This document proposes an adaptive steganography technique for hiding secret data in digital images. The technique uses variable bit length embedding based on wavelet coefficients of the cover image. A logistic map is used to generate a secret key, which determines the RGB color planes and blocks used for data hiding. Wavelet coefficients are classified into ranges, and the number of bits hidden corresponds to the coefficient value range. Extraction involves selecting the same coefficients based on the key and calculating the hidden bits. The technique aims to improve security, capacity and imperceptibility compared to existing constant bit length methods. Evaluation shows the proposed method provides good security since variable bits are hidden randomly using the secret key.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
Steganography gained significance in the past few years due to the increasing need
for providing secrecy in an open environment like the internet. With almost anyone can
observe the communicated data all around, steganography attempts to hide the very existence
of the message and make communication undetectable. In this paper we propose a modern
technique with Integer Wavelet transform (IWT) and double key to accomplish high hiding
capability, high security and good visual quality. Here cover image is transformed in to
wavelet transform co-efficients and the coefficients are selected randomly by using Key-2 for
embedding the data. Key-1 is used to calculate the number of bits to be embedded in the
randomly selected coefficients. Finally the Optimum Pixel Adjustment Process(OPAP) is
applied to the stego image to reduce the data embedding error.
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...IJERA Editor
Digital media, applications, copyright defense, and multimedia security have become a vital aspect of our daily life. Digital watermarking is a technology used for the copyright security of digital applications. In this work we have dealt with a process able to mark digital pictures with a visible and semi invisible hided information, called watermark. This process may be the basis of a complete copyright protection system. Watermarking is implemented here using Haar Wavelet Coefficients and Principal Component analysis. Experimental results show high imperceptibility where there is no noticeable difference between the watermarked video frames and the original frame in case of invisible watermarking, vice-versa for semi visible implementation. The watermark is embedded in lower frequency band of Wavelet Transformed cover image. The combination of the two transform algorithm has been found to improve performance of the watermark algorithm. The robustness of the watermarking scheme is analyzed by means of two distinct performance measures viz. Peak Signal to Noise Ratio (PSNR) and Normalized Coefficient (NC).
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
This article introduces a novel image encryption algorithm based on DNA addition combining and coupled two-dimensional piecewise nonlinear chaotic map. This algorithm consists of two parts. In the first part of the algorithm, a DNA sequence matrix is obtained by encoding each color component, and is divided into some equal blocks and then the generated sequence of Sugeno integral fuzzy and the DNA sequence addition operation is used to add these blocks. Next, the DNA sequence matrix from the previous step is decoded and the complement operation to the result of the added matrix is performed by using Sugeno fuzzy integral. In the second part of the algorithm, the three modified color components are encrypted in a coupling fashion in such a way to strengthen the cryptosystem security. It is observed that the histogram, the correlation and avalanche criterion, can satisfy security and performance requirements (Avalanche criterion > 0.49916283). The experimental results obtained for the CVG-UGR image databases reveal the fact that the proposed algorithm is suitable for practical use to protect the security of digital image information over the Internet.
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
In information transmission such as speech information, higher security and confidentiality are specially required. Therefore, data encryption is a pre-requisite for a secure communication system to protect such information from unauthorized access. A new algorithm for speech encryption is introduced in this paper. It depends on the quantum chaotic map and k-means clustering, which are employed in keys generation. Also, two stages of scrambling were used: the first relied on bits using the proposed algorithm (binary representation scrambling BiRS) and the second relied on k-means using the proposed algorithm (block representation scrambling BlRS). The objective test used statistical analysis measures (signal-to-noise-ratio, segmental signal-to-noise-ratio, frequency-weighted signal-to-noise ratio, correlation coefficient, log-likelihood ratio) applied to evaluate the proposed system. Via MATLAB simulations, it is shown that the proposed technique is secure, reliable and efficient to be implemented in secure speech communication, as well as also being characterized by high clarity of the recovered speech signal.
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
Steganography gained significance in the past few years due to the increasing need
for providing secrecy in an open environment like the internet. With almost anyone can
observe the communicated data all around, steganography attempts to hide the very existence
of the message and make communication undetectable. In this paper we propose a modern
technique with Integer Wavelet transform (IWT) and double key to accomplish high hiding
capability, high security and good visual quality. Here cover image is transformed in to
wavelet transform co-efficients and the coefficients are selected randomly by using Key-2 for
embedding the data. Key-1 is used to calculate the number of bits to be embedded in the
randomly selected coefficients. Finally the Optimum Pixel Adjustment Process(OPAP) is
applied to the stego image to reduce the data embedding error.
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...IJERA Editor
Digital media, applications, copyright defense, and multimedia security have become a vital aspect of our daily life. Digital watermarking is a technology used for the copyright security of digital applications. In this work we have dealt with a process able to mark digital pictures with a visible and semi invisible hided information, called watermark. This process may be the basis of a complete copyright protection system. Watermarking is implemented here using Haar Wavelet Coefficients and Principal Component analysis. Experimental results show high imperceptibility where there is no noticeable difference between the watermarked video frames and the original frame in case of invisible watermarking, vice-versa for semi visible implementation. The watermark is embedded in lower frequency band of Wavelet Transformed cover image. The combination of the two transform algorithm has been found to improve performance of the watermark algorithm. The robustness of the watermarking scheme is analyzed by means of two distinct performance measures viz. Peak Signal to Noise Ratio (PSNR) and Normalized Coefficient (NC).
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
This article introduces a novel image encryption algorithm based on DNA addition combining and coupled two-dimensional piecewise nonlinear chaotic map. This algorithm consists of two parts. In the first part of the algorithm, a DNA sequence matrix is obtained by encoding each color component, and is divided into some equal blocks and then the generated sequence of Sugeno integral fuzzy and the DNA sequence addition operation is used to add these blocks. Next, the DNA sequence matrix from the previous step is decoded and the complement operation to the result of the added matrix is performed by using Sugeno fuzzy integral. In the second part of the algorithm, the three modified color components are encrypted in a coupling fashion in such a way to strengthen the cryptosystem security. It is observed that the histogram, the correlation and avalanche criterion, can satisfy security and performance requirements (Avalanche criterion > 0.49916283). The experimental results obtained for the CVG-UGR image databases reveal the fact that the proposed algorithm is suitable for practical use to protect the security of digital image information over the Internet.
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
In information transmission such as speech information, higher security and confidentiality are specially required. Therefore, data encryption is a pre-requisite for a secure communication system to protect such information from unauthorized access. A new algorithm for speech encryption is introduced in this paper. It depends on the quantum chaotic map and k-means clustering, which are employed in keys generation. Also, two stages of scrambling were used: the first relied on bits using the proposed algorithm (binary representation scrambling BiRS) and the second relied on k-means using the proposed algorithm (block representation scrambling BlRS). The objective test used statistical analysis measures (signal-to-noise-ratio, segmental signal-to-noise-ratio, frequency-weighted signal-to-noise ratio, correlation coefficient, log-likelihood ratio) applied to evaluate the proposed system. Via MATLAB simulations, it is shown that the proposed technique is secure, reliable and efficient to be implemented in secure speech communication, as well as also being characterized by high clarity of the recovered speech signal.
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONcsandit
In the past, Ad-hoc networks were used in limited areas which require secure group communication without Internet access, such as the army or emergencies. However, Ad-hoc networks currently are widely used in variety applications like group chat, smart applications, research testbed etc. Ad-hoc network is basically group based network in the absence of access point so it is prevalent to provide group key approach to prevent information leakage. When we use group key approach, we need to consider which group key management method is the most suitable for the architecture because the cost and frequency of the rekeying operation remain as an unresolved issue. In this paper, we present analysis about existing group key management solutions for Ad-hoc network and suggest a new approach to reduce frequency of the rekeying operation.
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...idescitation
Many network simulators (e.g., ns2) are already
being used for performing wired and wireless network
simulations. But, with the current graphical visualization
support in-built in ns2, it is difficult to understand the node
status, packet status and the MAC level events particularly
for Ad-hoc networks. In this paper, we extend the visualization
support in ns-2 that should help research community in the
area of wireless networks to analyze different MAC level
events in an efficient manner. In particular, we have developed
two types of visualizations namely, temporal and spatial.
Temporal visualization helps to analyze success or failure of
a packet with respect to time while spatial visualization helps
to understand the effects due to proximity of nodes. The trace
is made highly configurable in terms of different attributes
like specific nodes and time duration.
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
The MAC architecture is used in real time digital signal processing and multimedia information
processing which requires high throughput. A novel method to estimate the transition activity at
the nodes of a multiplier accumulator architecture based on modified booth algorithm
implementing finite impulse response filter is proposed in this paper. The input signals are
described by a stationary Gaussian process and the transition activity per bit of a signal word is
modeled according to the dual bit type (DBT) model. This estimation is based on the
mathematical formulation by multiplexing mechanism on the breakpoints of the DBT model.
HRNET : Deep High-Resolution Representation Learning for Human Pose Estimationtaeseon ryu
안녕하세요 딥러닝 논문읽기 모임 입니다! 오늘 소개 드릴 논문은 Deep High-Resolution Representation Learning for Human Pose Estimation 라는 제목의 논문입니다.
오늘 소개드릴 논문은 Pose Estimation에 관련된 논문 입니다. 기존 Pose Estimation 모델의 경우 직렬적인 네트워크 구조를 지녔지만, 직렬적인 구조는 압축하는 과정에서
지엽적인 정보들의 손실을 가져오게 되고 모든 프로세스가 upsampling에 과도하게 의존하고 있다는 한계점을 가지고 있습니다.그래서 이러한 한계점을 극복하고자HRNet은 이러한 직렬 구조에서 벗어나 병렬 구조로 subnetwork를 구성했습니다.
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Chaos Image Encryption using Pixel shuffling cscpconf
The advent of wireless communications, both inside and outside the home-office environment
has led to an increased demand for effective encryption systems. The beauty of encryption
technology comes out in more pronounced way when there is no absolute relation between
cipher and original data and it is possible to rebuild the original image in much easier way. As
chaotic systems are known to be more random and non-predictable, they can be made utilized in
achieving the encryption. The transposition technology of encryption systems requires scrambleness
behaviour in order to achieve the encryption of the data. This scrambleness behaviour can
be derived from the randomness property of chaos which can be better utilized in the techniques
like transposition system. In wireless communication systems, bandwidth utilization is an important
criterion. In order to use encryption system in wireless communication; key space plays an
important role for the efficient utilization of the bandwidth. In this paper we present a chaosbased
encryption algorithm for images. This algorithm is based on pixel scrambling where in the
randomness of the chaos is made utilized to scramble the position of the data. The position of the
data is scrambled in the order of randomness of the elements obtained from the chaotic map and
again rearranged back to their original position in decryption process. The same algoritm is
tested with two different maps and performance analysis is done to select best suited map for encription.
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
Multiple-input multiple-output (MIMO) systems have been widely acclaimed in order to provide high data rates. Recently Lattice Reduction (LR) aided detectors have been proposed to achieve near Maximum Likelihood (ML) performance with low complexity. In this paper, we develop the fixed point design of an iterative soft decision based LR-aided K-best decoder, which reduces the complexity of existing sphere decoder. A simulation based word-length optimization is presented for physical implementation of the K-best decoder. Simulations show that the fixed point result of 16 bit precision can keep bit error rate (BER) degradation within 0.3 dB for 8×8 MIMO systems with different modulation schemes.
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
When it comes to Google, we’re all on the sometimes gentle, sometimes not so gentle learning curve. This presentation is a snapshot-in-time of how we integrate Google and in particular the Hangouts as part of our communication and collaboration strategies. Comments are welcome and so are embeds, likes and shares.
Wiki
http://planeta.wikispaces.com/google
http://planeta.wikispaces.com/googleplus
http://planeta.wikispaces.com/hangout
This presentation shares lessons learned using LinkedIn. As the motto goes: ‘If you're not tapping in, you're missing out.’ This presentation features screenshots, artwork and worksheets. You are welcome to adapt and reuse the materials with the attribution-sharealike license. We welcome your interaction -- comments, questions, suggestions, shares, clips, favorites, likes and hearts.
Wiki
http://planeta.wikispaces.com/linkedin
Key Links
https://www.linkedin.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
REDUCING FREQUENCY OF GROUP REKEYING OPERATIONcsandit
In the past, Ad-hoc networks were used in limited areas which require secure group communication without Internet access, such as the army or emergencies. However, Ad-hoc networks currently are widely used in variety applications like group chat, smart applications, research testbed etc. Ad-hoc network is basically group based network in the absence of access point so it is prevalent to provide group key approach to prevent information leakage. When we use group key approach, we need to consider which group key management method is the most suitable for the architecture because the cost and frequency of the rekeying operation remain as an unresolved issue. In this paper, we present analysis about existing group key management solutions for Ad-hoc network and suggest a new approach to reduce frequency of the rekeying operation.
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...idescitation
Many network simulators (e.g., ns2) are already
being used for performing wired and wireless network
simulations. But, with the current graphical visualization
support in-built in ns2, it is difficult to understand the node
status, packet status and the MAC level events particularly
for Ad-hoc networks. In this paper, we extend the visualization
support in ns-2 that should help research community in the
area of wireless networks to analyze different MAC level
events in an efficient manner. In particular, we have developed
two types of visualizations namely, temporal and spatial.
Temporal visualization helps to analyze success or failure of
a packet with respect to time while spatial visualization helps
to understand the effects due to proximity of nodes. The trace
is made highly configurable in terms of different attributes
like specific nodes and time duration.
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
Fault tolerance and data security are two important issues in modern communication systems.
In this paper, we propose a secure and efficient digital signature scheme with fault tolerance
based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains
three prime numbers and overcome several attacks possible on RSA. By using the Chinese
Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption
side and it provides high security also.
The MAC architecture is used in real time digital signal processing and multimedia information
processing which requires high throughput. A novel method to estimate the transition activity at
the nodes of a multiplier accumulator architecture based on modified booth algorithm
implementing finite impulse response filter is proposed in this paper. The input signals are
described by a stationary Gaussian process and the transition activity per bit of a signal word is
modeled according to the dual bit type (DBT) model. This estimation is based on the
mathematical formulation by multiplexing mechanism on the breakpoints of the DBT model.
HRNET : Deep High-Resolution Representation Learning for Human Pose Estimationtaeseon ryu
안녕하세요 딥러닝 논문읽기 모임 입니다! 오늘 소개 드릴 논문은 Deep High-Resolution Representation Learning for Human Pose Estimation 라는 제목의 논문입니다.
오늘 소개드릴 논문은 Pose Estimation에 관련된 논문 입니다. 기존 Pose Estimation 모델의 경우 직렬적인 네트워크 구조를 지녔지만, 직렬적인 구조는 압축하는 과정에서
지엽적인 정보들의 손실을 가져오게 되고 모든 프로세스가 upsampling에 과도하게 의존하고 있다는 한계점을 가지고 있습니다.그래서 이러한 한계점을 극복하고자HRNet은 이러한 직렬 구조에서 벗어나 병렬 구조로 subnetwork를 구성했습니다.
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.
Chaos Image Encryption using Pixel shuffling cscpconf
The advent of wireless communications, both inside and outside the home-office environment
has led to an increased demand for effective encryption systems. The beauty of encryption
technology comes out in more pronounced way when there is no absolute relation between
cipher and original data and it is possible to rebuild the original image in much easier way. As
chaotic systems are known to be more random and non-predictable, they can be made utilized in
achieving the encryption. The transposition technology of encryption systems requires scrambleness
behaviour in order to achieve the encryption of the data. This scrambleness behaviour can
be derived from the randomness property of chaos which can be better utilized in the techniques
like transposition system. In wireless communication systems, bandwidth utilization is an important
criterion. In order to use encryption system in wireless communication; key space plays an
important role for the efficient utilization of the bandwidth. In this paper we present a chaosbased
encryption algorithm for images. This algorithm is based on pixel scrambling where in the
randomness of the chaos is made utilized to scramble the position of the data. The position of the
data is scrambled in the order of randomness of the elements obtained from the chaotic map and
again rearranged back to their original position in decryption process. The same algoritm is
tested with two different maps and performance analysis is done to select best suited map for encription.
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
Multiple-input multiple-output (MIMO) systems have been widely acclaimed in order to provide high data rates. Recently Lattice Reduction (LR) aided detectors have been proposed to achieve near Maximum Likelihood (ML) performance with low complexity. In this paper, we develop the fixed point design of an iterative soft decision based LR-aided K-best decoder, which reduces the complexity of existing sphere decoder. A simulation based word-length optimization is presented for physical implementation of the K-best decoder. Simulations show that the fixed point result of 16 bit precision can keep bit error rate (BER) degradation within 0.3 dB for 8×8 MIMO systems with different modulation schemes.
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
When it comes to Google, we’re all on the sometimes gentle, sometimes not so gentle learning curve. This presentation is a snapshot-in-time of how we integrate Google and in particular the Hangouts as part of our communication and collaboration strategies. Comments are welcome and so are embeds, likes and shares.
Wiki
http://planeta.wikispaces.com/google
http://planeta.wikispaces.com/googleplus
http://planeta.wikispaces.com/hangout
This presentation shares lessons learned using LinkedIn. As the motto goes: ‘If you're not tapping in, you're missing out.’ This presentation features screenshots, artwork and worksheets. You are welcome to adapt and reuse the materials with the attribution-sharealike license. We welcome your interaction -- comments, questions, suggestions, shares, clips, favorites, likes and hearts.
Wiki
http://planeta.wikispaces.com/linkedin
Key Links
https://www.linkedin.com
Christmas Bingo collects commonly used words around the world for the Christmas celebration
Details
http://planeta.wikispaces.com/christmas
Also see ... Christmas in Oaxaca, Mexico
http://oaxaca.wikispaces.com/navidad
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Journals
Abstract F5 Steganography is way totally different from most of LSB replacement or matching steganographic schemes, as a result of matrix encryption is used to extend embedding potency while reducing the amount of necessary changes. By victimisation this theme, the hidden message inserted into carrier media observably is transferred via a safer imperceptible channel. The embedding domain is that the quantitative DCT coefficients of JPEG image, which makes the theme, be proof against visual attack and statistical attack from the steganalyst. Based on this effective theme, An extended matrix encoding algorithm is planned to improve the performance further in this paper. The embedding potency and embedding rate get accrued to large extent by changing the hash function in matrix encryption and changing the coding mode. Eventually, the experimental results demonstrate the extended algorithm is more advanced and efficient to the classic F5 Steganography.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
- Steganography is the art and science of invisible communication as it hides the information message
inside cover image In This paper the cover image is decomposed using multilevel wavelet transform and theses
wavelet coefficients are statistically weighted according to their perceptual importance (CSF weights) to identify
the regions of interest for the embedding. The hiding image is encrypted using secret key based on wavelet
coefficients on the last approximation level. Then the encrypted watermark is embedded using CSF weights in
the wavelet domain into the cover image. Experimental results denote the feasibility of the proposed method as
the stego images has high PSNR and subjective quality which declare that the algorithm gains a good
performance in transparency and robustness against noise attacks.
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data communication.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
Image Steganography Using Wavelet Transform And Genetic AlgorithmAM Publications
This paper presents the application of Wavelet Transform and Genetic Algorithm in a novel
steganography scheme. We employ a genetic algorithm based mapping function to embed data in Discrete Wavelet
Transform coefficients in 4x4 blocks on the cover image. The optimal pixel adjustment process is applied after
embedding the message. We utilize the frequency domain to improve the robustness of steganography and, we
implement Genetic Algorithm and Optimal Pixel Adjustment Process to obtain an optimal mapping function to
reduce the difference error between the cover and the stego-image, therefore improving the hiding capacity with
low distortions. Our Simulation results reveal that the novel scheme outperforms adaptive steganography technique
based on wavelet transform in terms of peak signal to noise ratio and capacity, 39.94 dB and 50% respectively.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Ijcatr04021016
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 170 - 174, 2015, ISSN:- 2319–8656
www.ijcat.com 170
Adaptive Steganography Based on Logistic Map
Fariba Ghorbany Beram
Sama Technical and Vocational Training College
Islamic Azad University,
Masjedsoleyman Branch, Masjedsoleyman,
Iran
Sajjad Ghorbany Beram
Sama Technical and Vocational Training College
Islamic Azad University,
Masjedsoleyman Branch, Masjedsoleyman,
Iran
Abstract:
umerous novel algorithms have been proposed in the fields of steganography with the goals of increase security,capacity and
imperceptibility. In this paper, we introduced a new blind adaptive algorithm in image steganography technique to Improving that
goals. The existing methods hide the information using constant bit length in integer wavelet coefficients. This paper uses variable bit
length based on float wavelet coefficients to hide the data in a particular positions using secret key. The proposed method try to obtain
an optimal mapping function to reduce the difference error between original coefficients values and modified values. we provided with
the double security by using a secret key only known to both sender and receiver, therefore improving goals compared to the existing
algorithm.
Keywords: Steganography; Security; Logistic Map; capacity; image
1. INTRODUCTION
over the last decade, one of the most significant current
discussions in computer science is the field of information
security. In general, information security is the techniques,
policies and strategies used to protect and secure computer
systems, in maintaining the operations of an organization. One
of the concerns in information security is the concept of
information hiding. It is the process of embedding information
into digital content without causing perceptual degradation.
Steganography of current information hiding has shown that
steganography is one of the recent important subdisciplines.
This is because most of the proposed information hiding
system is designed based on steganography. Today,
steganography is most often associated with the high-tech
application where data are hidden with other information in an
electronic file[1]. Generally speaking, a good steganographic
technique should have good visual imperceptibility and a
sufficient capacity of hidden secret data[2]. Steganographic
methods can be classified into spatial domain embedding and
frequency domain embedding[3,4]. Almost all digital file
formats can be used for steganography, but the image and
audio files are more suitable because of their high degree of
redundancy [5].
2. RELATED WORKS
In this section we introduce some of the methods described
Steganography . For this purpose, two groups of methods in
the spatial domain and transform domain techniques will be
examined.In the spatial domain techniques, secret messages
are placed in a carrier media, without prior information
hiding, on a carrier medium, the conversion will be done.
Confidential data is actually placed directly on the carrier
media. One of the first Steganography techniques, using the
least significant bits of the carrier media. The use of this
technique for placement of confidential information on a
carrier media, not a tangible change in the media.
Steganography the images presented in lots of different
techniques, the goal of all of them is the availability of high
capacity, security, and resistance. These three criteria are in
conflict with each other and simultaneously achieve all three
simultaneously is very difficult and perhaps impossible. Three
objectives are stated at the three vertices of a triangle. The
matter requires attention to each other and not all of these
parameters simultaneously met in the best way.Wavelet
transform gives the best result for image transformation[6].
the frequency domain transform we applied in this research is
Haar-DWT, the simplest DWT. A 2-dimensional Haar-DWT
consists of two operations: Discrete Wavelet Transformation
has its own excellent space frequency localization property.
Applying DWT in 2D images corresponds to 2D filter image
processing in each dimension. The input image is divided into
4 non-overlapping multi-resolution sub-bands by the filters,
namely LL1 (Approximation coefficients), LH1 (vertical
details), HL1 (horizontal details) and HH1 (diagonal details).
The sub-band (LL1) is processed further to obtain the next
coarser scale of wavelet coefficients, until some final scale
“N” is reached. When “N” is reached, we’ll have 3N+1 sub-
bands consisting of the multi-resolution sub-bands (LLN) and
(LHX), (HLX) and (HHX) where “X” ranges from 1 until
“N”. Generally most of the Image energy is stored in these
sub-bands[7,8,9,10]. The least significant bit (LSB) insertion
method is the most common and easiest method for
embedding messages in an image in spatial domain but it has
some limitations such as it is easier to understand using
steganalysis[11,12]. Variable Embedding Ratio and LSB is
used in [13]. paper[14] proposes a method for image
steganography. The chosen Variable Embedding Ratio [VER]
is 4:2 that is 4 bits are embedded in edge pixels and 2 bits in
other pixels.In[15] uses variable bit length based on integer
wavelet coefficients to hide the data in a particular positions
using secret key by LSB substitution method. In smooth areas
they embed three bits of secret information. In the
complicated areas, variable rate bits are embedded[16].
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 170 - 174, 2015, ISSN:- 2319–8656
www.ijcat.com 171
3. SECRET KEY
we use chaos theory to produce secret key. The name "chaos
theory" comes from the fact that the systems that the
theory describes are apparently disordered, but chaos
theory is really about finding the underlying order in
apparently random data. The nonlinear dynamics
researchers have observed an interesting relationship
between chaotic behavior and Random number generator
systems as many properties of the chaotic systems such
as their sensitivity to initial conditions can be considered
to the confusion in generation of secret keys.
Deterministic pseudorandom numbers are used for the
generation of secret key in cryptography system. The
logistic map is a very simple mathematical model often
used to describe the growth of biological populations. The
simple mathematical form of the logistic map is given as
[17]:
(1)
Xn+1=r.xn(1-xn)
xn is the state variable being in the interval [0, 1] and r
is system parameter which might have any value between 1
and 4. In this paper we have used the logistic function to
generate the secret key. If this function is quite Chaotic
behavior, you would have x0=0.3 amnd 3.57<r<4.
4. PROPOSED METHOD
wavelet transform is applied to the cover image to get the
wavelet coefficients. the wavelet coefficients is splitted into
RGB planes .The obtained wavelet coefficients from the RGB
planes, select one or two or three planes according to the
secret key and Each selected plane is decomposed into m*m
blocks according to the secret key.Range, the number of bits
that can be replaced, between 1 to logarithm biggest
coefficient value. According to the value of coefficients, the
number of bits replaced The secret message is determined. It
makes Optimal Use of the Wavelet Coefficients. While fewer
number of coefficients are modified, More bits can be
replaced. After replacement, inverse wavelet transform
applied to restore the image (Fig 1).
4.1 Embedding procedure:
cover image is splitted into R, G, B planes .
Each RGB is converted into frequency domain by using Haar
wavelet transform.
Select RGB plans based on secret key .
selected RGB plane is decomposed into blocks based on
secret key .
Value of wavelet coefficient are classified
{D=2n-1
–2n
-1,n =log (coefficient)}D is range value of
wavelet coefficient, n-1 is number of secret data bits to be
embedded and coefficient is value of wavelet coefficient
,dec(n) is the decimal value of secret data bits.
If 2n-1
< coefficient <2n
-1 then
(2n
–dec(n bit of secret data))/2
1) Determine the inverse wavelet
transform(idwt) on each RGB planes to restore the
image.
4.2 Extraction procedure:
1) stego image is splitted into RGB planes .
2) Select RGB plans based on secret key .
3) Each RGB is converted into frequency
domain by using Haar wavelet transform.
4) Each RGB plane selected is decomposed
into blocks.
5) Select blocks based on secret key.
6) Value of wavelet coefficient are
classified :
If 2n-1
< coefficient <2n
-1 then
x=( 2n
– coefficient)*2
message[]=dec2bin(x)
coefficient is value of wavelet coefficient stego image and
message is data extraction from stego image .
If coefficient=18 and secret message is 111011 then
16<23<32 ,n=5, number of bits is 4.select 4 bits of
secret message(1110) .dec(1110) is 14.
32-14/2=25
We put 25 instead of 23 in the picture .
For extract,if stego coefficient is 25 then
16<25<32
Secret mesage=dec2bin((32-25)*2)= dec2bin(14)=1110
So we had to replace bits that just were extracted.
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 170 - 174, 2015, ISSN:- 2319–8656
www.ijcat.com 172
Fig 1. Proposed Block Diagram Data Embedding
5. RESULTS AND DISCUSSION
My proposed algorithm was implemented in MATLAB and
are tested with many colored images. In this paper We
selected 512x512 “Lena” jpeg image to perform our testing.
Fig 2 has been shown cover image, Fig 3 has been shown
stego image. The performance of various steganographic
methods can be rated by the three parameters:
security,capacity and imperceptibility. The steganographic
methods proposed in this paper are very secure as variable
number of bits are hidden in different coefficient of wavelet.
This method embeds secret information in a random order
using a secret key only known to both sender and receiver So
it is very difficult to find out the hidden data from the stego
image. The same stego image can also bear different secret
image for different receiver depending on their secret key.
Capacity means the amount of message that can be embedded.
Table I, show Average PSNR values and Embedding Rate
achieved using standard images.
Table I. Average PSNR values achieved using standard
images
Embedding
Rate
0.01 0.02 0.05 0.20 0.25 0.35
PSNR 64 61 55 49 48 46
Fig 2.Cover Image Stego image
Fig3 indicative of the blue before placing a secret message in
an image and then paste the information is confidential,
tangible change in the color chart, as we will be created.
Fig 3. blue before and after placement
In the proposed algorithm [18] The image edges are detected
by using the cany operator. In this way, four bits per pixel that
are on the edge, and two bits in the others pixels are hidden
hidden. Since a variable number of bits of the secret message
in different parts of the image data, the method is safe, Because
if that person is suspected of carrying forward the media until
the algorithm is not available, the least significant bits of the
secret message can not be retrieved. The disadvantage of the
method is to extract the secret message from the carrier at
destination media, the media must also be present. We have the
advantage of variable bit rate method [18] in the proposed
algorithm, we use the other hand to eliminate the disadvantage
of my method.
Compare the signal to noise of the proposed method and
algorithm [18] shown in Fig 4. As we observe the same
replacement rate, the proposed algorithm provides better
results.
Fig4. compares the psnr in the replacement rate of 262,144
If Steganography image H1 and original image H ,HWIDTH,
HLEN number of rows and columns of the image are
calculated PSNR and MSE of the Equation (2) , Equation (3) is
calculated.
(2)
MSE=
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 170 - 174, 2015, ISSN:- 2319–8656
www.ijcat.com 173
(3)
PSNR=10*
The mean square error (MSE) is reduced, the image
quality was high. Low value, the maximum amount of signal to
noise ratio (PSNR) of the carrier image is of poor quality
6. CONCLUSION
In this paper we proposed a data hiding scheme that hides data
into the float wavelet coefficients of an image. The system
combines a float wavelet transform and the variable rate of
embedding to maximize performance of steganographic
method proposed. Because of the the chaos system is used, the
proposed method is secure.
entirely By using this method the data hiding capacity is
improved and secrecy of the embedded data bits can be
provided. It is also seen that the stego image formed is of
good quality. Future work may be carried out to increase the
capacity and enhance the visual quality of the stego image by
improving the PSNR value . The methods proposed in this
paper are:
very secure
capacity is good.
PSNR obtained is approximately maximum
compared to the existing algorithm which confirm
imperceptibility of the host and the stego image.
The proposed system also reduces the difference
between original coefficients values and modified
values by using the adaptive float coefficient
adjustment.
Blind steganogeraphy method
7. REFERENCES
[1] Roshidi Din and Azman Samsudin,” Digital
Steganalysis: Computational Intelligence Approach”,
INTERNATIONAL JOURNAL OF COMPUTERS Issue
1, Volume 3, 2009
[2] Arun Rana, Nitin Sharma, Amandeep Kaur,” IMAGE
STEGANOGRAPHY METHOD BASED ON
KOHONEN NEURAL NETWORK”, International
Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue
3, May-Jun 2012, pp.2234-2236
[3] Souvik Bhattacharyya, Indradip Banerjee and Gautam
Sanyal,”A Survey of Steganography and Steganalysis
Technique in Image, Text, Audio and Video as Cover
Carrier”, Journal of Global Research in Computer
Science ISSN:2229-371X www.jgrcs.info, Volume 2,
No. 4, April 2011
[4] Lifang Yu, Yao Zhao, Rongrong Ni
(EURASIPMember), and Ting Li,”Improved Adaptive
LSB Steganography Based on Chaos and Genetic
Algorithm”, EURASIP Journal on Advances in Signal
Processing,Volume 2010, Article ID 876946, 6 pages
[5] Souvik Bhattacharyya, Gautam Sanyal,”A Robust Image
Steganography using DWT Difference Modulation
(DWTDM)”, I. J. Computer Network and Information
Security, 2012, 7, 27-40 Published Online July 2012 in
MECS (http://www.mecs-press.org/) DOI:
10.5815/ijcnis.2012.07.04
[6] Saddaf Rubab, M. Younus,” 29 Improved Image
Steganography Technique for Colored Images using
Wavelet Transform”, International Journal of Computer
Applications (0975 – 8887) Volume 39– No.14,
February 2012
[7] Po-Yueh Chen* and Hung-Ju Lin,”A DWT Based
Approach for Image Steganography”, International
Journal of Applied Science and Engineering 2006. 4, 3:
275-290
[8] Tanmay Bhattacharya, Nilanjan Dey, S. R. Bhadra
Chaudhuri,”A Session based Multiple Image Hiding
Technique using DWT and DCT”, International Journal
of Computer Applications (0975 – 8887) Volume 38–
No.5, January 2012
[9] S. Jayasudha,” Integer Wavelet Transform based
Steganographic Method using OPA Algorithm”,
International Conference on Computing and Control
Engineering (ICCCE 2012), 12 & 13 April, 2012
[10] N S T Sai, R C Patil,” Image Retrieval using DWT with
Row and Column Pixel Distributions of BMP Image”, N
S T Sai et al. / (IJCSE) International Journal on
Computer Science and Engineering ,Vol. 02, No. 08,
2010, 2559-2566
[11] Dr. Mohammed Abbas Fadhil Al-
Husainy,”COMPARISON STUDY BETWEEN
CLASSIC-LSB, SLSB AND DSLSB IMAGE
STEGANOGRAPHY”, ICIT 2013 The 6th International
Conference on Information Technology
[12] S.Shanmuga Priya, K.Mahesh,
Dr.K.Kuppusamy,”Efficient Steganography Method to
Implement Selected Lease Significant Bits in Spatial
Domain (SLSB – SD)”, International Journal of
Engineering Research and Applications (IJERA) ISSN:
2248-9622
[13] Tanmay Bhattacharya, Bikash Debnath,S. R. Bhadra
Chaudhuri,” A Session based Spatial Domain Multiple
Image Hiding Technique using Variable Bit Replacement
and Multiple Passwords”, International Journal of
Computer Applications (0975 – 8887) Volume 56–
No.13, October 2012
[14] Geetha C.R, H. D. Giriprakash,” Image Steganography
by Variable Embedding and Multiple Edge Detection
using Canny Operator”, International Journal of
Computer Applications (0975 – 888) Volume 48– No.16,
June 2012
[15] Sumanth Sakkara.,Akkamahadevi D.H, K. Somashekar,”
Integer Wavelet based Secret Data Hiding By Selecting
Variable Bit Length”, International Journal of Computer
Applications (0975 – 888) Volume 48– No.19, June 2012
[16] Moazzam Hossain, Sadia Al Haque, and Farhana
Sharmin,” Variable Rate Steganography in Gray Scale
Digital Images Using Neighborhood Pixel Information”,
The International Arab Journal of Information
Technology, Vol. 7, No. 1, January 2010
[17] Grummt, E., Ackermann, R.: Proof of Possession:
Using RFID for large-scale Authorization
Management.
In: Mhlhuser, M., Ferscha, A., Aitenbichler, E. (eds.)
Constructing Ambient Intelligence, AmI-07
Workshops
5. International Journal of Computer Applications Technology and Research
Volume 4– Issue 2, 170 - 174, 2015, ISSN:- 2319–8656
www.ijcat.com 174
Proceedings. Communications in Computer and
Information Science, pp. 174, 182 (2008)
[18] Geetha C, Giriprakash H.2012. image steganography by
variable embedding and multiple edge detection using
canny operator . International Journal of Computer
Applications (0975 – 888) 48:15-19