As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
In the digital world, data is that the heart of computer communication and world
economy to make sure the safety for this data it is desired secure transmission of
confidential data that gets an excellent deal of attention. Therefore; it’s necessary to
use effective methods to reinforce information security. Many strategies are coming up
to shield the information from going to unauthorized person. Steganography and
cryptography are 2 completely different mechanisms for information security. The
main purpose in cryptography is to create message idea unintelligible, whereas
steganography aims to hide secret message. Digital-pictures are wonderful carriers of
hidden information. Combining these two methods is a topic of high relevance since
secure communication is inevitable for mankind. In this paper, a method for
protection data was proposed comprises a hybridization between cryptography and
steganography. In the proposed approach particle swarm optimization algorithm
(PSO) was used in both methods(encryption and steganography).The PSO algorithm
was used in key generation process for data encryption and in generating hidden
locations for data hiding. Also, the Least Significant Bit (LSB)was utilized to add the
encrypted data into LSB of the cover and the PSO was utilized to specify the location
of hiding data. The data will be encrypted by using stream cipher method. The image
will be transmitted and received through the internet and the extraction process would
be exactly reveres for hidden process. Experimental results illustrate that the visual,
and therefore applying mathematics values of the image with encrypted information
before the insertion represented as the same as the values after the insertion so that
the reduction in the possibility of the confidential-message to be detected and allows
secret communication. The effectiveness of the projected technique has been
calculable by computing 5 statistical tests, 16 NIST tests for the generated key
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...INFOGAIN PUBLICATION
Belief-change among students in mathematics learning is an elemental source of concern in the field of mathematics education. In the Philippines, BS Mathematics is one of the programs less chosen by many students. In spite of the efforts of the schools to market the program, it remains in the last options for those who are planning to take mathematics in the tertiary level. This study, through a qualitative research, explores the beliefs and feelings of BS Mathematics students of De La Salle Lipa about engaging in and learning Mathematics. It presents the change in beliefs of the students particularly those who did not intend to enroll in the said program. The views and feelings expressed by the subjects during a face-to-face interview reflect the kind of experience they have in school. The findings of the study indicate that (negative) beliefs of the students about pursuing mathematics as a program and learning the subject can change with the sound support of the school to provide an encouraging and learning environment. Such can eventually promote positive reception and achievement in the subject among the students.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
Several accurate watermarking methods for image watermarking have being suggested and implemented to secure various forms of digital data, images and videos however, very few algorithms are proposed for audio watermarking. This is also because human audio system has dynamic range which is wider in comparison with human vision system. In this paper, a new audio watermarking algorithm for voice message encryption based on Empirical Mode Decomposition (EMD) is introduced. The audio signal is divided into frames and each frame is then decomposed adaptively, by EMD, into intrinsic oscillatory components called Intrinsic Mode Functions (IMFs). The watermark, which is the secret message that is to be sent, along with the synchronization codes are embedded into the extrema of the last IMF, a low frequency mode stable under different attacks and preserving the perceptual quality of the host signal. Based on exhaustive simulations, we show the robustness of the hidden watermark for audio compression, false decryption, re-quantization, resampling. The comparison analysis shows that our method has better performance than other steganography schemes recently reported.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
In the digital world, data is that the heart of computer communication and world
economy to make sure the safety for this data it is desired secure transmission of
confidential data that gets an excellent deal of attention. Therefore; it’s necessary to
use effective methods to reinforce information security. Many strategies are coming up
to shield the information from going to unauthorized person. Steganography and
cryptography are 2 completely different mechanisms for information security. The
main purpose in cryptography is to create message idea unintelligible, whereas
steganography aims to hide secret message. Digital-pictures are wonderful carriers of
hidden information. Combining these two methods is a topic of high relevance since
secure communication is inevitable for mankind. In this paper, a method for
protection data was proposed comprises a hybridization between cryptography and
steganography. In the proposed approach particle swarm optimization algorithm
(PSO) was used in both methods(encryption and steganography).The PSO algorithm
was used in key generation process for data encryption and in generating hidden
locations for data hiding. Also, the Least Significant Bit (LSB)was utilized to add the
encrypted data into LSB of the cover and the PSO was utilized to specify the location
of hiding data. The data will be encrypted by using stream cipher method. The image
will be transmitted and received through the internet and the extraction process would
be exactly reveres for hidden process. Experimental results illustrate that the visual,
and therefore applying mathematics values of the image with encrypted information
before the insertion represented as the same as the values after the insertion so that
the reduction in the possibility of the confidential-message to be detected and allows
secret communication. The effectiveness of the projected technique has been
calculable by computing 5 statistical tests, 16 NIST tests for the generated key
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Ijaems apr-2016-25 BS Mathematics Student’s Personal Beliefs in Engaging in a...INFOGAIN PUBLICATION
Belief-change among students in mathematics learning is an elemental source of concern in the field of mathematics education. In the Philippines, BS Mathematics is one of the programs less chosen by many students. In spite of the efforts of the schools to market the program, it remains in the last options for those who are planning to take mathematics in the tertiary level. This study, through a qualitative research, explores the beliefs and feelings of BS Mathematics students of De La Salle Lipa about engaging in and learning Mathematics. It presents the change in beliefs of the students particularly those who did not intend to enroll in the said program. The views and feelings expressed by the subjects during a face-to-face interview reflect the kind of experience they have in school. The findings of the study indicate that (negative) beliefs of the students about pursuing mathematics as a program and learning the subject can change with the sound support of the school to provide an encouraging and learning environment. Such can eventually promote positive reception and achievement in the subject among the students.
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
Energy potency could be a major demand in wireless sensing element networks. Media Access management is one in every of the key areas wherever energy potency is achieved by planning such MAC protocol that's tuned to the necessities of the sensing element networks. Applications have different necessities and one MAC protocol can't be best TDMA-based MAC (TDMAC) protocol that is specially designed for such applications that need periodic sensing of the sensing element field. TDMAC organizes nodes into clusters. Nodes send their knowledge to their cluster head (CH) and CHs forward it to the bottom station. CHs removed from the bottom station use multi-hop communication by forwarding their knowledge to CHs nearer than themselves to the bottom station each put down-cluster and intra-cluster communication is only TDMA-based that effectively eliminates each inter cluster further as intra-cluster interference.
Ijaems apr-2016-30 Digital Audio Watermarking using EMD for Voice Message Enc...INFOGAIN PUBLICATION
Several accurate watermarking methods for image watermarking have being suggested and implemented to secure various forms of digital data, images and videos however, very few algorithms are proposed for audio watermarking. This is also because human audio system has dynamic range which is wider in comparison with human vision system. In this paper, a new audio watermarking algorithm for voice message encryption based on Empirical Mode Decomposition (EMD) is introduced. The audio signal is divided into frames and each frame is then decomposed adaptively, by EMD, into intrinsic oscillatory components called Intrinsic Mode Functions (IMFs). The watermark, which is the secret message that is to be sent, along with the synchronization codes are embedded into the extrema of the last IMF, a low frequency mode stable under different attacks and preserving the perceptual quality of the host signal. Based on exhaustive simulations, we show the robustness of the hidden watermark for audio compression, false decryption, re-quantization, resampling. The comparison analysis shows that our method has better performance than other steganography schemes recently reported.
Ijaems apr-2016-26 Development and Validation of Responsible Environmental Be...INFOGAIN PUBLICATION
This study aimed to develop a valid and reliable instrument to measure undergraduate students’ responsible environmental behavior towards solid waste management. Data gathered from 418 undergraduate students provided evidence for validity and reliability of the new instrument consists of 34 behavior items on a six point Likert type scale. Results of the factor analysis with varimax rotation showed that items constituting Responsible Environmental Behavior Scale towards Solid Waste Management (REBS – SWM) were grouped under three subscales: (1) Personality factors; (2) Knowledge on action strategy; and (3) Knowledge on issues. Each item had a factor loading of 0.40 or above with its own scale and the alpha reliability coefficient for all of the three subscales was 0.81. Thus, REBS – SWM is a valid and reliable instrument that can be used in the field of environmental and science education and can be used as basis for management of wastes in school setting.
Ijaems apr-2016-29 Application of STATCOM for Enhancing Steady and Dynamic Pe...INFOGAIN PUBLICATION
The paper presents the application of Static Synchronous Compensator (STATCOM) for enhancing steady and dynamic performance of distribution system with Doubly Fed Induction Generator (DFIG) wind power generation. The mathematical models of STATCOM, wind energy conversion system such as wind, wind turbine, drive train, DFIG, and converter are systematically derived. The dynamic behavior of the power system with STATCOM controller is also investigated by using MATLAB/Simulink. It was found in the simulation results that the STATCOM can improve the dynamic behavior of the system.
Ijaems apr-2016-28 Studying the effect of manager’s Strategic Thinking on Cor...INFOGAIN PUBLICATION
The purpose of this research is to explore the effect of managers' strategic thinking on corporate entrepreneurship. To this end, one main hypothesis and five secondary hypotheses were proposed. This study is descriptive-applicable and Lidka studies (1998) were employed to measure managers' strategic thinking and Robins and Kutler's questionnaire (1996) was used to measure corporate entrepreneurship. The statistical population included 118 managers and employees of a manufacturing company in Kermanshah industrial estate. The research sample was equal to 90 using Cochran formula. The results disclosed that managers' strategic thinking has a positive and significant effect on corporate entrepreneurship and all hypotheses were confirmed
Ijaems apr-2016-23 Study of Pruning Techniques to Predict Efficient Business ...INFOGAIN PUBLICATION
The shopping mall domain is a dynamic and unpredictable environment. Traditional techniques such as fundamental and technical analysis can provide investors with some tools for managing their shops and predicting their business growth. However, these techniques cannot discover all the possible relations between business growth and thus, there is a need for a different approach that will provide a deeper kind of analysis. Data mining can be used extensively in the shopping malls and help to increase business growth. Therefore, there is a need to find a perfect solution or an algorithm to work with this kind of environment. So we are going to study few methods of pruning with decision tree. Finally, we prove and make use of the Cost based pruning method to obtain an objective evaluation of the tendency to over prune or under prune observed in each method.
The Value of Network Neutrality to European ConsumersRené C.G. Arnold
Network neutrality has been a part of policy and public debate for some time now. Various studies have investigated numerous aspects of the issue from regulatory, legal and other perspectives. Interestingly, consumers have largely been neglected. In light of this obvious lack of insight, the present study set out to discover the value of network neutrality to European consumers from various perspectives. To achieve this overarching objective, a mixed-methods approach was used including both qualitative (focus group discussions) and quantitative research methods (online survey including a conjoint analysis). The research was conducted in four carefully selected test areas across Europe: Croatia, the Czech Republic, Greece and Sweden. Just like the report, the executive summary is structured in line with the major questions relating to the value of network neutrality to consumers.
En un Mundo en Red ser auténtico es fundamental para crear sinergias y oportunidades de negocio. Y para ser auténtico, es necesario hacer un trabajo de desarrollo personal.
أشكركم جميعا على المشاركات الهادفة الى تبادل المعارف. الحقيقة إن التغيير هو أمر لا يحدث طوعا سواء كان الأمر يخص الإنسان أو أي منظومه تجاريه أو قوميه, فلابد أن يحدث شيء ما يدفع المنظومة الى تغيير ما دأبت عليه (يسمونه في لغة الأعمال Pain, لأن الألم هو أكبر دافع لتغيير الحال) , بالتالي التغيير من الاعتماد على الاقتصاد الريعي الى اقتصاد إنتاجي و خدمي هو خطوه جاءت في موعدها في الحقيقة, و ما كانت لتأتي لو استمرت أسعار البترول ظلت كما هي .
Como instalar "Xampp en Windows" creando un servidor independiente que es sistema de gestión de bases de datos MySQL, el servidor web Apache y los intérpretes para lenguajes de script: PHP y Perl, en que puede hacer pruebas directas en tu escritorio sin hacerlo directamente en Internet
In 1998, Congress passed the Digital Millennium Copyright Act ("DMCA"). One of the most controversial and litigated elements of the DMCA is its “safe harbor’ protections. Copyright holders tend to hate it, while website operators that allow posting of third party content view it as essential to survival of their business model. DMCA safe harbor is becoming an essential defensive tool in the arsenal of website operators.
FODMAP dieet: ideaal dieet voor mensen met een prikkelbaar darm syndroom (PDS); update voorjaar 2015 door dietist Sigrid vd Marel. Uitleg PDS, FODMAP dieet, verschillende fasen, welke voedingsmiddelen laat je staan, wat heb je nodig en meer.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
A Review on Various Methods of Cryptography for Cyber Securityrahulmonikasharma
In the today’s world of digital communication networks, the privacy and security of the transmitted data has become a basic necessity for communication. Data Security is the science and study of techniques of securing data in computer and communication systems from unknown users, disclosures and modifications. Cyber security issues plays a vital role in moving towards digital information age. Therefore, the encryption and decryption systems have been implemented for protecting information. The internet users are rapidly increasing day by day which causes a lot of cyber-criminals. The security of not only the single system but the entire systems will be ensured by the task of network security and controlled by network administrator. In this paper, an attempt has been made to review the various methods of Cryptography and how these methods will help to secure data from unauthenticated users. This paper has primarily focused on Cyber Security and Cryptographic concepts. This paper has also discusses the various attacks and cryptographic algorithms that are used in various applications of cyber security.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 180
A Brief study on Steganography techniques
Kavitha K J, Pushpalatha O
Asst Prof, Department of ECE, JIT, Davanagere, Karnataka, India
Abstract— As there is a lot of advancement in the field of
internet or communication technology, we have various
means of storing, accessing and distribution of the data in
the digital format. Due to the rapid advancement in this
field has also introduced many challenges to the
researchers to provide security to the information which is
transmitted over the network. The digital information
circulating over the network also includes the medical
information. In order to provide security, confidentiality
and integrity, the steganographic techniques can be
employed. In the section 1, it gives the introduction about
available hiding techniques; the section 2 explains the
various steganography properties, the section 3 gives the
types of steganographic techniques, the section 4 gives the
applications of steganography, the section 5 gives the
quality parameters to be measured for medical information,
and the section 6 gives the steganographic algorithms
available. Finally the section 7 concludes that to prevent
unauthorized access steganography is the suitable
technique.
Keywords— Steganography, security, integrity.
I. INTRODUCTION
Nowadays the technology has rationally developed so that
controlling and dealing out of secret data are done on
internet because of the common usage of internet. The
information needs to be transmitted or exchanged over the
Internet for many purposes. In some cases we may need to
keep the information confidentially. In such cases if we
directly transmit the information, it may be misused by the
hackers and may be used for illegal purpose. To avoid such
cases security can be provided for the information in three
ways [13].
1. Cryptography
2. Steganography
3. Water marking
Each technique is discussed in brief:
Fig.1: Hiding Techniques
Cryptography which is also called as cryptology is
actually derived from Greek word kryptos means that
"hidden, secret".
Cryptography [3] can be defined as a technique of storing
and transmitting data in a particular form so that only those
for whom it is intended can read and process it or in other
words we can define it as a secret writing or encoding of
messages in secret code and decoding of the information
only by the authorized persons.
Cryptography may again classify as:
1. Symmetric Key Cryptography
2. Asymmetric Key Cryptography
Steganography is pronounced STEHG-uh-NAH-gruhf-
ee, from Greek steganos, or "covered," and graphie, or
"writing". It is defined as “hiding of a secret message
within a usual message and the removal of it at its
target” [4]. Steganography is used to hide an encoded
message so that no one doubts it exists. Ideally, anyone
glance over our data will fail to know it contains
translated data.
Steganography can also be classified as:
1. Linguistic
2. Technical which includes audio, text, video and image.
Water marking is a technique of hiding the
information in a cover image. This technique may be
used to verify the authenticity, integrity or in other
words can be used to show the owner ship [5]. The
digital watermark can be broadly classified in to two
types:
Visible watermark
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 181
Invisible watermark
Among the above three hiding techniques, steganography
plays an important role in providing the security to the
information which is exchanged over internet. The
steganography can be implemented as shown below:
Fig.2: Steganography process
II. PROPERTIES OF STEGANOGRAPHY
The following are the some of the key properties of steganography
method which will motivate many of us to use this technique for
protecting the information [1].
Imperceptibility: Imperceptibility is the property in which,
it is very difficult to distinguish between the original and
the steganographic image or information.
Data Payload capacity: This parameter defines the amount
of secret data or number of bits that can be inserted in the
message without [9] degrading the quality of the image.
Robustness: It is the parameter used to measure the degree
of withstanding the ability to avoid the destroying of the
embedded information without affecting the quality of the
cover image.
III. TYPES OF STEGANOGRAPHIC
TECHNIQUES
The techniques used to embed the information can be
broadly classified under two categories:
Spatial domain: It is also called substitution method. In this
steganographic technique, the data that is to be hidden is
directly embedded in the pixels of the image. Least
significant bit (LSB) [7 & 8] method is the most popularly
used spatial domain technique in which it substitutes the
least significant bit of original pixel with the message bit
and the human eye will not be able to detect the hidden
information in the message. Many other spatial domain
methods are also available such as Code word grouping –
palette generation algorithm, Adaptive Steganography,
Steganography Algorithm using Pattern Matching with
External Hardware, Pixel Indicator etc.
Transform domain: this technique is also called frequency
domain technique. In this technique, first the information or
the message is converted into frequency domain [11] and
then in to the transformed image, a confidential data can be
hidden.
In order to perform the conversion from time domain in to
frequency domain, various techniques are available such as
DCT, DWT, and DFT etc. Among all the techniques, DWT
yields better results.
IV. APPLICATIONS OF STEGANOGRAPHY
Nowadays Steganography is widely used in many
applications. Some of the applications are listed below:
Private communication and secret data storing
Security for data modification
Access control system for digital content sharing
And many others
Historically, steganography provides the following:
Potential capability to hide the presence of private data
Very hard to detect the hidden or embedded data
Improving the secrecy of the encoded data
In the field of communication, if we want to transmit some
confidential data, then the first step is to select some
dummy message depending on the size of the data that is to
be embedded. Later the confidential data can be embedded
in the dummy message using some encryption algorithms
along with the key generated. Later to extract the
confidential data, the extraction program can be used with
the help of the same key which was generated during the
process of embedding.
The data that is to be embedded is fragile in most of the
cases, it means that the embedded data can be altered or
undergoes modification [10] by the unauthorized parties. If
it is altered or modified, it is easily detected by the
extraction program.
Nowadays the digital information is becoming more
popular as it can be easily transmitted to many of the
receivers over the internet with free charges. In some case
the information that we need to transmit is very valuable, in
that case simply transmitting the information may be
accessed by illegal people and lead to the misuse of the
information. Especially in case of legal cases, the protection
of information is very important. In such cases, we can
issue a special “access key” in order to extract the
information at the receiver side which is possible with the
help of steganographic techniques.
Among all the above applications, Medical information
transformation [2] is one of the important applications
which are playing an important role nowadays.
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 182
When the higher diagnosis is required from a specialist who
might be at some remote places, in such cases, the
information or the image needs to be transmitted over the
internet. The transmitted information may be misused by
some unauthorized persons. In order to avoid such
possibilities, we can employ steganographic techniques to
protect the information. While applying the technique, care
should be taken to see that the information or the image
should undergo degradation because a small change in the
information or image may lead to the misdiagnosis which
may result in the disastrous result.
Nowadays most of the researchers working on color images
and videos using steganographic techniques. And also work
is going on 3D images also.
V. QUALITY METRICS
Some of the quality parameters have to be used in order to
evaluate the quality of the images. The below paragraph
gives the metrics that are usually used to measure the
quality of the images after embedding the information into
the image.
Peak signal to Noise ration
Structural similarity index
Mean
Median
Bit error rate
Correlation coefficient
VI. STEGANOGRAPHIC ALGORITHMS
The various algorithms are available to perform the
steganographic process. Some of them are listed below
[12]:
Advanced Encryption Standard: The Advanced Encryption
Standard abbreviated as AES is a symmetric block cipher
[6] which is first used by the U.S. government in order to
protect classified information and is implemented in
software and hardware throughout the world to encrypt
sensitive data.
It was introduced in the year 1997 as a successor of Data
encryption standard DES.
International Data Encryption Algorithm: It is abbreviated
as IDEA which was developed first by Zurich, Switzerland.
This algorithm uses a block cipher with 128-bit key and is
considered to be very secure.
SEED: It is a symmetric encryption algorithm developed by
Korea Information Security Agency (KISA) and a group of
experts, in the year 1998. The input/output block size of
SEED is 128-bit and the key length is also 128-bit. A 128-
bit input is divided into two 64-bit blocks and the right 64-
bit block is an input to the round function with a 64-bit sub
key generated from the key scheduling.
Cipher algorithm: It is a mathematical formula which is
designed specifically to ambiguous the value and content of
data. Most valuable cipher algorithms use a key as part of
the formula. This key is used to encrypt the data, and either
that key or a complementary key is needed to decrypt the
data back to a useful form.
VII. CONCLUSION
In the above article we have seen there are many hiding
techniques available. One of them is steganography
technique which is widely used. And also we have seen
some of the algorithms. Using steganography with other
techniques, secureness can be increased for
images/information.
VIII. ACKNOWLEDGMENT
We thank our family members, friends and colleagues for
their support in preparing the paper.
REFERENCES
[1] B. Saha and S. Sharma, “Steganographic Techniques
of Data Hiding Using Digital Images (Review Paper),”
Defence Science Journal, vol. 62, no. 1, pp. 11–18,
Jan. 2012.
[2] P. Kamal and M. Punjab, “Review of Different
Steganographic techniques on Medical images
regarding their efficiency,” vol. 4, 2005.
[3] A. J. Raphael, “Cryptography and Steganography – A
Survey,” vol. 2, no. 3, pp. 626–630.
[4] R. A. Sampaio and M. P. Jackowski, “Assessment of
Steganographic Methods in Medical Imaging,” 1985.
[5] H. V. D. B. Sc, “Available Online at www.jgrcs.info
Steganography , Cryptography , Watermarking : A
Comparative Study,” vol. 3, no. 12, pp. 2010–2012,
2012.
[6] D. K. Sarmah and N. Bajpai, “Proposed System for
data hiding using Cryptography and Steganography,”
pp. 1–8.
[7] M. T. Student, “A SECURE DATA EMBEDDING
TECHNIQUE IN IMAGE STEGANOGRAPHY FOR
MEDICAL IMAGES,” vol. 3, no. 8, pp. 7753–7756,
2014.
4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-4, April- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 183
[8] V. Pandey, “International Journal of Advanced
Research in Computer Science and Software
Engineering Secure Medical Image Transmission
using Combined Approach of Data-hiding ,
Encryption and Steganography,” vol. 2, no. 12, pp.
54–57, 2012.
[9] P. Mortazavian, M. Jahangiri, E. Fatemizadeh, G. Y.
Av, A. Blv, and P. Sq, “ Proceedings of fourth
IASTED International conferece”, Spain,“A LOW-
DEGRADATION STEGANOGRAPHY MODEL,”
pp. 914–920, 2004.
[10]C. P. Sumathi, T. Santanam, and G. Umamaheswari,
“A Study of Various Steganographic Techniques Used
for Information Hiding,” vol. 4, no. 6, pp. 9–25, 2013.
[11]R. Doshi, P. Jain, and L. Gupta, “Steganography and
Its Applications in Security,” vol. 2, no. 6, pp. 4634–
4638, 2012.
[12]M. Umamaheswari, “Analysis of Different
Steganographic Algorithms for Secured Data Hiding,”
vol. 10, no. 8, pp. 154–160, 2010.
[13]C. Science and S. Engineering, “An Overview of
Different Type of Data Hiding Scheme in Image using
Steganographic Techniques,” vol. 4, no. 1, pp. 746–
751, 2014.