option to the mobile internet users to purchase
or order their products anytime with the help of mobile web. This
paper explores the role of mobile commerce in the new era of
technology. The role of mobile technology has already changed
the nature of customer vastly and e-commerce also provides the
root to m-commerce in its success.
The main aim of energy efficient routing is to
minimize the energy required to transmit or receive packets also
called as active communication energy. Inactive energy is the
energy which not only tries to reduce the energy consumed
when a mobile node stays idle but also listens to the wireless
medium for any possible communication requests from other
nodes. To conserve energy, many energy efficient routing
protocols have been proposed. Networks of small, inexpensive,
disposable, smart sensors are emerging as a new technology with
tremendous potential. Wireless sensor networks can be randomly
deployed inside or close to phenomenon to be monitored. The
advantage of these networks is the fact that they are selfconfiguring,
which means that a sensor network can be deployed
randomly on a battlefield, in a disaster area or in an inaccessible
area without the need for human intervention. The energy
supplies of nodes are not replenished or replaced and therefore
nodes only participate in the network for as long as they have
energy. This fact necessitates energy efficiency in the design of
every aspect of such nodes. Energy consumption in sensor nodes
occurs mainly due to computational processing and, to a greater
extent, communication. The routing protocol employed by these
sensor nodes can minimize the number of transmissions that
nodes make as well as the computational complexity of routing
path selection. It is therefore of critical importance that the
routing protocol be designed with energy efficiency in mind.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of
camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia
content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access
from suspicion of the existence of confidential information exchanged during communication channels
between the connected parties. In this paper, an integrated image steganographic system is designed to
conceal images, messages or together where the mainly deliberate the improvement of embedding capacity
through embedding text with image simultaneously. For that purpose, used matrix partition to partition the
secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify
the better performance of the proposed algorithms.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Recent joint surgery studies reveal increased
revisions and resurfacing of the metal on metal hip joints. Metal
on metal hip implants were developed more than thirty years ago
and their application has been refined because of availability of
advanced manufacturing techniques and partly by advancements
in material science and engineering. Development of composite
materials may provide greater durability to metal-on-metal hip
implants .This review article is a study of the latest literature of
metal-on-metal hip implants and its various modeling techniques.
Numbers of methods are used for convergence and numerical
solution to investigate the performance of metal-on-metal hip
implant for accurate stable solution. This paper presents analysis
done by various researchers on metal-on-metal hip implants for
wear, lubrication, fatigue, bio-tribo-corrosion, design, toxicity
and resurfacing. After in vivo and in vitro studies, it is found that
all these methods have limitations. There is a need of more
insight for lubrication analysis, geometry of bearings, materials
and input parameters. The information provided in this work is
intended as an aid in the assessment of metal-on-metal hip joints.
Background Hospital contributes significantly tangible and intangible resources on a concurred plan by the scheduling of surgery on the OT list. Postponement decreases efficiency by declining throughput leads to wastage of resources hence burden to the nation. Patients and their family face economic and emotional implication due to the postponement. Postponement rate being a quality indicator controls check mechanism could be developed from the results. Postponement of elective scheduled operations results in inefficient use of the operating room (OR) time on the day of surgery. Inconvenience to patients and families are also caused by postponements. Moreover, the day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extent of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology A cross-sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from March 1st to September 30th, 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (surgeons, Anesthetist, Nursing Officer) and they were further evaluated time series analysis of scheduling of Operation Theater for moving average technique. Results Total 958 surgeries were scheduled and 772 surgeries performed were and 186 surgeries were postponed with a postponement rate of 19.42% in the cardiac surgery department during the study period. Month-wise postponement Rate exponential smoothing of time series data shows the dynamic of operating suits. To test throughput Postponement rate was plotted the postponed surgeries and on regression analysis is in a perfect linear relationship.
Introduction: Postponement of elective scheduled operations results in inefficient use of operating room (OR) time on the day of surgery. Inconvenience to patients and families also caused by postponements. Moreover, day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extend of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology: A cross sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from march 1st to September 30th 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (Surgeons, Anesthetist, Nursing officer) and they were further evaluated Time series analysis of scheduling of Operation Theater for Moving average Technique. Results: total 2,466 surgeries were scheduled and 1,980 surgeries were performed and 486 surgeries were postponed in the general surgery department during the study period. Month wise postponement forecast was in accordance with the performed surgeries and on regression analysis postponed surgeries were in perfect linear relationship with the postponement Rate.
In the present paper the experimental study of
Nanotechnology involves high cost for Lab set-up and the
experimentation processes were also slow. Attempt has also
been made to discuss the contributions towards the societal
change in the present convergence of Nano-systems and
information technologies. one cannot rely on experimental
nanotechnology alone. As such, the Computer- simulations and
modeling are one of the foundations of computational
nanotechnology. The computer modeling and simulations
were also referred as computational experimentations. The
accuracy of such Computational nano-technology based
experiment generally depends on the accuracy of the following
things: Intermolecular interaction, Numerical models and
Simulation schemes used. The essence of nanotechnology is
therefore size and control because of the diversity of
applications the plural term nanotechnology is preferred by
some nevertheless they all share the common feature of control
at the nanometer scale the latter focusing on the observation
and study of phenomena at the nanometer scale. In this paper,
a brief study of Computer-Simulation techniques as well as
some Experimental result
Solar cell absorber Kesterite- type Cu2ZnSnS4 (CZTS) thin films have been prepared by Chemical Bath Deposition (CBD). UV–vis absorption spectra measurement indicated that the band gap of as-synthesized CZTS was about1.68 eV, which was near the optimum value for photovoltaic solar conversion in a single-band-gap device. The polycrystalline CZTS thin films with kieserite crystal structure have been obtained by XRD. The average of crystalline size of CZTS is 27 nm
Multilevel inverters play a crucial part in the
areas of high and medium voltage applications. Among the three
main multilevel inverters used, the capacitor clamped multilevel
inverter(CCMLI) has advantage with respect to voltage
redundancies. This work proposes a switching pattern to improve
the performance of chosen H-bridge type CCMLI over
conventional CCMLI. The PWM technique used in this work is
Phase Opposition Disposition PWM(PODPWM). The
performance of proposed H-bridge type CCMLI is verified
through MATLAB-Simulink based simulation. It has been
observed that the THD is low in chosen CCMLI compared to
conventional CCMLI.
- In this paper, we introduce a practical mechanism of
compressing a binary phase code modulation (BPCM) signal
according to Barker code with 13 chips in presence of additive
white Gaussian noise (AWGN) by using a digital matched filter
(DMF) corresponding to time domain convolution algorithm of
input and reference signals using Cyclone II EP2C70F896C6
FPGA from ALTERA placed on education and development
board DE2-70 with the following parameters: frequency of
BPCM signal fIF=2 MHz, sampling frequency
f MHz SAM 50
,pulse period
T 200s
, pulse width
S 13sc
, chip width
CH 1sc
, compressing factor
KCOM 13
, SNRinp=1/1, 1/2, 1/3, 1/4, 1/5 and processing
gain factor SNRout/SNRinp=11.14 dB.
The results of filter operation are evaluated using a digital
oscilloscope GDS-1052U to display the input and output signals
for different SNRinp.
Flooding is one of the most devastating natural
disasters in Nigeria. The impact of flooding on human activities
cannot be overemphasized. It can threaten human lives, their
property, environment and the economy. Different techniques
exist to manage and analyze the impact of flooding. Some of these
techniques have not been effective in management of flood
disaster. Remote sensing technique presents itself as an effective
and efficient means of managing flood disaster. In this study,
SPOT-10 image was used to perform land cover/ land use
classification of the study area. Advanced Space borne Thermal
Emission and Reflection Radiometer (ASTER) image of 2010 was
used to generate the Digital Elevation Model (DEM). The image
focal statistics were generated using the Spatial Analyst/
Neighborhood/Focal Statistics Tool in ArcMap. The contour map
was produced using the Spatial Analyst/ Surface/ Contour Tools.
The DEM generated from the focal statistics was reclassified into
different risk levels based on variation of elevation values. The
depression in the DEM was filled and used to create the flow
direction map. The flow accumulation map was produced using
the flow direction data as input image. The stream network and
watershed were equally generated and the stream vectorized. The
reclassified DEM, stream network and vectorized land cover
classes were integrated and used to analyze the impact of flood on
the classes. The result shows that 27.86% of the area studied will
be affected at very high risk flood level, 35.63% at high risk,
17.90% at moderate risk, 10.72% at low risk, and 7.89% at no
risk flood level. Built up area class will be mostly affected at very
high risk flood level while farmland will be affected at high risk
flood level. Oshoro, Imhekpeme, and Weppa communities will be
affected at very high risk flood inundation while Ivighe, Uneme,
Igoide and Iviari communities will be at risk at high risk flood
inundation level. It is recommended among others that buildings
that fall within the “Very High Risk” area should be identified
and occupants possibly relocated to other areas such as the “No
Risk” area.
Without water, humans cannot live. Since time began,
we have lived by the water and vast tracts of waterless land have
been abandoned as it is too difficult to inhabit. At any given
moment, the earth’s atmosphere contains 4,000 cubic miles of
water, which is just 0.000012% of the 344 million cubic miles of
water on earth. Nature maintains this ratio via evaporation and
condensation, irrespective of the activities of man.
There is a certain need for an alternative to solve the water
scarcity. Obtaining water from the atmosphere is nothing new -
since the beginning of time, nature’s continuous hydrologic cycle
of evaporation and condensation in the form of rain or snow has
been the sole source and means of regenerating wholesome water
for all forms of life on earth.
An effective method to generate water is by the separation of
moisture present in air by condensation. In this study, the water
present in air is condensed on the surface of a container and then
collected in an external jacket provided on the container.
Insulations are provided to optimize the inner temperature of the
container.
The method is although uncommon but has certain advantages
which make it a success. The process is economical and does not
require a lot of utilities. It also helps in further reducing the
carbon footprint.
In every moment of functioning the Li-Ion
battery must provide the power required by the user, to have a
long operating life and to and to provide high reliability in
operation. The methods for analysis and testing batteries are
ensuring that all these conditions imposed to the batteries are
met by being tested depending on their intended use.
The success rate of real estate project is
decreasing as there is large scale of project and participation of
entities. It is necessary to study the risk factors involved in the
project. This paper focused on types of risks involved in the
project, risk factors, risk management tools & techniques.
Identification of risk of the project in terms of the total cost of the
project has been divided under Technical, Financial, Sociopolitical
and Statutory cost centers. Large real estate projects
have to tackle the following issues: land acquisition, skilledlabour
shortage, non-availability of skilled project managers, and
mechanization of the construction process to cater to the growing
demands. Non- availability of supporting infrastructure, political
issues like instability of the government leading to regulatory
issues, social issues, marketing forms an important part in these
projects as this is a onetime investment and the purchase cycle is
long , long development period makes the same project be at
different points in the real estate value cycle.
- In the present scenario carbon emission and sand
mining are major concern due to its hazardous effect to
environment and making serious imbalance to the ecosystem.
Various studies have been conducted to reduce severe effect on
environment, using byproducts like copper slag as partial
replacement of fine aggregate. Different researchers have also
revealed numerous uses of copper slag as a replacing agent in
determining the strength of concrete. A comprehensive review of
studies has been presented in this paper for scope of replacement
of fine aggregate from copper slag in concrete
- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user
Background: Septoplasty is a common surgical
procedure performed by otolaryngologists for the correction of
deviated nasal septum. This surgery may be associated with
numerous complications. To minimize these complications,
otolaryngologists frequently pack both nasal cavities with
different types of nasal packing. Despite all its advantages,
nasal packing is also associated with some disadvantages. To
avoid these issues, many surgeons use suturing techniques to
obviate the need for packing after surgery.
Objective: To determine the efficacy and safety of trans-septal
suture technique in preventing complications and decreasing
morbidity after septoplasty in comparison with nasal packing.
Patients and methods: Prospective comparative study. This
study was conducted in the department of Otolaryngology -
Head and Neck Surgery, Rizgary Teaching Hospital - Erbil,
from the 6th of May 2014 to the 30th of November 2014.
A total of 60 patients aged 18-45 years, undergoing septoplasty,
were included in the study. Before surgery, patients were
randomly divided into two equal groups. Group (A) with transseptal
suture technique was compared with group (B) in which
nasal packing with Merocel was done. Postoperative morbidity
in terms of pain, bleeding, postnasal drip, sleep disturbance,
dysphagia, headache and epiphora along with postoperative
complications including septal hematoma, septal perforation,
crustation and synechiae formation were assessed over a follow
up period of four weeks.
Results: Out of 60 patients, 37 patients were males (61.7%)
and 23 patients were females (38.3%). Patients with nasal
packing had significantly more postoperative pain (P<0.05)><0.05). There was no significant difference between
the two groups with respect to nasal bleeding, septal
hematoma, septal perforation, crustation and synechiae
formation.
Conclusion: Septoplasty can be safely performed using transseptal
suturing technique without nasal packing.
The basic reason behind the need to
monitor water quality is to verify whether the examined
water quality is suitable for intended usage or not. This
study is conducted on Al -Shamiya al- sharqi drain in
Diwaniya city in Iraq to make valid assessment for the
level of parameters measured and to realize their effects
on irrigation. In order to assess the drainage water
quality for irrigation purposes with a high accuracy, the
Irrigation Water Quality Index (IWQI) will be examined
and upgraded (integrated with GIS) to make a
classification for drainage water. For this purpose, ten
samples of drainage water were taken from different ten
location of the stuay area. The collected samples were
analyzed chemically for different elements which affect
water quality for irrigation.These elements are :
Calcium(Ca+2), Sodium(Na+
), Magnesium(Mg+2),
Chloride( ), Potassium(K+
), Bicarbonate(HCO3),
Nitrate(NO3), Sulfate( , Phosphate( , Electrical
Conductivity(EC), Total Dissolved Solids (TDS), Total
Suspended Solids (TSS) and pH-values (PH). Sodium
Adsorption Ratio (SAR) and Sodium Content (Na%)
have been also calculated. Results suggest that, the use of
GIS and Water Quality Index (WQI) methods could
provide an extremely interesting as well as efficient tool
to water resource management. The results analysis of
(IWQI) maps confirms that: 52% of the drainage water
in study area falls within the "Low restriction" (LR) and
47%of study area has water with (Moderate
restriction)(MR),While 1% of drainage water in the
study area classified as (Sever restriction) (SR). So, the
drainage water should be used with the soil having high
permeability with some constraints imposed on types of
plant for specified tolerance of salts
The cable-hoisting method and rail cable-lifting
method are widely used in the construction of suspension bridge.
This paper takes a suspension bridge in Hunan as an example,
and expounds the two construction methods, and analyzes their
respective merits and disadvantages.
Baylis-Hillman reaction has been achieved on
different organic motifs but with completion times of three to
six days. Micellar medium of CTAB in water along with the
organic base DABCO has been used to effect the BaylisHillman
reaction on a steroidal nucleus of Withaferin-A for the
first time with different aromatic aldehydes within a day to
synthesize a library of BH adducts (W1a –W14a) and (W1bW14b)
as a mixture of two isomers and W15 as a single
compound. The isomers were separated on column and the
major components were chosen for bio-evaluation. Cytotoxic
activity of the synthesized compounds was screened against a
panel of four cancer cell lines Lung A-549, Breast MCF-7,
Colon HCT-116 and Leukemia THP-1 along with 5-florouracil
and Mitomycin-C as references. All the compounds exhibited
promising activity against screened cell lines and were found to
possess enhaunced activity than parent compound. BH adducts
with aromatic systems having methoxy and nitro groups were
found to be more active.
The batteries used in electric and hybrid vehicles
consists of several cells with voltages between 3.6V battery and
4.2 V in series or parallel combinations of configurations for
obtaining the necessary available voltages in the operation of a
hybrid electric vehicle. How malfunction of a single cell affects
the behavior of the entire battery pack, BMS main function is to
protect individual cells against over-discharge, overload or
overheating. This is done by correct balancing of the cells. In
addition BMS estimates the battery charge status
This project aims at using (PD-MCPWM) Phase
disposition multi carrier pulse width modulation technique to
reduce leakage current in a transformerless cascaded multilevel
inverter for PV systems. Advantages of transformerless PV
inverter topology is as follows, simple structure, low weight and
provides higher efficiency , but however this topology provides a
path for the leakage current to flow through the parasitic
capacitance formed between the PV module and the ground.
Modulation technique reduces leakage current with an added
advantage without adding any extra components.
Many people in Africa depend on water from
rivers and borehole, but purity of the drinking water from these
sources remains questionable. Mudzira River being the longest
River in a village called Vimtim located in Mubi North Local
government area in Adamawa State was studied in the months of
September to December, 2012 to ascertain the suitability of the
water for human consumption and other related uses. Five study
point: inlet (A, B), middle (C) and out let (D, E) were adopted for
monitoring the physico-chemical parameters using standard
procedures. The mean total temperature values were A (25.000C),
B (24.500C), C (25.500C), D (24.000C) and E (24.000C. Average P
H
values were A (8.00), B (7.87), C (8.20) D (8.37) and E (8.13). The
average conductivity values were A (73.90
1 cms
), B
(73.11
1 cms
), D (74.00
1 cms
) and E (73. 80
1 cms
). The
average total dissolves solid value of each sample were A (17.10),
B (17.10), C (20.00) D (21.64) and E (21.60.). The average
turbidity value of sample were A (47.00), B (47.00), C (50.00) D
(53.00) and E (50.00). Average total hardness value are A
(20.00mg/l), B (20.00mg/L) C (24.00mg/L), D (20.00mg/L) and E
(20.00mg/L). The average chloride content were A (12mg/L), B
(16mg/L), C (12 mg/L) D (16mg/L) and E (16mg/L). The average
calcium content were A (0.3mg/L) B (0.4mg/L), C (0.3mg/L), D
(0.3mg/L) and E (0.2mg/L). The average content of magnesium
were A (12mg/L), B (16mg/L), C (16Mg/L), D (12mg/L), E
(12mg/L). The lead content of River Mudzira water was
negligible. The mean coliform count were A (4), B (3), C (6), D
(7), and E (4).The values of the parameters studied were within
the WHO/NAFDAC recommended standards, excepts for total
coliform levels. In conclusion Vimtim residents consuming
untreated water from River Mudzira are potentially exposed to
possible acute, sub chronic or even chronic water borne diseases
like typhoid fever, dysentery, diarrhea etc.
More from International Journal of Technical Research & Application (20)
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How libraries can support authors with open access requirements for UKRI fund...
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
1. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 76-79
76 | P a g e
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
Rajeev Kumar
Departmentof Computer Science & Engineering
Rajasthan Technical University, Alwar ,India
Abstract— Communication is the god given gift that enables intellectual and cultural exchange and builds up our competence in social behavior. So now we are living in the information age. The internet and cloud computing has taken communication to unimaginable attitudes. Cloud computing entrusts remote services with a user's data, software and computation. But many questions arise when we think of security. Is Cloud computing communication private and security? But encrypted messages can still be tracked revealing who is talking to whom. The term Cloud Computing refers to the concept where the shared servers provide resources such as data, software to the clients. In order to use a Cloud service all you need is a web browser and an internet. The biggest Disadvantage in cloud computing is the data security. Because the data that is being stored in the cloud will be stored in the cloud provider’s server and hence this results in hacking of data by unauthorized person. In the business model using software as a service, users are provided access to application software and databases. The cloud providers manage the infrastructure and platforms on which the applications run. In this paper we gave our proposal, how we can secure our data in cloud computing. Our idea is based on implementing the Spread spectrum Image. Steganography’s (SSIS) in cloud computing platforms .we hope it will be very beneficial for the user who loves cloud platform but hesitating to use because of the data security issue
.Index Terms— Cloud computing security, image hiding, Spread spectrum Image ,steganography’s. (key words)
I. INTRODUCTION.
Cloud computing” is the next natural step in the evolution of on-demand information technology services and products. As we said earlier the biggest issue in the cloud computing is its data security. Since, the data that is being uploaded will be available only in the cloud provider server in some encrypted form that is made by the cloud provider. When our data is present in some one’s server there is a big chance of our data is being hacked. In order to make our data secured in cloud platform the best idea according to me is to upload the data in the image encrypted form. Hence, this provides double level security since the data will be normally stored in an encrypted form in the server.
II. WHAT IS ACTUALLY HAPPENING?.
1) When a user opens his cloud platform and creates a file in that, which may contain some essential data.
2) When the user logs off his cloud platform the data that is created by the user will be stored in the cloud provider’s server in an encrypted form.
3) When the user re login into his cloud platform the data will be decrypted from the server and given to the server
Fig1CloudArchitecture
A. Issues
1) The biggest issue now is the server can be hacked by the hackers and the data can be decrypted. Hence, user data is lost.
2) From the above figure, it is clear that in the cloud computing each and every component such as software, data storage is provided as a service.
3) From the above figure, it is clear that in the cloud computing each and every component such as software, data storage is provided as a service.
4) Although it reduces the cost of hardware it is not much reliable because of the data that is being directly stored in provider server.
2. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 76-79
77 | P a g e
III. SPREAD SPECTRUM?
Spread-spectrum communication describes the process of spreading the bandwidth of a narrowband signal across a wide band of frequencies. This can be accomplished by modulating the narrowband waveform with a wideband waveform, such as white noise. After spreading, the energy of the narrowband signal in any one frequency band is low and therefore difficult to detect. SSIS uses this technique to embed a message, typically a binary signal, within very low power white Gaussian noise.
The resulting signal, perceived as noise, is then combined with the cover image to produce the stego image. Since the power of the embedded signal is low compared to the power of the cover image, the SNR is also low, thereby indicating low perceptibility and providing low probability of detection by an observer. Subsequently, an observer will be unable to visually distinguish the original image from the stegoimage.
IV. WHAT IS STEGANOGRAPHY?
Steganography is the art and science of hiding information by embedding messages within other, seemingly harmless messages. More commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.
A. Steganography in Cloud Computing
Steganography techniques can be used to provide a perfect tool for data exfiltration, to enable network attacks or hidden communication among secret parties
Fig 2. Hiding data in an image
The aim of these techniques is to hide secret data (steganograms) in the innocent looking carrier e.g. in normal transmissions of users. In ideal situation hidden data exchange cannot be detected by third parties
B. Different Kinds of Steganography
Fig 3.Variants of steganography
Almost all digital file formats can be used for steganography, but the formats that are more suitable are those with a high degree of redundancy.
Redundancy can be defined as the bits of an object that provide accuracy far greater than necessary for the object’s use and display [Currie and Irvine]. The redundant bits of an object are those bits that can be altered without the alteration being detected easily [Anderson and Petit colas (1998)]. Image and audio files especially comply with this requirement, while research has also uncovered other file formats that can be used for information hiding. Figure 4, shows the four main categories of file formats that can be used for steganography. Hiding information in text is historically the most important method of steganography. This paper will focus on hiding information in images by using spread spectrum image steganography in the next sections. To hide information in audio files similar techniques are used as for image files. One different technique unique to audio steganography is masking, which exploits the properties of the human ear to hide information unnoticeably. A faint, but audible, sound becomes inaudible in the presence of another louder audible sound [7].
V. SPREAD SPECTRUM IMAGE STEGANOGRAPHY AND ITS WORKING PRINCIPLES
Fig 4. Steganogram Generator
Spread Spectrum Image Steganography (SSIS) works by storing a message as Gaussian noise in an image At low noise power levels, the image degradation is undetectable by the human eye, while at higher levels the noise appears as speckles or “snow.” The process consists of the following major steps, as illustrated in figure 5 and figure 6.
1. Create encoded message by adding redundancy via error- correcting code.
2. Add padding to make the encoded message the same size as the image.
3. Interleave the encoded message.
4. Generate a pseudorandom noise sequence, n.
5. Use encoded message, m, to modulate the sequence, generating noise, s.
6. Combine the noise with the original image.
Notice that original image is not required to recover the original image. A filter is used to extract the noise from the
3. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 76-79
78 | P a g e
stegoimage, resulting in an approximation of the original image.
The better this filter works the fewer errors in the extracted message.
Fig 5. Simplified Steganography Embedder
VI. IMPLEMENTATION DETAILS
The SSIS working principles now are going to implement this SSIS concept in the Cloud Infrastructure service layer. This layer is especially for storing huge amount data,so we can store and transfer the information in the image, so it yields the essential security for data. The figure 6 shows the Layers in the cloud infrastructure as a service platform, in this the we have to implement the SSIS concept in the top of the layer, the SSIS will act as a gate keeper, and it does the job of Encoding and decoding process.
Fig 6. A view of infrastructure as a service platform
Fig 7. SSIS working overview
VII. IMPLEMENTATIONS STEPS
This idea is totally based on the user point of view not from the cloud provider point of view. (i.e.) For the users who love to use cloud platform but hesitating to do that because of the data security issue.
1) When a user going to store a data in the cloud platform.
2) User going to store the data in an encrypted (Data inside the image) forms.
3) We are going to develop software that helps the user to embedded the data into the image.
4) The user is requested to run the software more than once on his data.
5) The no. of times the data is being encrypted is known only to the user. This is the key here.
6) Then, when the user log off his cloud platform. The data will be again encrypted and stored in the server.
7) Now when the hacker hacks the data in the server. He is sure that the data is stored in only one encrypted form.
8) But, the user already encrypted the data more than once with the help of the software.
9) Even though the hacker finds out that the data is in encrypted (image) form by the user.
10) User is not sure how many times it is being encrypted.
11) When the user re login and decrypts the data key no. of times the original data is obtained in any computer.
12) Hence, this provides security to data from the user’s point of view.
4. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 1, Issue 3 (july-August 2013), PP. 76-79
79 | P a g e
Fig.8 Hiding image
VIII. CONCLUSION
cloud computing as a carrier for secret communication is not very different from any other popular steganography carriers e.g. like IP telephony. The main novelty in this area when compared with known hidden data exchange opportunities is possibility of enabling secret communication between two instances of cloud services. Steganography should be treated for cloud computing environment as a rising threat to the network security as it is seen for typical networking ones.
We Presented in this paper hidden communication scenario as well as the threats that steganography methods can cause must be taken into account when designing secure cloud computing services. In order to minimize the potential threat of malicious use of steganography to public security effective steganalysis (detection) methods are needed.
This requires in-depth understanding of the functionality of particular cloud service and the ways it can be used to enable hidden communication. Considering however variety and complexity of the cloud computing services there is not much hope that a universal and effective steganalysis method can be developed. We hope it will increase the Data security of Cloud computing…
“If privacy is outlawed, only outlaws will have privacy “.
REFERENCES
[1] http://technologywall.files.wordpress.com/2011/11/cloud_computing_structure.png?w=535&h=484.
[2] http://blogs.msdn.com/cfs-file.ashx/__key/CommunityServer- Blogs-Components-WeblogFiles/00-00-01-17-43- metablogapi/7317.image_5F00_6D6EC8C3.png
[3] http://3.bp.blogspot.com/- 6tBPrwtmPnM/T97yncHGnLI/AAAAAAAAAGs/sJnJ7xhvhH4/s1600/spy-carousel.jpg
[4] T. Morkel 1, J.H.P. Eloff 2, M.S. Olivier on“an overview of image steganography”.
[5] [5] Currie, D.L. & Irvine, C.E., “Surmounting the effects of lossy compression on Steganography”, 19th. Edition.National Information Systems.
[6] Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998
[7] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science
[8] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001 www.liacs.nl/home/ tmoerl/privtech.pdf