SlideShare a Scribd company logo
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 78
High Capacity and Optimized Image Steganography
Technique based on Ant Colony Optimization Algorithm
A. Priya
Alagappa University, Tamilnadu, India.
Abstract
The tremendous development of digital technology, it is mandatory to address the security
while transmitting information over network in a way that observer couldn’t depict it.
Measures to be taken to provide the security by establishing hidden communication using
steganography principle which is help to camouflage the secret information in some carrier
file such as text, image, audio and video. In this era of hidden data communication, image
becoming an effective tool on account of their frequency, capability and accuracy. Image
steganography uses an image as a carrier medium to hide the secret data. The main motive of
this article is that the uses the combination of frequency domain and optimization method
inorder to increasing in robustness. In this article, Integer Wavelet transform is performed into
the host image and coefficients have been transformed. ACO optimization algorithm is used
to find the optimal coefficients where to hide the data. Furthermore, sample images and
information having been demonstrated which proved the increased robustness as well as high
level of data embeddingcapacity.
Keywords: Security, Image, steganography, IWT, ACO (Ant Colony Optimization)
algorithm.
1. Introduction
Cryptographic techniques afford the confidentiality and security by reducing the
prospect of adversaries [1]. There are two processes in cryptography such as: a) Encryption
and b) Key management process. Each security system must supply some security process
that guarantees the secrecy of the system [2]. Cryptography is grouped into Symmetric Key
and Asymmetric Key Cryptography [3]. In Symmetric key cryptography, a single key is used
for both encryption and decryption [4]. The Asymmetric Key Cryptography uses different
keys for both processes [5]. In session key; the symmetric key can be changed every time in
communication between two parties. It is randomly generated and valid for only one session
[6-8]. If an attacker gets the session key, he/she can decrypt only the messages for a particular
session.Ifbothpartiesalwaysusedthesamekeyforallsessions,theattackerwouldbeable
to decrypt all messages encrypted with this key [9-12]. The underlying mathematical problem
of a public-key cryptosystem determines the efficiency of the cryptosystem in a way. Because
these problems dictate the sizes of domain parameters and keys, which in turn affect the
performance of the arithmetic operations of the public-key crypto algorithms [13-15].
Steganography is the art and science of secret communication between two
parties over a public medium that is not detectable by an observer. Steganography is a close
cousin of cryptography which is the art and science of secret communication.
Cryptography aims to conceal the content of the message whereas steganography hides
the very existence of secretive communication as well [17]. For example, figure 1 shows that
two users want to sharing information between them. But noticer is examining that
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 79
communication via Internet Service Provider or local server. To protect this communication,
steganography provide a model in which sender A wish to send message M to receiver B.
Sender embed M over the cover media C and obtained stego object S then sent it over the
insecure channel. The terms cover object is defined as various types of multimedia objects are
used to hide the data and stego object is known as which object embedded the secret
information[18].
Effective characteristics of steganography [20];
1. Secrecy : With the allowing of intend users, extracting the hidden
information[34-37]
2. Imperceptions: The ability to be completely undetectable [38-40]
3. Capacity: Maximum length of the hidden information which can be
embedded in cover object.
4. Accuracy: Extracting of the embedded data should beaccurate.
Steganography techniques are classified into two types which are spatial domain and
frequency domain techniques. In spatial domain, processing is data hidden directly on the
pixel values of the image and in frequency domain, image is transformed then data is hidden
on the transformed coefficients [21]. Some of the spatial domain techniques are LSB, PVD,
EBE, RPE, PMM and Pixel intensity based etc. and some of the frequency domain techniques
are DCT, DWT, DFT, IWT and DCVT [22]. Specifically, spatial domain techniques are
susceptible to visual attack and pixel alteration [23]. When comparing to spatial domain,
transform domain techniques are more robustness because of its hiding scheme in significant
areas of cover images [24-28]. Integer wavelet transform (IWT) maps an integer data set into
another integer data set . In discrete wavelet transform, the used wavelet filters have floating
point coefficients so that when we hide data in their coefficients any truncations of the
floating point values of the pixels that should be integers may cause the loss of the hidden
information which may lead to the failure of the data hiding system[29].
The remaining of the paper is constructed as below: Relevant works have discussed in
section 2. In section 3, explain the workflow of proposed method include algorithms. In
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 80
Section 4, prove the proposed method has increasing in robust and level of capacity by carried
out the experiment on sample image and secret data. Finally, Section 5 concludes the article.
2. Related Work
Discrete Wavelet Transforms are used in JPEG2000 image format and several
methods embed information using Integer Wavelet Transform Coefficients. Lai and
Chang proposed an adaptive data hiding method in the frequency domain [30]. Seyyedi
et al. in [22] proposed a high volume payload and secure steganography technique
based on integer wavelet transform. Ghasemi et al. combined Genetic Algorithm (GA),
OPAP and Integer Wavelet Transforms to reduce distortion while delivering high
embedding capacity in[23].
N. Vinothkumar et al [24] have been suggested to embed the data over image on the
basis of the combination IWT with Optimal pixel Adjustment Process (OPAP). The method
use IWT to transform the coefficients on cover image and OPAP is used to raise the level of
hiding capacity. Result shows that minimize difference error betwixt original and encoded
image.
Ching-Sheng Hsu et al [25] have been proposed method to determined the optimal
LSB substitution using ACO algorithm . This method embeds the data into the last bits of the
cover image. Moreover, generate optimal matrix with the help of ACO algorithm to conceal
the data at the optimal values.
Rafael Lima de Carvalho et al [26] have been used optimization principle to hide the
secret message into the target picture. Optimization done by PSO algorithm and produce
better result than classical GA basedmethod.
Amanjot Kaur et al [27] have been proposed algorithm which finding an optimal
block on image may be the best position to hide the data. The fitness function to be taken
where ratio is maximize of sum of contrast and energy and entropy and homogeneity. Results
prove that this algorithm showing superiority than PSOalgorithm.
3. ProposedMethod
3.1 Overview
The proposed method is splitted into two subsequent parts such as using IWT for
transforming coefficients and ACO to find the best values for embedding. In the first part of
proposed method, input the color image as carrier and extracting three RGB color
components [31]. Integer wavelet transform is applied on these components and results
showing transformed coefficients. Second part concerned the Ant Colony Optimization
algorithm which inspired the behavior of ants. These ants deposited pheromone on the path to
discover shortest best path from nest to food. More pheromone on path increases, that path
followed by every other ants of the colony. Ant Colony Optimization Algorithm work on the
basis of the similar mechanism and used in proposed method. The secret raw data has been
converted into ASCII values and these can be embedding at the optimal coefficients by
applying ACO algorithm. After all secret values were embedded; inverse IWT is processed to
gain the stego object and ready to send it to receiver. At the recipient side, received it and
extract the secret data from it by performing the reverse procedure of embedding method.
With the neat sketch, the entire work of proposed method is described in the following
figure.
3.2 Algorithm
Proposed embedding algorithm is enumerated below to hide the data over the cover image.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 81
2
Extract RGB
bands
8
6
Steganography
7
4
ACO Algorithm
Embed at the
optimal points
Find the optimal
coefficient
Embedded Image
Convert into
ASCII Code
3
Transform
Coefficients
Apply IWT technique
1. Given input as color image and secretdata
2. Extract RGB components from colorimage
3. IWT technique is applied on the bands and makes transformation among the
coefficients.
4. ACO algorithm is used to find the optimalpoints.
5. Data is converting into ASCII values. On each row at every location given by the
ACO, embed values at those optimalpoints.
6. Finally, stego image is obtained by process the inverse IWTmethod.
Whereas the proposed extracting algorithm is explained below;
1. Receive the stegoimage
2. Data is extracting from the stego image by performing the reverse operation of
embeddingmethod.
3. Obtained the secretdata.
3.3 Block Diagram
1
5
3.4 Ant Colony OptimizationAlgorithm
In computer science and engineering, algorithm is very important [41-105]. The ant colony
optimization algorithm (ACO) is a probabilistic technique for solving computational problems
which can be reduced to finding good paths through graphs [33]. The ACO algorithm is one
of the most competent methods that indicate the main aspects of state transition rules and
pheromone modernize devices [103-105]. In each iteration, colonies of ants are sent to a
particular place for solution. Each ant works steadily in their state transition rules [106-130].
Read the secret
data
Read the Color
Image
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 82
ij
ij
Suppose, if an ant completes a work, then the pheromone modernized begins to search
another ant with similar strength. But it significantly reduces the opportunities and changes
the search methodology.
Step 1:
Initialize the solution Hi
Step 2:
Find the fitness value (Fi )
Fi =PSNR +CC
Step 3:
Based on the fitness find Probability transition matrix
P
c
= )α
(η)β
ij
∑(τ )α
(η)β
Step 4: Update pheromone and Evaporation pheromone
S
τij =(1−ρ)∗τij +∑∆τijC
=1
Step 6: Find the fitness for
if(Hnew)>
Hnew from pheromone evaporation
f (Hi )
Step 7:
Store the best solution so far attained
Iteration=Iteration+1
Step8:
Where,
Stop until optimal key attained
ij
(τij
C
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 83
= pheromone evaporation rate
S = number of ants
ij
c
= is the quantity of pheromone laid on edge (i,j) by c-th ant
ij
c
= Q/Lc; if ant c used connection (i, j) in itstour
0 ; otherwise
4. Results andDiscussion
Our proposed approach has been validated by experimenting with variations of the images. The proposed
system has been implemented in Visual Studio 2010, with .NET Framework Version 4.0 using the
language of C# windows application. The experiment has been conducted several test images by taking
RGB cover images of dimension 512x512. Table 1 shows the original images, secret data and stego
images. From the above defined experimental results, we can observe that after secret data embedded,
there is no visual difference from the original image. Hence, the existence of the embedded message will
not be known to the unauthorized users.
Various performance metrics were also verified from the resultant image such as the Peak- Signal –
Noise – Ratio, between the original image and this can further be proved from the Peak-Signal-to-Noise-
Ratio (PSNR) between final images and originalimages.
TABLE I
EXPERIMENTAL RESULTS OF THE PROPOSED TECHNIQUE
Original Image Sample Secret Data Stego Image
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 84
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 86
5. PerformanceEvaluation
For comparing stego image with cover results requires a measure of image quality,
commonly used measures Peak Signal-to-Noise Ratio [12]. If SNR and PSNR represent
smaller value, then it indicates there is a large between the original (without noise) and
distorted image. The main advantage of this measure is ease of computation, but it does not
reflect perceptual quality. An important property of PSNR is that a slight spatial shift of an
image can cause a large numerical distortion but, there would be no visual distortion and
conversely, a small average distortion can result in a damaging visual artifact, if all the error
is concentrated in a small important region. The performance values the PSNR calculated
from the output image is compared with the PSNR values provided in the existing techniques,
in the following tables2.
TABLE II
COMPARISON BETWEEN EXISTING AND PROPOSED TECHNIQUE BASED ON PSNR
Cover
Image
Size Proposed Algorithm
Sailboat 256x256 65.6274
Goldhill 300x256 66.0808
Peppers 400x400 69.4901
Lena 512x512 71.6319
6. Conclusion
The proposed method is used to increase high capacity and optimized image steganography
technique based on ant colony optimization algorithm. The ACO algorithm can find good
solutions efficiently even though the search space is so large. Our experimental results show
the proposed method provides acceptable image quality and secret message capacity. In
future, some data encryption technique can be applied along with ABC to increase the
security level. It may also be possible to optimize the fitness function of the current ABC
algorithm. Algorithms like AFS and BFO can also be tried to view their performance with
respect to the proposedmethod.
References
[1] Adi Shamir, “How to share a secret”, Communications of the ACM, vol. 22, no. 11,
page(s): 612–613, 1979.
[2] K.Shankar and P. Eswaran, “Sharing a Secret Image with Encapsulated Shares in
Visual Cryptography”, Procedia Computer Science, vol. 70, page(s): 462–468,2015.
[3] Shankar, K., & Eswaran, P. (2015). ECC based image encryption scheme with aid of
optimization technique using differential evolution algorithm. Int J Appl Eng Res,
10(55),1841-5.
[4] K. Sathesh Kumar, K. Shankar, M. Ilayaraja, M. Rajesh, “Sensitive Data Security in
Cloud Computing Aidof Different Encryption Techniques”, Journal of Advanced
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 87
Research in Dynamical and Control Systems, Volume. 9, Issue. 18, page(s): 2888-
2899, December 2017.
[5] K.Shankar, Lakshmanaprabu S. K, “Optimal key based homomorphic encryption for
color image security aid of ant lion optimization algorithm”, International Journal of
Engineering & Technology, Volume. 7, Issue. 9, page(s): 22-27,2018.
[6] Shankar, K., & Eswaran, P. (2016). An efficient image encryption technique based on
optimized key generation in ECC using genetic algorithm. In Artificial Intelligence
and Evolutionary Computations in Engineering Systems (pp. 705-714). Springer,
New Delhi.
[7] Shankar, K., & Eswaran, P. (2016). RGB-Based Secure Share Creation in Visual
Cryptography Using Optimal Elliptic Curve Cryptography Technique. Journal of
Circuits, Systems and Computers, 25(11),1650138.
[8] Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual
cryptography with aid of elliptic curve cryptography. China Communications, 14(2),
118-130.
[9] M. Ilayaraja, K. Shankar and G. Devika, “A Modified Symmetric Key Cryptography
Method for Secure Data Transmission”, International Journal of Pure and Applied
Mathematics, Volume 116, Issue. 10, page(s): 301-308, October2017.
[10] K.Shankar. “An Optimal RSA Encryption Algorithm for Secret Images”,
International Journal of Pure and Applied Mathematics, Volume 118, No. 20 page(s):
2491-2500, 2018.
[11] Nur Aminudin, Andino Maseleno, K.Shankar, S. Hemalatha, K. Sathesh kumar,
Fauzi, Rita Irviani, Muhamad Muslihudin, “Nur Algorithm on Data Encryption and
Decryption”, International Journal of Engineering & Technology, Volume. 7, Issue-
2.26, page(s): 109-118, June2018.
[12] K. Shankar, G. Devika and M. Ilayaraja, “Secure and Efficient Multi-Secret Image
Sharing Scheme based on Boolean Operations and Elliptic Curve Cryptography”,
International Journal of Pure and Applied Mathematics, Volume 116, Issue. 10,
page(s): 293-300, October2017.
[13] Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation
scheme in visual cryptography using elliptic curve cryptography with optimization
technique. Australian Journal of Basic & Applied Science, 9(36),150-163.
[14] K.Shankar and P.Eswaran, “A New k out of n Secret Image Sharing Scheme in
Visual Cryptography”, 2016 10th International Conference on Intelligent Systems
and Control (ISCO), IEEE, page(s): 369–374,2016.
[15] Pandi Selvam Raman, K.Shankar, Ilayaraja M, “Securing cluster based routing
against cooperative black hole attack in mobile ad hoc network”, International
Journal of Engineering & Technology, Volume. 7, Issue. 9, page(s): 6-9,2018.
[16] B.suneetha, Secured Data Transmission Using Video Steganographic Scheme , Int.
Journal of Engineering Research and Applications, Vol. 4, Issue.7, pp.243-246,
2014.
[17] Cox, Ingemar, et al. Digital watermarking and steganography. Morgan Kaufmann,
2007.
[18] Anjali Tiwari, Seema Rani Yadav and N.K. Mittal,A Review on Different Image
Steganography Techniques, International Journal of Engineering and Innovative
Technology (IJEIT), Vol.3, Issue.7,2014.
[19] Stuti Goel, Arun Rana and Manpreet Kaur, A Review of Comparison Techniques of
Image Steganography, Global Journal of Computer Science and Technology Graphics
& Vision, Vol.13, Issue 4,2013.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 88
[20] Amanjot Kaur, Shruti Mittal, Steganography using Social Impact Theory based
Optimization (SITO), International Journal of Computer Applications, Vol.101,
No.16, 2014.
[21] Bo-Luen Lai and Long-Wen Chang, Adaptive data hiding for images based on harr
discrete wavelet transform, Advances in Image and Video Technology, pp: 1085-
1093, 2006.
[22] Seyyed Amin Seyyedi and Nick Ivanov, High Payload and Secure Steganography
Method Based on Block Partitioning and Integer Wavelet Transform,
International Journal of Security and Its Applications, Vol.8, No.4, pp.183-194,
2014.
[23] Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi, "High Capacity Image
Steganography usingWavelet Transform and Genetic Algorithm, In Proceedings of
international multiconference of engineers and computer scientists, Vol.1, pp.16-
18. 2011.
[24] S. Lee, C.D. Yoo and T. Kalker, Reversible image watermarking based on integer-to-
integer wavelet transform, IEEE Transactions on Information Forensics and Security,
Vol. 2, No.3, pp. 321-330,2007.
[25] LiFan, Tiegang Gao, QuntingYang, YanjunCao, An extended matrix encoding
algorithm for steganography of high embedding efficiency, Volume 37, Issue 6,
pp.973-981, 2011.
[26] Souvik Bhattacharyya and Gautam Sanyal, Data Hiding in Images in Discrete
Wavelet Domain Using PMM, International Journal of Computer and Information
Engineering, Vol.4, No.8, pp.1276-1284, 2010.
[27] S. Bhattacharyya, A Survey of Steganography and Steganalysis Technique in Image,
Text, Audio and Video as Cover Carrier, Journal of Global Research in Computer
Science, Volume 2, No. 4, pp.1-16,2011
[28] N.Vinothkumar and T.Vigneswaran ,Steganographic Method Image Security Based
on Optimal Pixel Adjustment Process and Integer Wavelet Transform, International
Journal of Advanced Research in Electronics and Communication Engineering
(IJARECE), Vol. 2, Issue.3,2013.
[29] Ching-Sheng Hsu and Shu-Fen Tu. Finding optimal LSB substitution using ant
colony optimization algorithm, Communication Software and Networks, 2010.
ICCSN'10. Second International Conference on. IEEE,2010.
[30] Rafael Lima de Carvalho, Warley Gramacho da Silva, Ary Henrique Oliveira de
Morais, Optimizing Image Steganography using Particle Swarm Optimization
Algorithm, International Journal of Computer Applications, Vol.164, No.7,2017.
[31] https://en.wikipedia.org/wiki/Ant_colony_optimization_algorithms
[32] Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N.
(2018). Hybrid optimization with cryptography encryption for medical image security
in Internet of Things. Neural Computing and Applications,1-15.
[33] Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M.,
Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual
encryption with oppositional based optimization algorithm. Journal of medical
systems, 42(11),208.
[34] Karthikeyan, K., Sunder, R., Shankar, K., Lakshmanaprabu, S. K., Vijayakumar, V.,
Elhoseny,M.,&Manogaran,G.(2018).EnergyconsumptionanalysisofVirtual Machine
migration in cloud using hybrid swarm optimization (ABC–BA). The Journal of
Supercomputing, 1-17.
[35] Lakshmanaprabu, S. K., Shankar, K., Khanna, A., Gupta, D., Rodrigues, J. J.,
Pinheiro, P. R., & De Albuquerque, V. H. C. (2018). Effective Features to Classify
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 89
Big Data Using Social Internet of Things. IEEE Access, 6,24196-24204.
[36] Sahu, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2019). An approach for de-
noising and contrast enhancement of retinal fundus image using CLAHE. Optics &
Laser Technology, 110,87-98.
[37] Metawa, N., Hassan, M. K., & Elhoseny, M. (2017). Genetic algorithm based model
for optimizing bank lending decisions. Expert Systems with Applications, 80,75-82.
[38] Elhoseny, M., Yuan, X., El Minir, H. K., & Riad, A. M. (2016). An energy efficient
encryption method for secure dynamic WSN. Security and Communication
Networks, 9(13), 2024-2031.
[39] Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing
schema for WSN using elliptic curve cryptography and homomorphic
encryption. Journal of King Saud University-Computer and Information
Sciences, 28(3),262-275.
[40] Elhoseny, M., Elminir, H., Riad, A. M., & Yuan, X. I. A. O. H. U. I. (2014). Recent
advances of secure clustering protocols in wireless sensor networks. International
Journal of Computer Networks and Communications Security, 2(11),400-413.
[41] Maseleno, A., Hasan, M.M., Fuzzy Logic based analysis of the sepak takraw games
ball kicking with the respect of player arrangement, World Applied Programming,
vol. 2, Issue 5, May 2012, pp. 285-293.
[42] Maseleno, A., Hasan, M.M., Skin Diseases expert system using Dempster-Shafer
theory, International Journal Intelligent Systems and Applications, vol. 5, 2012, pp.
38-44.
[43] Mulung, B.R., Maseleno, A., Proposed SMART Traffic signal control in Brunei
Darussalam, Telkomnika, Vol. 15, No. 2, 2015, pp. 1-7.
[44] Huda, M., Maseleno, A., Jasmi, K.A., Mustari, I., Basiron, B., Strengthening
interaction from direct to virtual basis: insights from ethical and professional
empowerment, International Journal of Applied Engineering Research, Vol.12, No.
17, 2017, pp. 6901-6909.
[45] Maseleno, A., Tang, A.Y.C., Mahmoud, M.A., Othman, M., Saputra, S., Muslihudin,
M., Fuzzy AHP method to determine headache types based on symptoms,
Investigacion Clinica, Vol. 58, 2017.
[46] Huda, M., Maseleno, A., Atmotiyoso, P., Siregar, M., Ahmad, R., Jasmi, K.A.,
Muhamad, N.H.N, Mustari, I.M., Basiron, B., Big Data Emerging Technology:
Insights into Innovative Environment for Online Learning Resources, International
Journal of Emerging Technologies in Learning, Vol. 13, No. 1, 2017, pp. 23-36.
[47] Muslihudin, M., Latif, A., Ipnuwati, S., Wati, R., Maseleno, A., A solution to
competency test expertise of engineering motorcycles using simple additive
weighting approach, Int J. Pure Appl. Math, Vol. 118, No. 7, 2018, pp. 261-267.
[48] Mukodimah, S., Mulihudin, M., Andoyo, A., Hartati, S., Maseleno, A., Fuzzy simple
additive weighting and its application to toddler healthy food, Int. J. Pure Appl. Math,
Vol. 118, No. 7, 2018, pp. 1-7.
[49] Muslihudin, M., Susanti, T.S., Maseleno, A., The priority of rural road development
using fuzzy logic based simple additive weighting, Int. J. Pure Appl. Math, Vol. 118,
No. 8, 2018, pp. 9-16.
[50] Irviani, R., Dinulhaq, I., Irawan, D., Renaldo, R., Maseleno, A., Areas prone of the
bad nutrition based multi attribute decision making with fuzzy simple additive
weighting for optimal analysis, Int. J. Pure Appl. Math, Vol. 118, No. 7, 2018, pp.
589-596.
[51] Oktafianto, Akbar, M.R.A., Fitrian, Y., Zulkifli, Sodikin, Wulandari, Maseleno, A.,
Dismisall working relationship using Analytical Hierarchy Process Method, Int. J.
Pure Appl. Math, Vol. 118, No. 7, 2018, pp. 177-183.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 90
[52] Susilowati, T., Anggraeni, E.Y., Fauzi, Andewi, W., Handayi, Y., Maseleno, A.,
Using profile matching method to employess position movement, International
Journal of Pure and Applied Mathematics, Vol. 118, No. 7, 2018, pp. 415-422.
[53] Maseleno, A., Fauzi, Nungsiyati, Noviarti, T., Muslihudin, M., Irviani, R., Optimal
dengue endemic region prediction using fuzzy simple additive weighting based
algorithm, International Journal of Pure and Applied Mathematics, Vol. 118, No. 7,
2018, pp. 472-477.
[54] Muslihudin, M., Wanti, R, Hardono, N., Shankar, K., Ilayaraja, M., Maseleno, A.,
Mustofa, D.R., Fauzi, Masrur, M., Mukodimah, S., Prediction of layer chicken
disease using fuzzy analytical hierarchy process, International Journal of Engineering
& Technology (UAE), Vol. 7, No. 2.26, 2018, pp. 90-94.
[55] Maseleno, A., Pardimin, Huda, M., Ramlan, Hehsan, A., Yusof, Y.M., Haron, Z.,
Ripin, M.N., Nor, N.H.M., Junaidi, J., Mathematical theory of evidence to subject
expertise diagnostic, ICIC Express Letters, Vol. 12, No. 4, 2018.
[56] Aminudin, N., Sundari, E., Shankar, K., Deepalakshmi, P., Irviani, R., Fauzi,
Maseleno, A., Weighted product and its application to measure employee
performance, International Journal of Engineering & Technology (UAE), Vol. 7, No.
2.26, 2018, pp. 102-108.
[57] Putra, D.A.D, Jasmi, K.A., Basiron, B., Huda, M., Maseleno, A., Shankar, K.,
Aminudin, N., Tactical steps for e-government development, International Journal of
pure and applied mathematics, Vol. 119, No. 15, 2018, pp. 2251-2258.
[58] Sugiyarti, E., Jasmi, K.A., Basiron, B., Huda, M. Shankar, K., Maseleno, A., Decision
support system of scholarship grantee selection using data mining, International
Journal of Pure and Applied Mathematics, Vol. 119, No. 15, 2018, pp. 2239-2249.
[59] Kurniasih, D., Jasmi, K.A., Basiron, B., Huda, M., Maseleno, A., The uses of fuzzy
logic method for finding agriculture and livestock value of potential village,
International Journal of Engineering & Technology (UAE), Vol. 7, No. 3, 2018, pp.
1091-1095.
[60] Adela, H., Jasmi, K.A., Basiron, B., Huda, M., Maseleno, A., Selection of dancer
nmember using simple additive weighting, International Journal of Engineering &
Technology (UAE), Vol. 7, No. 3, 2018, pp. 1096-1107.
[61] Maseleno, A., Sabani, N., Huda,M., Ahmad, R., Jasmi, K.A., Basiron, B.,
Demystifying learning analytics in personalised learning, International Journal of
Engineering & Technology (UAE), Vol. 7, No. 3, 2018, pp. 1124 -1129.
[62] Amin, M.M., Nugratama, M.A.A., Maseleno, A., Huda, M., Jasmi, K.A., Design of
cigarette disposal blower and automatic freshner using mq-5 sensor based on atmega
8535 microcontroller, International Journal of Engineering & Technology (UAE),
Vol. 7, No. 3, 2018, pp. 1108 -1113.
[63] Assahubulkahfi, M., Sam, Y.M., Maseleno, A., Huda, M., LQR Tuning by Particle
Swarm Optimization of Full Car Suspension System, International Journal of
Engineering & Technology (UAE), Vol. 7, No. 2.13, 2018, pp. 328-331.
[64] Amin, M.M., Maseleno, A., Shankar, K., Perumal, E., Vidhyavathi, R.M.,
Lakshmanaprabu, S.K., Active Database System Approach and Rule Based in the
Development of Academic Information System, International Journal of Engineering
& Technology (UAE), Vol. 7, No. 2.26, 2018, pp. 95-101.
[65] Maseleno, A., Tang, A.Y.C., Mahmoud, M.A., Othman, M., Negoro, Y.S., Boukri, S.,
Shankar, K., Abadi, S. Muslihudin, M., The Application of Decision Support System
by using Fuzzy SAW Method in Determining the Feasibility of Electrical Installations
in Customer’s House, International Journal of Pure and Applied Mathematics, Vol.
119, No. 16, 2018, pp. 4277-4286.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 91
[66] Lydia, E. L., Kumar, P.K., Shankar, K., Lakshmanaprabu, S.K., Vidhyavathi, R.M.,
Maseleno, A., Charismatic Document Clustering through Novel K-Means Non-
negative Matrix Factorization (KNMF) Algorithm using Key Phrase Extraction,
International Journal of Parallel Programming, Springer, 2018, pp. 1-19.
[67] Susilowati, T., Dacholfany, M.I., Amini, S., Ikhwan, A., Nasir, B.M., Huda, M.,
Prasetyo, A., Maseleno, A., Satria, F., Hartati, S., Getting Parents Involved in Child’s
School: Using Attendance Application System Based on SMS Gateway, International
Journal of Engineering and Technology (UAE), Vol. 7, No. 2.27, 2018, pp. 167-174.
[68] Abadi, S., Huda, M., Hehsan, A., Ripin, M.N., Haron, Z., Muhamad, NHN, Rianto,
R., Maseleno, A., Renaldo, R., Syarifudin, A., Design of student score application for
assessing the most outstanding student at vocational high school. International Journal
of Engineering and Technology, Vol. 7, No. 2.27, 2018, pp. 172-177.
[69] Aminudin, N., Sundari, E., Shankar, K., Deepalakshmi, P., Fauzi, Irviani, R.,
Maseleno, A., Weighted Product and Its Application to Measure Employee
Performance, International Journal of Engineering and Technology(UAE), Vol. 7,
No. 2.26, 2018, pp. 102-108.
[70] Abadi, S. Huda, M., Basiron, B, Ihwani, S.S., Jasmi, K.A., Hehsan, A., Safar, J.,
Mohamed, A.K., Embong, W.H.W., Mohamad, A.M., Noor, S.S.M., Novita, D.,
Maseleno, A., Irviani, R., Idris, M., Muslihudin, M., Implementation of Fuzzy
Analytical Hierarchy Process on Notebook Selection, International Journal of
Engineering and Technology(UAE), Vol. 7, No. 2.26, 2018, pp. 102-108.
[71] Anggraeni, E.Y., Huda, M., Maseleno, A., Safar, J., Jasmi, K.A., Mohamed, A.K.,
Hehsan, A., Basiron, B., Ihwani, S.S., Embong, W.H.W., Mohamad, A.M., Noor,
S.S.M., Fauzi, A.N., Wijaya, D.A., Poverty Level Grouping using SAW Method,
International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018,
pp. 218-224.
[72] Abadi, S., Huda, M., Jasmi, K.A., Noor, S.S.M., Safar, J., Mohamed, A.K., Embong,
W.H.W., Mohamad, A.M., Hehsan, A., Basiron, B., Ihwani, S.S., Maseleno, A.,
Muslihudin, M., Satria, F., Irawan, D., Hartati, S., Determination of the Best Quail
Eggs using Simple Additive Weighting, International Journal of Engineering and
Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 225-230.
[73] Abadi, S., Huda, M., Hehsan, A., Mohamad, A.M., Basiron, B., Ihwani, S.S., Jasmi,
K.A., Safar, J., Mohamed, A.K., Embong, W.H.W., Noor, S.S.M., Brahmono, B.,
Maseleno, A., Fauzi, A.N., Aminudin, N., Gumanti, M., Design of Online
Transaction Model on Traditional Industry in order to Increase Turnover and
Benefits, International Journal of Engineering and Technology(UAE), Vol. 7, No.
2.27, 2018,pp. 231-237.
[74] Susilowati, T., Teh, K.S.M., Nasir, B.M., Don, A.G., Huda, M., Hensafitri, T.,
Maseleno, A., Oktafianto, Irawan, D., Learning Application of Lampung Language
based on Multimedia Sofware, International Journal of Engineering and
Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 175-181.
[75] Abadi, S., Nasir, B.M., Huda, M., Ivanova, N.L., Sari, T.I., Maseleno, A., Satria, F.,
Muslihudin, M., Application model of k-means clustering: Insights into promotion
strategy of vocational high school, International Journal of Engineering and
Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 182-187.
[76] Septiropa, Z., Osman, M.H., Rahman, A.B.A., Arifin, M.A.M., Huda, M., Maseleno,
A., Profile of cold-formed steel for compression member design a basic
combination,International Journal of Engineering and Technology(UAE), Vol. 7, No.
2.27, 2018, pp. 284-290.
[77] Ristiani, Pardimin, Teh, K.S.M., Fauzi, A., Hananto, A.L., Huda, M., Muslihudin, M.,
Shankar, K., Maseleno, A., Decision Support System Model for Selection of Best
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 92
Formula Milk for toddlers using Fuzzy Multiple Attribute Decision Making, Journal
of Advanced Research in Dynamical and Control Systems, Vol. 10, 02-Special Issue,
2018.
[78] Hamid, A., Sudrajat, A., Kawangit, R.M., Don, A.G., Huda, M., Jalal, B., Akbar, W.,
Onn, A., Maseleno, A., Determining basic food quality using SAW, International
Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 3548-3555, 2018.
[79] Oktafianto, Kawangit, A.S., Kawangit, R.M., Don, A.G., Huda, M., Saputri, A.D.,
Latif, A.A., Maseleno, A., Determining housing location using weighted product,
International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 3563-
3568, 2018.
[80] Fauzi, Huda, M., Teh, K.S.M., Haron, Z., Ripin, M.N., Hehsan, A., Abas, H., Rafiq,
M., Irawan, J., Abadi, S., Maseleno, A., The Design of Fuzzy Expert System
Implementation for Analyzing Transmissible Disease of Human, International Journal
of Pharmaceutical Research, Vol. 10, Issue 4, 2018.
[81] Abadi, S., Huda, M., Teh, K.S.M., Haron, Z., Ripin, M.N., Hehsan, A., Sarip, S.,
Hehsan, M.R., Amrullah, M., Maseleno, A., Hazard Level of Vehicle Smoke by Fuzzy
Multiple Attribute Decision Making with Simple Additive Weighting Method,
International Journal of Pharmaceutical Research, Vol. 10, Issue 4, 2018.
[82] Kamenez, N.V., Vaganova, O.I., Smirnova, Z.V., Bulayeva, M.N., Kuznetsova, E.A.,
Maseleno, A., Experience of the use of electronic training in the educational process
of the Russian higher educational institution, International Journal of Engineering and
Technology(UAE), Vol. 7, No. 4, pp. 4085-4089, 2018.
[83] Vaganova, O.I., Zanfir, L.N., Smirnova, Z.V., Chelnokova, E.A., Kaznacheeva, S.N.,
Maseleno, A., On the linguistic training of future teachers of unlike specialties under
the conditions of Russian professional education, International Journal of Engineering
and Technology(UAE), Vol. 7, No. 4, pp. 4090-4095, 2018.
[84] Vaganova, O.I., Kamenez, N.V., Sergeevna, V.I., Vovk, E.V., Smirnova, Z.V.,
Maseleno, A., Possibilities of information technologies to increase quality of
educational services in Russia, International Journal of Engineering and
Technology(UAE), Vol. 7, No. 4, pp. 4096-4102, 2018.
[85] Smirnova, Z.V., Zanfir, L.N., Vaganova, O.I., Bystrova, N.V., Frolova, N.V.,
Maseleno, A., WorldSkills as means of improving quality of pedagogical staff
training, International Journal of Engineering and Technology(UAE), Vol. 7, No. 4,
pp. 4103-4108, 2018.
[86] Aminin, S., Dacholfany, M.I., Mujib, A., Huda, M., Nasir, B.M., Maseleno, A.,
Sundari, E., Masrur, M., Design of library application system,International Journal of
Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 199-204.
[87] Aminudin, N., Huda, M., Kilani, A., Embong, W.H.W., Mohamed, A.M., Basiron, B.,
Ihwani, S.S., Noor, S.S.M., Jasmi, K.A., Higher education selection using simple
additive weighting,International Journal of Engineering and Technology(UAE), Vol.
7, No. 2.27, 2018, pp. 211-217.
[88] Aminudin, N., Huda, M., Hehsan, A., Ripin, M.N., Haron, Z., Junaidi, J., Irviani, R.,
Muslihudin, M., Hidaya, S., Maseleno, A., Gumanti, M., Fauzi, A.N., Application
program learning based on Android for students experiences, International Journal of
Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 194-198.
[89] Maseleno, A., Huda, M., Jasmi, K.A., Basiron, B., Mustari, I., Don, A.G., and Ahmad,
R. Hau-Kashyap approach for student’s level of expertise. Egyptian Informatics
Journal, 2018.
[90] Huda, M., Maseleno, A., Teh, K.S.M., Don, A.G., Basiron, B., Jasmi, K.A., Mustari,
M.I., Nasir, B.M., Ahmad, R., Understanding Modern Learning Environment (MLE)
in Big Data Era, International Journal of Emerging Technologies in Learning
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 93
(iJET),Vol. 13, No. 5, 2018, pp. 71-85.
[91] Maseleno, A., Tang, A.Y.C., Mahmoud, M.A., Othman, M., Shankar, K., Big Data
and E-Learning in Education, International Journal of Computer Science and Network
Security, Vol. 18, No. 5, pp. 171-174.
[92] Shankar, K., Lakshmanaprabu, S.K., Gupta, D., Maseleno, A., De Albuquerque,
V.H.C., Optimal feature-basedmulti-kernel SVM approach for thyroid disease
classification, The Journal of Supercomputing, Springer, Vol. 74, no. 259, 2018, pp. 1-
16.
[93] Amin, M.M., Sutrisman, A., Stiawan, D., Maseleno, A., Design Restful WebService
of National Population Database for supporting E-health interoperability service,
Journal of Theoretical and Applied Information Technology, vol. 96, issue 15, 2018.
[94] Surendar, A., Akhmetov, L.G., Ilyashenko, L.K., Maseleno, A., Samavatian, V.,
Effect of thermal cycle loadings on mechanical properties and thermal conductivity of
a porous lead-free solder joint, IEEE Transactions on Components, Packaging, and
Manufacturing Technology, 2018, pp. 1769-1776.
[95] Surendar, A., Samavatian, V., Maseleno, A., Ibatova, A.Z., Samavatian, M., Effect of
solder layer thickness of thermo-mechanical reliability of a power electronic system,
Journal of Material Science: Materials in Electronics, Springer, September 2018,
Volume 29, Issue 17, pp. 15249-15258.
[96] Samavatian, M., Ilyashenko, L.K., Surendar, A., Maseleno, A., Samavatian, V., Effect
of System Design on Fatigue Life of Solder Joints in BGA Packages Under Vibration
at Random Frequencies, Journal of Electronic Materials, November 2018, Volume 47,
Issue 11, pp. 6781-6790.
[97] Javanshir, I., Maseleno, A., Tasoujian, S., Oveisi, M., Optimization of suspension
system of heavy off-road vehicle for stability enhancement using integrated anti-roll
bar and coiling spring mechanism, Journal of Central South University, September
2018, Volume 25, Issue 9, pp 2289–2298.
[98] Surendar, A., Bozorgian, A., Maseleno, A., Ilyashenko, L.K., Najafi, M., Oxidation of
Toxic Gases via Ge-B36N36 and Ge-C72 Nanocages as Potential Calaysts, Inorganic
Chemistry Communications, Elsevier, Vol. 96, October 2018, pp. 206-210.
[99] Namdarian, A., Tabrizi, A.G., Maseleno, A., Mohammadi, A., Mossavifard, S.E., One
step synthesis of rGO-Ni3S2 nano-cubes composite for high-performance
supercapacitor electrodes, International Journal of Hydrogen Energy, Elsevier, vol. 43,
Issue 37, 13 September 2018, pp.17780-17787.
[100] Motlagh, A.H., Klyuev, S.V., Surendar, A., Ibatova, A.Z., Maseleno, A., Catalytic
Gasification of Oil Sludge with Calcined Dolomite, Petroleum Science and
Technology, Taylor and Francis, pp. 1-5, 2018.
[101] Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., & Riad, A. (2015). Dynamic
clustering of heterogeneous wireless sensor networks using a genetic algorithm
towards balancing energy exhaustion. International Journal of Scientific &
Engineering Research, 6(8),1243-1252.
[102] Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H. K., & Riad, A. M. (2015).
Balancing energy consumption in heterogeneous wireless sensor networks using
genetic algorithm. IEEE Communications Letters, 19(12),2194-2197.
[103] Fang, B., Guo, X., Wang, Z., Li, Y., Elhoseny, M., & Yuan, X. (2019). Collaborative
task assignment of interconnected, affective robots towards autonomous healthcare
assistant. Future Generation Computer Systems, 92,241-251.
[104] Sivaram, M., B. DurgaDevi, and J. Anne Steffi. "Steganography of two LSB bits." International
Journal of Communications and Engineering 1.1 (2012): 2231-2307.
[105] Manikandan, v., v. Porkodi, amin salih mohammed, and m. Sivaram. "Privacy Preserving Data
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 94
Mining Using Threshold Based Fuzzy Cmeans Clustering." ICTACT Journal on Soft
Computing 9, no. 1 (2018).
[106] Malathi, N., and M.Sivaram. "An Enhanced Scheme to Pinpoint Malicious Behavior of Nodes In
Manet’s." (2015).
[107] Mohammed, Amin Salih, D. Yuvaraj, M. Sivaram, and V. Porkodi. "Detection And Removal Of
Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol." International Journal of
Advanced Research in Computer Science 10, no. 6 (2018).
[108] Sivaram, M., D. Yuvaraj, Amin Salih Mohammed, V. Porkodi, and V. Manikandan. "The Real
Problem Through a Selection Making an Algorithm that Minimizes the Computational
Complexity."
[109] Porkodi, V., M. Sivaram, Amin Salih Mohammed, and V. Manikandan. "Survey on White-Box
Attacks and Solutions." Asian Journal of Computer Science and Technology 7, no. 3 (2018): 28-
32.
[110] Sivaram, M. "Odd And Even Point Crossover Based Tabu Ga For Data Fusion In Information
Retrieval." (2014).
[111] Dhivakar, B., S. V. Saravanan, M. Sivaram, and R. Abirama Krishnan. "Statistical Score
Calculation of Information Retrieval Systems using Data Fusion Technique." Computer Science
and Engineering 2, no. 5 (2012): 43-45.
[112] Punidha, R., avithra K, Swathika R, and Sivaram M, “ Preserving DDoS Attacks sing Node
Blocking Algorithm.” International Journalof Pure and Applied Mathematics, Vol.119, o. 15,
2018, pp 633-640. https://acadpubl.eu/hub/2018-119-15/3/473.pdf
[113] M, Sivaram, et al. “Securing the Sensor Networks Along With Secured Routing Protocols for
Data Transfer in Wireless Sensor Networks.” Journal of Emerging Technologies and Innovative
Research, vol. 5, no. 10, Oct. 2018, pp. 316–321., doi:http://doi.one/10.1729/Journal.18612.
[114] Steffin Abraham , Tana Luciya Joji , Sivaram M, D.Yuvaraj, “Enhancing Vehicle Safety With
Drowsiness Detection Andcollision Avoidance” International Journal of Pure and Applied
Mathematics, Volume 118 No. 22 2018, 921-927. https://acadpubl.eu/hub/2018-118-
22/articles/22b/39.pdf
[115] Mahalakshmi.K, Sivaram.M, Shantha Kumari.K, Yuvaraj.D, Keerthika.R, “Healthcare Visible
Light Communication”, International Journal of Pure and Applied Mathematics, Volume 118 No.
11 2018, 345-348, https://acadpubl.eu/jsi/2018-118-10-11/articles/11/41.pdf.
[116] Punidha.R, Sivaram.M, “Integer Wavelet Transform Based Approach For High Robustness Of
Audio Signal Transmission”, International Journal of Pure and Applied Mathematics, Volume 116
No. 23 2017, 295-304, https://acadpubl.eu/jsi/2017-116-23-24/articles/23/40.pdf
[117] Deepa.S, Sivaram.M, “Enabling Anonymous Endorsement In Clouds With Decentralized Access
Control”, International Journal of Scientific Engineering and Applied Science (IJSEAS) -
Volume-1, Issue-3, June 2015, 397-401.
[118] Sivaram.M, Obulatha.O, “ Position Privacy Using LocX”, International Journal of Innovative
Research in Engineering Science and Technology, Vol. III,Issue 01,Pp 206-212.
[119] M. Sivaram, K. Batri, Amin Salih Mohammed and V. Porkodi, “Exploiting the Local Optima in
Genetic Algorithm using Tabu Search”, Indian Journal of Science and Technology, Vol 12(1),
DOI: 10.17485/ijst/2018/v12i1/139577, January 2019.
[120] Sivaram M, Batri K, “ Odd and Even Point Crossover Based Tabu GA for Data Fusion in
InformationRetrieval”, http://hdl.handle.net/10603/38935,10-Apr-2015.
[121] Sivaram.M, Yuvaraj.D, Amin Salih Mohammed, Porkodi.V “Estimating the Secret Message in the
Digital Image” International Journal of Computer Applications, 181(36):26-28, January 2019.
[122] Mrs.V.Porkodi, Dr.D.Yuvaraj, Dr.Amin Salih Mohammed,V.Manikandan and M.Sivaram, “Prolong
the Network Lifespan of Wireless Sensor Network by Using Hpsm”, International Journal of
Mechanical Engineering and Technology, 10(01), 2019, pp.2039–
2045.http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=10&Type=01
[123] Porkodi.V, Yuvaraj.D., Mohammed,A.S, Sivaram.M and Manikandan.V,”IoT in Agriculture”
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 95
Journal of Advanced Research in Dynamical and Control Systems, Pages: 1986-1991,14-Special
Issue, Pages: 1986-1991,2018.
[124] Manikandan.V, Mohammed, A.S, Yuvaraj,D., Sivaram.M and Porkod.V, “An Energy Efficient
EDM-RAEED Protocol for IoT Based Wireless Sensor Networks” Journal of Advanced Research
in Dynamical and Control Systems, Pages: 1992-2004,14-Special Issue,Pages: 1992-2004, 2018.
[125] Mohammed, A.S., Kareem, S.W., Al Azzawi, A.K., Sivaram, M. “Time series prediction using
SRE-NAR and SRE-ADALINE”, Journal of Advanced Research in Dynamical and Control
Systems, Pages:1716-1726, 2018.
[126] Sivaram, M., Yuvaraj, D., Porkodi, V., Manikandan, V. “Emergent news event detection from
facebook using clustering” Journal of Advanced Research in Dynamical and Control Systems,
Pages:1941-1947, 2018.
[127] Nithya, S., Sundara Vadivel, P., Yuvaraj, D., Sivaram, M. “Intelligent based IoT smart city on traffic
control system using raspberry Pi and robust waste management”, Journal of Advanced Research in
Dynamical and Control Systems, Pages: 765-770, 2018.
[128] Viswanathan, M., Sivaram, M., Yuvaraj, D., Mohammed, A.S. “Security and privacy protection in
cloud computing”, Journal of Advanced Research in Dynamical and Control Systems, Pages 1704-
1710, 2018
[129] Batri, K., Sivaram, M. “Testing the impact of odd and even point crossover of genetic algorithm over
the data fusion in information retrieval”, European Journal of Scientific Research, 2012.
[130] Sivaram Yuvaraj Amin Salih Mohamme M D V Porkodi. Estimating the Secret Message in the
Digital Image. International Journal of Computer Applications 181(36):26-28, January 2019

More Related Content

What's hot

A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
IJECEIAES
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
rahulmonikasharma
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
Editor IJCATR
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
IJECEIAES
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
IJECEIAES
 
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
sipij
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
IRJET Journal
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
IRJET Journal
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme
IJECEIAES
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
IJMTST Journal
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
 

What's hot (20)

A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
 
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
C010511420
C010511420C010511420
C010511420
 
Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme Asymmetric image encryption scheme based on Massey Omura scheme
Asymmetric image encryption scheme based on Massey Omura scheme
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingA Cryptographic Key Generation Using 2D Graphics pixel Shuffling
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 

Similar to IJSRED-V2I2P12

Security using image processing
Security using image processingSecurity using image processing
Security using image processing
IJMIT JOURNAL
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
IJERA Editor
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
Iasir Journals
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
IJARIIE JOURNAL
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13
IJSRED
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Editor IJMTER
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
IAEME Publication
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
Iaetsd Iaetsd
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
ijsptm
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
IJNSA Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
IJECEIAES
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
IJERA Editor
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 

Similar to IJSRED-V2I2P12 (20)

Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...Information hiding in edge location of video using amalgamate fft and cubic s...
Information hiding in edge location of video using amalgamate fft and cubic s...
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
IJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
IJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
IJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
IJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
IJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
IJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
IJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
IJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
IJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
IJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
IJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
IJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
IJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
IJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
IJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
IJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 

Recently uploaded (20)

学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 

IJSRED-V2I2P12

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 78 High Capacity and Optimized Image Steganography Technique based on Ant Colony Optimization Algorithm A. Priya Alagappa University, Tamilnadu, India. Abstract The tremendous development of digital technology, it is mandatory to address the security while transmitting information over network in a way that observer couldn’t depict it. Measures to be taken to provide the security by establishing hidden communication using steganography principle which is help to camouflage the secret information in some carrier file such as text, image, audio and video. In this era of hidden data communication, image becoming an effective tool on account of their frequency, capability and accuracy. Image steganography uses an image as a carrier medium to hide the secret data. The main motive of this article is that the uses the combination of frequency domain and optimization method inorder to increasing in robustness. In this article, Integer Wavelet transform is performed into the host image and coefficients have been transformed. ACO optimization algorithm is used to find the optimal coefficients where to hide the data. Furthermore, sample images and information having been demonstrated which proved the increased robustness as well as high level of data embeddingcapacity. Keywords: Security, Image, steganography, IWT, ACO (Ant Colony Optimization) algorithm. 1. Introduction Cryptographic techniques afford the confidentiality and security by reducing the prospect of adversaries [1]. There are two processes in cryptography such as: a) Encryption and b) Key management process. Each security system must supply some security process that guarantees the secrecy of the system [2]. Cryptography is grouped into Symmetric Key and Asymmetric Key Cryptography [3]. In Symmetric key cryptography, a single key is used for both encryption and decryption [4]. The Asymmetric Key Cryptography uses different keys for both processes [5]. In session key; the symmetric key can be changed every time in communication between two parties. It is randomly generated and valid for only one session [6-8]. If an attacker gets the session key, he/she can decrypt only the messages for a particular session.Ifbothpartiesalwaysusedthesamekeyforallsessions,theattackerwouldbeable to decrypt all messages encrypted with this key [9-12]. The underlying mathematical problem of a public-key cryptosystem determines the efficiency of the cryptosystem in a way. Because these problems dictate the sizes of domain parameters and keys, which in turn affect the performance of the arithmetic operations of the public-key crypto algorithms [13-15]. Steganography is the art and science of secret communication between two parties over a public medium that is not detectable by an observer. Steganography is a close cousin of cryptography which is the art and science of secret communication. Cryptography aims to conceal the content of the message whereas steganography hides the very existence of secretive communication as well [17]. For example, figure 1 shows that two users want to sharing information between them. But noticer is examining that RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 79 communication via Internet Service Provider or local server. To protect this communication, steganography provide a model in which sender A wish to send message M to receiver B. Sender embed M over the cover media C and obtained stego object S then sent it over the insecure channel. The terms cover object is defined as various types of multimedia objects are used to hide the data and stego object is known as which object embedded the secret information[18]. Effective characteristics of steganography [20]; 1. Secrecy : With the allowing of intend users, extracting the hidden information[34-37] 2. Imperceptions: The ability to be completely undetectable [38-40] 3. Capacity: Maximum length of the hidden information which can be embedded in cover object. 4. Accuracy: Extracting of the embedded data should beaccurate. Steganography techniques are classified into two types which are spatial domain and frequency domain techniques. In spatial domain, processing is data hidden directly on the pixel values of the image and in frequency domain, image is transformed then data is hidden on the transformed coefficients [21]. Some of the spatial domain techniques are LSB, PVD, EBE, RPE, PMM and Pixel intensity based etc. and some of the frequency domain techniques are DCT, DWT, DFT, IWT and DCVT [22]. Specifically, spatial domain techniques are susceptible to visual attack and pixel alteration [23]. When comparing to spatial domain, transform domain techniques are more robustness because of its hiding scheme in significant areas of cover images [24-28]. Integer wavelet transform (IWT) maps an integer data set into another integer data set . In discrete wavelet transform, the used wavelet filters have floating point coefficients so that when we hide data in their coefficients any truncations of the floating point values of the pixels that should be integers may cause the loss of the hidden information which may lead to the failure of the data hiding system[29]. The remaining of the paper is constructed as below: Relevant works have discussed in section 2. In section 3, explain the workflow of proposed method include algorithms. In
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 80 Section 4, prove the proposed method has increasing in robust and level of capacity by carried out the experiment on sample image and secret data. Finally, Section 5 concludes the article. 2. Related Work Discrete Wavelet Transforms are used in JPEG2000 image format and several methods embed information using Integer Wavelet Transform Coefficients. Lai and Chang proposed an adaptive data hiding method in the frequency domain [30]. Seyyedi et al. in [22] proposed a high volume payload and secure steganography technique based on integer wavelet transform. Ghasemi et al. combined Genetic Algorithm (GA), OPAP and Integer Wavelet Transforms to reduce distortion while delivering high embedding capacity in[23]. N. Vinothkumar et al [24] have been suggested to embed the data over image on the basis of the combination IWT with Optimal pixel Adjustment Process (OPAP). The method use IWT to transform the coefficients on cover image and OPAP is used to raise the level of hiding capacity. Result shows that minimize difference error betwixt original and encoded image. Ching-Sheng Hsu et al [25] have been proposed method to determined the optimal LSB substitution using ACO algorithm . This method embeds the data into the last bits of the cover image. Moreover, generate optimal matrix with the help of ACO algorithm to conceal the data at the optimal values. Rafael Lima de Carvalho et al [26] have been used optimization principle to hide the secret message into the target picture. Optimization done by PSO algorithm and produce better result than classical GA basedmethod. Amanjot Kaur et al [27] have been proposed algorithm which finding an optimal block on image may be the best position to hide the data. The fitness function to be taken where ratio is maximize of sum of contrast and energy and entropy and homogeneity. Results prove that this algorithm showing superiority than PSOalgorithm. 3. ProposedMethod 3.1 Overview The proposed method is splitted into two subsequent parts such as using IWT for transforming coefficients and ACO to find the best values for embedding. In the first part of proposed method, input the color image as carrier and extracting three RGB color components [31]. Integer wavelet transform is applied on these components and results showing transformed coefficients. Second part concerned the Ant Colony Optimization algorithm which inspired the behavior of ants. These ants deposited pheromone on the path to discover shortest best path from nest to food. More pheromone on path increases, that path followed by every other ants of the colony. Ant Colony Optimization Algorithm work on the basis of the similar mechanism and used in proposed method. The secret raw data has been converted into ASCII values and these can be embedding at the optimal coefficients by applying ACO algorithm. After all secret values were embedded; inverse IWT is processed to gain the stego object and ready to send it to receiver. At the recipient side, received it and extract the secret data from it by performing the reverse procedure of embedding method. With the neat sketch, the entire work of proposed method is described in the following figure. 3.2 Algorithm Proposed embedding algorithm is enumerated below to hide the data over the cover image.
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 81 2 Extract RGB bands 8 6 Steganography 7 4 ACO Algorithm Embed at the optimal points Find the optimal coefficient Embedded Image Convert into ASCII Code 3 Transform Coefficients Apply IWT technique 1. Given input as color image and secretdata 2. Extract RGB components from colorimage 3. IWT technique is applied on the bands and makes transformation among the coefficients. 4. ACO algorithm is used to find the optimalpoints. 5. Data is converting into ASCII values. On each row at every location given by the ACO, embed values at those optimalpoints. 6. Finally, stego image is obtained by process the inverse IWTmethod. Whereas the proposed extracting algorithm is explained below; 1. Receive the stegoimage 2. Data is extracting from the stego image by performing the reverse operation of embeddingmethod. 3. Obtained the secretdata. 3.3 Block Diagram 1 5 3.4 Ant Colony OptimizationAlgorithm In computer science and engineering, algorithm is very important [41-105]. The ant colony optimization algorithm (ACO) is a probabilistic technique for solving computational problems which can be reduced to finding good paths through graphs [33]. The ACO algorithm is one of the most competent methods that indicate the main aspects of state transition rules and pheromone modernize devices [103-105]. In each iteration, colonies of ants are sent to a particular place for solution. Each ant works steadily in their state transition rules [106-130]. Read the secret data Read the Color Image
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 82 ij ij Suppose, if an ant completes a work, then the pheromone modernized begins to search another ant with similar strength. But it significantly reduces the opportunities and changes the search methodology. Step 1: Initialize the solution Hi Step 2: Find the fitness value (Fi ) Fi =PSNR +CC Step 3: Based on the fitness find Probability transition matrix P c = )α (η)β ij ∑(τ )α (η)β Step 4: Update pheromone and Evaporation pheromone S τij =(1−ρ)∗τij +∑∆τijC =1 Step 6: Find the fitness for if(Hnew)> Hnew from pheromone evaporation f (Hi ) Step 7: Store the best solution so far attained Iteration=Iteration+1 Step8: Where, Stop until optimal key attained ij (τij C
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 83 = pheromone evaporation rate S = number of ants ij c = is the quantity of pheromone laid on edge (i,j) by c-th ant ij c = Q/Lc; if ant c used connection (i, j) in itstour 0 ; otherwise 4. Results andDiscussion Our proposed approach has been validated by experimenting with variations of the images. The proposed system has been implemented in Visual Studio 2010, with .NET Framework Version 4.0 using the language of C# windows application. The experiment has been conducted several test images by taking RGB cover images of dimension 512x512. Table 1 shows the original images, secret data and stego images. From the above defined experimental results, we can observe that after secret data embedded, there is no visual difference from the original image. Hence, the existence of the embedded message will not be known to the unauthorized users. Various performance metrics were also verified from the resultant image such as the Peak- Signal – Noise – Ratio, between the original image and this can further be proved from the Peak-Signal-to-Noise- Ratio (PSNR) between final images and originalimages. TABLE I EXPERIMENTAL RESULTS OF THE PROPOSED TECHNIQUE Original Image Sample Secret Data Stego Image
  • 7. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 84
  • 8. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 86 5. PerformanceEvaluation For comparing stego image with cover results requires a measure of image quality, commonly used measures Peak Signal-to-Noise Ratio [12]. If SNR and PSNR represent smaller value, then it indicates there is a large between the original (without noise) and distorted image. The main advantage of this measure is ease of computation, but it does not reflect perceptual quality. An important property of PSNR is that a slight spatial shift of an image can cause a large numerical distortion but, there would be no visual distortion and conversely, a small average distortion can result in a damaging visual artifact, if all the error is concentrated in a small important region. The performance values the PSNR calculated from the output image is compared with the PSNR values provided in the existing techniques, in the following tables2. TABLE II COMPARISON BETWEEN EXISTING AND PROPOSED TECHNIQUE BASED ON PSNR Cover Image Size Proposed Algorithm Sailboat 256x256 65.6274 Goldhill 300x256 66.0808 Peppers 400x400 69.4901 Lena 512x512 71.6319 6. Conclusion The proposed method is used to increase high capacity and optimized image steganography technique based on ant colony optimization algorithm. The ACO algorithm can find good solutions efficiently even though the search space is so large. Our experimental results show the proposed method provides acceptable image quality and secret message capacity. In future, some data encryption technique can be applied along with ABC to increase the security level. It may also be possible to optimize the fitness function of the current ABC algorithm. Algorithms like AFS and BFO can also be tried to view their performance with respect to the proposedmethod. References [1] Adi Shamir, “How to share a secret”, Communications of the ACM, vol. 22, no. 11, page(s): 612–613, 1979. [2] K.Shankar and P. Eswaran, “Sharing a Secret Image with Encapsulated Shares in Visual Cryptography”, Procedia Computer Science, vol. 70, page(s): 462–468,2015. [3] Shankar, K., & Eswaran, P. (2015). ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm. Int J Appl Eng Res, 10(55),1841-5. [4] K. Sathesh Kumar, K. Shankar, M. Ilayaraja, M. Rajesh, “Sensitive Data Security in Cloud Computing Aidof Different Encryption Techniques”, Journal of Advanced
  • 9. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 87 Research in Dynamical and Control Systems, Volume. 9, Issue. 18, page(s): 2888- 2899, December 2017. [5] K.Shankar, Lakshmanaprabu S. K, “Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm”, International Journal of Engineering & Technology, Volume. 7, Issue. 9, page(s): 22-27,2018. [6] Shankar, K., & Eswaran, P. (2016). An efficient image encryption technique based on optimized key generation in ECC using genetic algorithm. In Artificial Intelligence and Evolutionary Computations in Engineering Systems (pp. 705-714). Springer, New Delhi. [7] Shankar, K., & Eswaran, P. (2016). RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique. Journal of Circuits, Systems and Computers, 25(11),1650138. [8] Shankar, K., & Eswaran, P. (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118-130. [9] M. Ilayaraja, K. Shankar and G. Devika, “A Modified Symmetric Key Cryptography Method for Secure Data Transmission”, International Journal of Pure and Applied Mathematics, Volume 116, Issue. 10, page(s): 301-308, October2017. [10] K.Shankar. “An Optimal RSA Encryption Algorithm for Secret Images”, International Journal of Pure and Applied Mathematics, Volume 118, No. 20 page(s): 2491-2500, 2018. [11] Nur Aminudin, Andino Maseleno, K.Shankar, S. Hemalatha, K. Sathesh kumar, Fauzi, Rita Irviani, Muhamad Muslihudin, “Nur Algorithm on Data Encryption and Decryption”, International Journal of Engineering & Technology, Volume. 7, Issue- 2.26, page(s): 109-118, June2018. [12] K. Shankar, G. Devika and M. Ilayaraja, “Secure and Efficient Multi-Secret Image Sharing Scheme based on Boolean Operations and Elliptic Curve Cryptography”, International Journal of Pure and Applied Mathematics, Volume 116, Issue. 10, page(s): 293-300, October2017. [13] Shankar, K., & Eswaran, P. (2015). A secure visual secret share (VSS) creation scheme in visual cryptography using elliptic curve cryptography with optimization technique. Australian Journal of Basic & Applied Science, 9(36),150-163. [14] K.Shankar and P.Eswaran, “A New k out of n Secret Image Sharing Scheme in Visual Cryptography”, 2016 10th International Conference on Intelligent Systems and Control (ISCO), IEEE, page(s): 369–374,2016. [15] Pandi Selvam Raman, K.Shankar, Ilayaraja M, “Securing cluster based routing against cooperative black hole attack in mobile ad hoc network”, International Journal of Engineering & Technology, Volume. 7, Issue. 9, page(s): 6-9,2018. [16] B.suneetha, Secured Data Transmission Using Video Steganographic Scheme , Int. Journal of Engineering Research and Applications, Vol. 4, Issue.7, pp.243-246, 2014. [17] Cox, Ingemar, et al. Digital watermarking and steganography. Morgan Kaufmann, 2007. [18] Anjali Tiwari, Seema Rani Yadav and N.K. Mittal,A Review on Different Image Steganography Techniques, International Journal of Engineering and Innovative Technology (IJEIT), Vol.3, Issue.7,2014. [19] Stuti Goel, Arun Rana and Manpreet Kaur, A Review of Comparison Techniques of Image Steganography, Global Journal of Computer Science and Technology Graphics & Vision, Vol.13, Issue 4,2013.
  • 10. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 88 [20] Amanjot Kaur, Shruti Mittal, Steganography using Social Impact Theory based Optimization (SITO), International Journal of Computer Applications, Vol.101, No.16, 2014. [21] Bo-Luen Lai and Long-Wen Chang, Adaptive data hiding for images based on harr discrete wavelet transform, Advances in Image and Video Technology, pp: 1085- 1093, 2006. [22] Seyyed Amin Seyyedi and Nick Ivanov, High Payload and Secure Steganography Method Based on Block Partitioning and Integer Wavelet Transform, International Journal of Security and Its Applications, Vol.8, No.4, pp.183-194, 2014. [23] Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi, "High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm, In Proceedings of international multiconference of engineers and computer scientists, Vol.1, pp.16- 18. 2011. [24] S. Lee, C.D. Yoo and T. Kalker, Reversible image watermarking based on integer-to- integer wavelet transform, IEEE Transactions on Information Forensics and Security, Vol. 2, No.3, pp. 321-330,2007. [25] LiFan, Tiegang Gao, QuntingYang, YanjunCao, An extended matrix encoding algorithm for steganography of high embedding efficiency, Volume 37, Issue 6, pp.973-981, 2011. [26] Souvik Bhattacharyya and Gautam Sanyal, Data Hiding in Images in Discrete Wavelet Domain Using PMM, International Journal of Computer and Information Engineering, Vol.4, No.8, pp.1276-1284, 2010. [27] S. Bhattacharyya, A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier, Journal of Global Research in Computer Science, Volume 2, No. 4, pp.1-16,2011 [28] N.Vinothkumar and T.Vigneswaran ,Steganographic Method Image Security Based on Optimal Pixel Adjustment Process and Integer Wavelet Transform, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE), Vol. 2, Issue.3,2013. [29] Ching-Sheng Hsu and Shu-Fen Tu. Finding optimal LSB substitution using ant colony optimization algorithm, Communication Software and Networks, 2010. ICCSN'10. Second International Conference on. IEEE,2010. [30] Rafael Lima de Carvalho, Warley Gramacho da Silva, Ary Henrique Oliveira de Morais, Optimizing Image Steganography using Particle Swarm Optimization Algorithm, International Journal of Computer Applications, Vol.164, No.7,2017. [31] https://en.wikipedia.org/wiki/Ant_colony_optimization_algorithms [32] Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications,1-15. [33] Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of medical systems, 42(11),208. [34] Karthikeyan, K., Sunder, R., Shankar, K., Lakshmanaprabu, S. K., Vijayakumar, V., Elhoseny,M.,&Manogaran,G.(2018).EnergyconsumptionanalysisofVirtual Machine migration in cloud using hybrid swarm optimization (ABC–BA). The Journal of Supercomputing, 1-17. [35] Lakshmanaprabu, S. K., Shankar, K., Khanna, A., Gupta, D., Rodrigues, J. J., Pinheiro, P. R., & De Albuquerque, V. H. C. (2018). Effective Features to Classify
  • 11. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 89 Big Data Using Social Internet of Things. IEEE Access, 6,24196-24204. [36] Sahu, S., Singh, A. K., Ghrera, S. P., & Elhoseny, M. (2019). An approach for de- noising and contrast enhancement of retinal fundus image using CLAHE. Optics & Laser Technology, 110,87-98. [37] Metawa, N., Hassan, M. K., & Elhoseny, M. (2017). Genetic algorithm based model for optimizing bank lending decisions. Expert Systems with Applications, 80,75-82. [38] Elhoseny, M., Yuan, X., El Minir, H. K., & Riad, A. M. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024-2031. [39] Elhoseny, M., Elminir, H., Riad, A., & Yuan, X. (2016). A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3),262-275. [40] Elhoseny, M., Elminir, H., Riad, A. M., & Yuan, X. I. A. O. H. U. I. (2014). Recent advances of secure clustering protocols in wireless sensor networks. International Journal of Computer Networks and Communications Security, 2(11),400-413. [41] Maseleno, A., Hasan, M.M., Fuzzy Logic based analysis of the sepak takraw games ball kicking with the respect of player arrangement, World Applied Programming, vol. 2, Issue 5, May 2012, pp. 285-293. [42] Maseleno, A., Hasan, M.M., Skin Diseases expert system using Dempster-Shafer theory, International Journal Intelligent Systems and Applications, vol. 5, 2012, pp. 38-44. [43] Mulung, B.R., Maseleno, A., Proposed SMART Traffic signal control in Brunei Darussalam, Telkomnika, Vol. 15, No. 2, 2015, pp. 1-7. [44] Huda, M., Maseleno, A., Jasmi, K.A., Mustari, I., Basiron, B., Strengthening interaction from direct to virtual basis: insights from ethical and professional empowerment, International Journal of Applied Engineering Research, Vol.12, No. 17, 2017, pp. 6901-6909. [45] Maseleno, A., Tang, A.Y.C., Mahmoud, M.A., Othman, M., Saputra, S., Muslihudin, M., Fuzzy AHP method to determine headache types based on symptoms, Investigacion Clinica, Vol. 58, 2017. [46] Huda, M., Maseleno, A., Atmotiyoso, P., Siregar, M., Ahmad, R., Jasmi, K.A., Muhamad, N.H.N, Mustari, I.M., Basiron, B., Big Data Emerging Technology: Insights into Innovative Environment for Online Learning Resources, International Journal of Emerging Technologies in Learning, Vol. 13, No. 1, 2017, pp. 23-36. [47] Muslihudin, M., Latif, A., Ipnuwati, S., Wati, R., Maseleno, A., A solution to competency test expertise of engineering motorcycles using simple additive weighting approach, Int J. Pure Appl. Math, Vol. 118, No. 7, 2018, pp. 261-267. [48] Mukodimah, S., Mulihudin, M., Andoyo, A., Hartati, S., Maseleno, A., Fuzzy simple additive weighting and its application to toddler healthy food, Int. J. Pure Appl. Math, Vol. 118, No. 7, 2018, pp. 1-7. [49] Muslihudin, M., Susanti, T.S., Maseleno, A., The priority of rural road development using fuzzy logic based simple additive weighting, Int. J. Pure Appl. Math, Vol. 118, No. 8, 2018, pp. 9-16. [50] Irviani, R., Dinulhaq, I., Irawan, D., Renaldo, R., Maseleno, A., Areas prone of the bad nutrition based multi attribute decision making with fuzzy simple additive weighting for optimal analysis, Int. J. Pure Appl. Math, Vol. 118, No. 7, 2018, pp. 589-596. [51] Oktafianto, Akbar, M.R.A., Fitrian, Y., Zulkifli, Sodikin, Wulandari, Maseleno, A., Dismisall working relationship using Analytical Hierarchy Process Method, Int. J. Pure Appl. Math, Vol. 118, No. 7, 2018, pp. 177-183.
  • 12. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 90 [52] Susilowati, T., Anggraeni, E.Y., Fauzi, Andewi, W., Handayi, Y., Maseleno, A., Using profile matching method to employess position movement, International Journal of Pure and Applied Mathematics, Vol. 118, No. 7, 2018, pp. 415-422. [53] Maseleno, A., Fauzi, Nungsiyati, Noviarti, T., Muslihudin, M., Irviani, R., Optimal dengue endemic region prediction using fuzzy simple additive weighting based algorithm, International Journal of Pure and Applied Mathematics, Vol. 118, No. 7, 2018, pp. 472-477. [54] Muslihudin, M., Wanti, R, Hardono, N., Shankar, K., Ilayaraja, M., Maseleno, A., Mustofa, D.R., Fauzi, Masrur, M., Mukodimah, S., Prediction of layer chicken disease using fuzzy analytical hierarchy process, International Journal of Engineering & Technology (UAE), Vol. 7, No. 2.26, 2018, pp. 90-94. [55] Maseleno, A., Pardimin, Huda, M., Ramlan, Hehsan, A., Yusof, Y.M., Haron, Z., Ripin, M.N., Nor, N.H.M., Junaidi, J., Mathematical theory of evidence to subject expertise diagnostic, ICIC Express Letters, Vol. 12, No. 4, 2018. [56] Aminudin, N., Sundari, E., Shankar, K., Deepalakshmi, P., Irviani, R., Fauzi, Maseleno, A., Weighted product and its application to measure employee performance, International Journal of Engineering & Technology (UAE), Vol. 7, No. 2.26, 2018, pp. 102-108. [57] Putra, D.A.D, Jasmi, K.A., Basiron, B., Huda, M., Maseleno, A., Shankar, K., Aminudin, N., Tactical steps for e-government development, International Journal of pure and applied mathematics, Vol. 119, No. 15, 2018, pp. 2251-2258. [58] Sugiyarti, E., Jasmi, K.A., Basiron, B., Huda, M. Shankar, K., Maseleno, A., Decision support system of scholarship grantee selection using data mining, International Journal of Pure and Applied Mathematics, Vol. 119, No. 15, 2018, pp. 2239-2249. [59] Kurniasih, D., Jasmi, K.A., Basiron, B., Huda, M., Maseleno, A., The uses of fuzzy logic method for finding agriculture and livestock value of potential village, International Journal of Engineering & Technology (UAE), Vol. 7, No. 3, 2018, pp. 1091-1095. [60] Adela, H., Jasmi, K.A., Basiron, B., Huda, M., Maseleno, A., Selection of dancer nmember using simple additive weighting, International Journal of Engineering & Technology (UAE), Vol. 7, No. 3, 2018, pp. 1096-1107. [61] Maseleno, A., Sabani, N., Huda,M., Ahmad, R., Jasmi, K.A., Basiron, B., Demystifying learning analytics in personalised learning, International Journal of Engineering & Technology (UAE), Vol. 7, No. 3, 2018, pp. 1124 -1129. [62] Amin, M.M., Nugratama, M.A.A., Maseleno, A., Huda, M., Jasmi, K.A., Design of cigarette disposal blower and automatic freshner using mq-5 sensor based on atmega 8535 microcontroller, International Journal of Engineering & Technology (UAE), Vol. 7, No. 3, 2018, pp. 1108 -1113. [63] Assahubulkahfi, M., Sam, Y.M., Maseleno, A., Huda, M., LQR Tuning by Particle Swarm Optimization of Full Car Suspension System, International Journal of Engineering & Technology (UAE), Vol. 7, No. 2.13, 2018, pp. 328-331. [64] Amin, M.M., Maseleno, A., Shankar, K., Perumal, E., Vidhyavathi, R.M., Lakshmanaprabu, S.K., Active Database System Approach and Rule Based in the Development of Academic Information System, International Journal of Engineering & Technology (UAE), Vol. 7, No. 2.26, 2018, pp. 95-101. [65] Maseleno, A., Tang, A.Y.C., Mahmoud, M.A., Othman, M., Negoro, Y.S., Boukri, S., Shankar, K., Abadi, S. Muslihudin, M., The Application of Decision Support System by using Fuzzy SAW Method in Determining the Feasibility of Electrical Installations in Customer’s House, International Journal of Pure and Applied Mathematics, Vol. 119, No. 16, 2018, pp. 4277-4286.
  • 13. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 91 [66] Lydia, E. L., Kumar, P.K., Shankar, K., Lakshmanaprabu, S.K., Vidhyavathi, R.M., Maseleno, A., Charismatic Document Clustering through Novel K-Means Non- negative Matrix Factorization (KNMF) Algorithm using Key Phrase Extraction, International Journal of Parallel Programming, Springer, 2018, pp. 1-19. [67] Susilowati, T., Dacholfany, M.I., Amini, S., Ikhwan, A., Nasir, B.M., Huda, M., Prasetyo, A., Maseleno, A., Satria, F., Hartati, S., Getting Parents Involved in Child’s School: Using Attendance Application System Based on SMS Gateway, International Journal of Engineering and Technology (UAE), Vol. 7, No. 2.27, 2018, pp. 167-174. [68] Abadi, S., Huda, M., Hehsan, A., Ripin, M.N., Haron, Z., Muhamad, NHN, Rianto, R., Maseleno, A., Renaldo, R., Syarifudin, A., Design of student score application for assessing the most outstanding student at vocational high school. International Journal of Engineering and Technology, Vol. 7, No. 2.27, 2018, pp. 172-177. [69] Aminudin, N., Sundari, E., Shankar, K., Deepalakshmi, P., Fauzi, Irviani, R., Maseleno, A., Weighted Product and Its Application to Measure Employee Performance, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.26, 2018, pp. 102-108. [70] Abadi, S. Huda, M., Basiron, B, Ihwani, S.S., Jasmi, K.A., Hehsan, A., Safar, J., Mohamed, A.K., Embong, W.H.W., Mohamad, A.M., Noor, S.S.M., Novita, D., Maseleno, A., Irviani, R., Idris, M., Muslihudin, M., Implementation of Fuzzy Analytical Hierarchy Process on Notebook Selection, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.26, 2018, pp. 102-108. [71] Anggraeni, E.Y., Huda, M., Maseleno, A., Safar, J., Jasmi, K.A., Mohamed, A.K., Hehsan, A., Basiron, B., Ihwani, S.S., Embong, W.H.W., Mohamad, A.M., Noor, S.S.M., Fauzi, A.N., Wijaya, D.A., Poverty Level Grouping using SAW Method, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 218-224. [72] Abadi, S., Huda, M., Jasmi, K.A., Noor, S.S.M., Safar, J., Mohamed, A.K., Embong, W.H.W., Mohamad, A.M., Hehsan, A., Basiron, B., Ihwani, S.S., Maseleno, A., Muslihudin, M., Satria, F., Irawan, D., Hartati, S., Determination of the Best Quail Eggs using Simple Additive Weighting, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 225-230. [73] Abadi, S., Huda, M., Hehsan, A., Mohamad, A.M., Basiron, B., Ihwani, S.S., Jasmi, K.A., Safar, J., Mohamed, A.K., Embong, W.H.W., Noor, S.S.M., Brahmono, B., Maseleno, A., Fauzi, A.N., Aminudin, N., Gumanti, M., Design of Online Transaction Model on Traditional Industry in order to Increase Turnover and Benefits, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018,pp. 231-237. [74] Susilowati, T., Teh, K.S.M., Nasir, B.M., Don, A.G., Huda, M., Hensafitri, T., Maseleno, A., Oktafianto, Irawan, D., Learning Application of Lampung Language based on Multimedia Sofware, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 175-181. [75] Abadi, S., Nasir, B.M., Huda, M., Ivanova, N.L., Sari, T.I., Maseleno, A., Satria, F., Muslihudin, M., Application model of k-means clustering: Insights into promotion strategy of vocational high school, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 182-187. [76] Septiropa, Z., Osman, M.H., Rahman, A.B.A., Arifin, M.A.M., Huda, M., Maseleno, A., Profile of cold-formed steel for compression member design a basic combination,International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 284-290. [77] Ristiani, Pardimin, Teh, K.S.M., Fauzi, A., Hananto, A.L., Huda, M., Muslihudin, M., Shankar, K., Maseleno, A., Decision Support System Model for Selection of Best
  • 14. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 92 Formula Milk for toddlers using Fuzzy Multiple Attribute Decision Making, Journal of Advanced Research in Dynamical and Control Systems, Vol. 10, 02-Special Issue, 2018. [78] Hamid, A., Sudrajat, A., Kawangit, R.M., Don, A.G., Huda, M., Jalal, B., Akbar, W., Onn, A., Maseleno, A., Determining basic food quality using SAW, International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 3548-3555, 2018. [79] Oktafianto, Kawangit, A.S., Kawangit, R.M., Don, A.G., Huda, M., Saputri, A.D., Latif, A.A., Maseleno, A., Determining housing location using weighted product, International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 3563- 3568, 2018. [80] Fauzi, Huda, M., Teh, K.S.M., Haron, Z., Ripin, M.N., Hehsan, A., Abas, H., Rafiq, M., Irawan, J., Abadi, S., Maseleno, A., The Design of Fuzzy Expert System Implementation for Analyzing Transmissible Disease of Human, International Journal of Pharmaceutical Research, Vol. 10, Issue 4, 2018. [81] Abadi, S., Huda, M., Teh, K.S.M., Haron, Z., Ripin, M.N., Hehsan, A., Sarip, S., Hehsan, M.R., Amrullah, M., Maseleno, A., Hazard Level of Vehicle Smoke by Fuzzy Multiple Attribute Decision Making with Simple Additive Weighting Method, International Journal of Pharmaceutical Research, Vol. 10, Issue 4, 2018. [82] Kamenez, N.V., Vaganova, O.I., Smirnova, Z.V., Bulayeva, M.N., Kuznetsova, E.A., Maseleno, A., Experience of the use of electronic training in the educational process of the Russian higher educational institution, International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 4085-4089, 2018. [83] Vaganova, O.I., Zanfir, L.N., Smirnova, Z.V., Chelnokova, E.A., Kaznacheeva, S.N., Maseleno, A., On the linguistic training of future teachers of unlike specialties under the conditions of Russian professional education, International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 4090-4095, 2018. [84] Vaganova, O.I., Kamenez, N.V., Sergeevna, V.I., Vovk, E.V., Smirnova, Z.V., Maseleno, A., Possibilities of information technologies to increase quality of educational services in Russia, International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 4096-4102, 2018. [85] Smirnova, Z.V., Zanfir, L.N., Vaganova, O.I., Bystrova, N.V., Frolova, N.V., Maseleno, A., WorldSkills as means of improving quality of pedagogical staff training, International Journal of Engineering and Technology(UAE), Vol. 7, No. 4, pp. 4103-4108, 2018. [86] Aminin, S., Dacholfany, M.I., Mujib, A., Huda, M., Nasir, B.M., Maseleno, A., Sundari, E., Masrur, M., Design of library application system,International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 199-204. [87] Aminudin, N., Huda, M., Kilani, A., Embong, W.H.W., Mohamed, A.M., Basiron, B., Ihwani, S.S., Noor, S.S.M., Jasmi, K.A., Higher education selection using simple additive weighting,International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 211-217. [88] Aminudin, N., Huda, M., Hehsan, A., Ripin, M.N., Haron, Z., Junaidi, J., Irviani, R., Muslihudin, M., Hidaya, S., Maseleno, A., Gumanti, M., Fauzi, A.N., Application program learning based on Android for students experiences, International Journal of Engineering and Technology(UAE), Vol. 7, No. 2.27, 2018, pp. 194-198. [89] Maseleno, A., Huda, M., Jasmi, K.A., Basiron, B., Mustari, I., Don, A.G., and Ahmad, R. Hau-Kashyap approach for student’s level of expertise. Egyptian Informatics Journal, 2018. [90] Huda, M., Maseleno, A., Teh, K.S.M., Don, A.G., Basiron, B., Jasmi, K.A., Mustari, M.I., Nasir, B.M., Ahmad, R., Understanding Modern Learning Environment (MLE) in Big Data Era, International Journal of Emerging Technologies in Learning
  • 15. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 93 (iJET),Vol. 13, No. 5, 2018, pp. 71-85. [91] Maseleno, A., Tang, A.Y.C., Mahmoud, M.A., Othman, M., Shankar, K., Big Data and E-Learning in Education, International Journal of Computer Science and Network Security, Vol. 18, No. 5, pp. 171-174. [92] Shankar, K., Lakshmanaprabu, S.K., Gupta, D., Maseleno, A., De Albuquerque, V.H.C., Optimal feature-basedmulti-kernel SVM approach for thyroid disease classification, The Journal of Supercomputing, Springer, Vol. 74, no. 259, 2018, pp. 1- 16. [93] Amin, M.M., Sutrisman, A., Stiawan, D., Maseleno, A., Design Restful WebService of National Population Database for supporting E-health interoperability service, Journal of Theoretical and Applied Information Technology, vol. 96, issue 15, 2018. [94] Surendar, A., Akhmetov, L.G., Ilyashenko, L.K., Maseleno, A., Samavatian, V., Effect of thermal cycle loadings on mechanical properties and thermal conductivity of a porous lead-free solder joint, IEEE Transactions on Components, Packaging, and Manufacturing Technology, 2018, pp. 1769-1776. [95] Surendar, A., Samavatian, V., Maseleno, A., Ibatova, A.Z., Samavatian, M., Effect of solder layer thickness of thermo-mechanical reliability of a power electronic system, Journal of Material Science: Materials in Electronics, Springer, September 2018, Volume 29, Issue 17, pp. 15249-15258. [96] Samavatian, M., Ilyashenko, L.K., Surendar, A., Maseleno, A., Samavatian, V., Effect of System Design on Fatigue Life of Solder Joints in BGA Packages Under Vibration at Random Frequencies, Journal of Electronic Materials, November 2018, Volume 47, Issue 11, pp. 6781-6790. [97] Javanshir, I., Maseleno, A., Tasoujian, S., Oveisi, M., Optimization of suspension system of heavy off-road vehicle for stability enhancement using integrated anti-roll bar and coiling spring mechanism, Journal of Central South University, September 2018, Volume 25, Issue 9, pp 2289–2298. [98] Surendar, A., Bozorgian, A., Maseleno, A., Ilyashenko, L.K., Najafi, M., Oxidation of Toxic Gases via Ge-B36N36 and Ge-C72 Nanocages as Potential Calaysts, Inorganic Chemistry Communications, Elsevier, Vol. 96, October 2018, pp. 206-210. [99] Namdarian, A., Tabrizi, A.G., Maseleno, A., Mohammadi, A., Mossavifard, S.E., One step synthesis of rGO-Ni3S2 nano-cubes composite for high-performance supercapacitor electrodes, International Journal of Hydrogen Energy, Elsevier, vol. 43, Issue 37, 13 September 2018, pp.17780-17787. [100] Motlagh, A.H., Klyuev, S.V., Surendar, A., Ibatova, A.Z., Maseleno, A., Catalytic Gasification of Oil Sludge with Calcined Dolomite, Petroleum Science and Technology, Taylor and Francis, pp. 1-5, 2018. [101] Elhoseny, M., Elleithy, K., Elminir, H., Yuan, X., & Riad, A. (2015). Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm towards balancing energy exhaustion. International Journal of Scientific & Engineering Research, 6(8),1243-1252. [102] Elhoseny, M., Yuan, X., Yu, Z., Mao, C., El-Minir, H. K., & Riad, A. M. (2015). Balancing energy consumption in heterogeneous wireless sensor networks using genetic algorithm. IEEE Communications Letters, 19(12),2194-2197. [103] Fang, B., Guo, X., Wang, Z., Li, Y., Elhoseny, M., & Yuan, X. (2019). Collaborative task assignment of interconnected, affective robots towards autonomous healthcare assistant. Future Generation Computer Systems, 92,241-251. [104] Sivaram, M., B. DurgaDevi, and J. Anne Steffi. "Steganography of two LSB bits." International Journal of Communications and Engineering 1.1 (2012): 2231-2307. [105] Manikandan, v., v. Porkodi, amin salih mohammed, and m. Sivaram. "Privacy Preserving Data
  • 16. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 94 Mining Using Threshold Based Fuzzy Cmeans Clustering." ICTACT Journal on Soft Computing 9, no. 1 (2018). [106] Malathi, N., and M.Sivaram. "An Enhanced Scheme to Pinpoint Malicious Behavior of Nodes In Manet’s." (2015). [107] Mohammed, Amin Salih, D. Yuvaraj, M. Sivaram, and V. Porkodi. "Detection And Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol." International Journal of Advanced Research in Computer Science 10, no. 6 (2018). [108] Sivaram, M., D. Yuvaraj, Amin Salih Mohammed, V. Porkodi, and V. Manikandan. "The Real Problem Through a Selection Making an Algorithm that Minimizes the Computational Complexity." [109] Porkodi, V., M. Sivaram, Amin Salih Mohammed, and V. Manikandan. "Survey on White-Box Attacks and Solutions." Asian Journal of Computer Science and Technology 7, no. 3 (2018): 28- 32. [110] Sivaram, M. "Odd And Even Point Crossover Based Tabu Ga For Data Fusion In Information Retrieval." (2014). [111] Dhivakar, B., S. V. Saravanan, M. Sivaram, and R. Abirama Krishnan. "Statistical Score Calculation of Information Retrieval Systems using Data Fusion Technique." Computer Science and Engineering 2, no. 5 (2012): 43-45. [112] Punidha, R., avithra K, Swathika R, and Sivaram M, “ Preserving DDoS Attacks sing Node Blocking Algorithm.” International Journalof Pure and Applied Mathematics, Vol.119, o. 15, 2018, pp 633-640. https://acadpubl.eu/hub/2018-119-15/3/473.pdf [113] M, Sivaram, et al. “Securing the Sensor Networks Along With Secured Routing Protocols for Data Transfer in Wireless Sensor Networks.” Journal of Emerging Technologies and Innovative Research, vol. 5, no. 10, Oct. 2018, pp. 316–321., doi:http://doi.one/10.1729/Journal.18612. [114] Steffin Abraham , Tana Luciya Joji , Sivaram M, D.Yuvaraj, “Enhancing Vehicle Safety With Drowsiness Detection Andcollision Avoidance” International Journal of Pure and Applied Mathematics, Volume 118 No. 22 2018, 921-927. https://acadpubl.eu/hub/2018-118- 22/articles/22b/39.pdf [115] Mahalakshmi.K, Sivaram.M, Shantha Kumari.K, Yuvaraj.D, Keerthika.R, “Healthcare Visible Light Communication”, International Journal of Pure and Applied Mathematics, Volume 118 No. 11 2018, 345-348, https://acadpubl.eu/jsi/2018-118-10-11/articles/11/41.pdf. [116] Punidha.R, Sivaram.M, “Integer Wavelet Transform Based Approach For High Robustness Of Audio Signal Transmission”, International Journal of Pure and Applied Mathematics, Volume 116 No. 23 2017, 295-304, https://acadpubl.eu/jsi/2017-116-23-24/articles/23/40.pdf [117] Deepa.S, Sivaram.M, “Enabling Anonymous Endorsement In Clouds With Decentralized Access Control”, International Journal of Scientific Engineering and Applied Science (IJSEAS) - Volume-1, Issue-3, June 2015, 397-401. [118] Sivaram.M, Obulatha.O, “ Position Privacy Using LocX”, International Journal of Innovative Research in Engineering Science and Technology, Vol. III,Issue 01,Pp 206-212. [119] M. Sivaram, K. Batri, Amin Salih Mohammed and V. Porkodi, “Exploiting the Local Optima in Genetic Algorithm using Tabu Search”, Indian Journal of Science and Technology, Vol 12(1), DOI: 10.17485/ijst/2018/v12i1/139577, January 2019. [120] Sivaram M, Batri K, “ Odd and Even Point Crossover Based Tabu GA for Data Fusion in InformationRetrieval”, http://hdl.handle.net/10603/38935,10-Apr-2015. [121] Sivaram.M, Yuvaraj.D, Amin Salih Mohammed, Porkodi.V “Estimating the Secret Message in the Digital Image” International Journal of Computer Applications, 181(36):26-28, January 2019. [122] Mrs.V.Porkodi, Dr.D.Yuvaraj, Dr.Amin Salih Mohammed,V.Manikandan and M.Sivaram, “Prolong the Network Lifespan of Wireless Sensor Network by Using Hpsm”, International Journal of Mechanical Engineering and Technology, 10(01), 2019, pp.2039– 2045.http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=10&Type=01 [123] Porkodi.V, Yuvaraj.D., Mohammed,A.S, Sivaram.M and Manikandan.V,”IoT in Agriculture”
  • 17. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 1, Mar-Apr 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 95 Journal of Advanced Research in Dynamical and Control Systems, Pages: 1986-1991,14-Special Issue, Pages: 1986-1991,2018. [124] Manikandan.V, Mohammed, A.S, Yuvaraj,D., Sivaram.M and Porkod.V, “An Energy Efficient EDM-RAEED Protocol for IoT Based Wireless Sensor Networks” Journal of Advanced Research in Dynamical and Control Systems, Pages: 1992-2004,14-Special Issue,Pages: 1992-2004, 2018. [125] Mohammed, A.S., Kareem, S.W., Al Azzawi, A.K., Sivaram, M. “Time series prediction using SRE-NAR and SRE-ADALINE”, Journal of Advanced Research in Dynamical and Control Systems, Pages:1716-1726, 2018. [126] Sivaram, M., Yuvaraj, D., Porkodi, V., Manikandan, V. “Emergent news event detection from facebook using clustering” Journal of Advanced Research in Dynamical and Control Systems, Pages:1941-1947, 2018. [127] Nithya, S., Sundara Vadivel, P., Yuvaraj, D., Sivaram, M. “Intelligent based IoT smart city on traffic control system using raspberry Pi and robust waste management”, Journal of Advanced Research in Dynamical and Control Systems, Pages: 765-770, 2018. [128] Viswanathan, M., Sivaram, M., Yuvaraj, D., Mohammed, A.S. “Security and privacy protection in cloud computing”, Journal of Advanced Research in Dynamical and Control Systems, Pages 1704- 1710, 2018 [129] Batri, K., Sivaram, M. “Testing the impact of odd and even point crossover of genetic algorithm over the data fusion in information retrieval”, European Journal of Scientific Research, 2012. [130] Sivaram Yuvaraj Amin Salih Mohamme M D V Porkodi. Estimating the Secret Message in the Digital Image. International Journal of Computer Applications 181(36):26-28, January 2019