This document summarizes a research article that proposes a new image steganography technique based on ant colony optimization (ACO) algorithm. The technique aims to increase data hiding capacity and optimize image quality. It uses integer wavelet transform to transform image coefficients, then applies an ACO algorithm to find optimal coefficients for embedding secret data. Experimental results on sample images showed no visual difference between original and stego images, demonstrating the technique increases robustness and embedding capacity without degrading image quality. The proposed technique is compared to existing methods based on peak signal-to-noise ratio, showing it provides higher PSNR values and better image quality.
This document describes a steganographic method based on integer wavelet transform and genetic algorithm. The proposed method embeds secret messages into the integer wavelet transform coefficients of images. A genetic algorithm is used to generate an optimal mapping function for embedding bits into coefficients in 8x8 blocks. After embedding, an optimal pixel adjustment process is applied to minimize differences between the original and embedded images. Experimental results on Lena and Baboon images show the proposed method achieves higher data hiding capacity and PSNR values than previous related work.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
This document summarizes a research paper that proposes a new method for securely transmitting images using image segmentation, permutation, and multi-encryption techniques. It begins with an abstract that outlines encrypting images to protect confidential data from unauthorized access. It then provides background on encryption and discusses how traditional text encryption is not suitable for large image files. The proposed method segments an image, permutes the pixels using random numbers, and repeats the encryption multiple times for security. It claims this approach provides strong encryption with minimal data loss or computational costs compared to other methods.
This document describes a steganographic method based on integer wavelet transform and genetic algorithm. The proposed method embeds secret messages into the integer wavelet transform coefficients of images. A genetic algorithm is used to generate an optimal mapping function for embedding bits into coefficients in 8x8 blocks. After embedding, an optimal pixel adjustment process is applied to minimize differences between the original and embedded images. Experimental results on Lena and Baboon images show the proposed method achieves higher data hiding capacity and PSNR values than previous related work.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
This document summarizes a research paper that proposes a new method for securely transmitting images using image segmentation, permutation, and multi-encryption techniques. It begins with an abstract that outlines encrypting images to protect confidential data from unauthorized access. It then provides background on encryption and discusses how traditional text encryption is not suitable for large image files. The proposed method segments an image, permutes the pixels using random numbers, and repeats the encryption multiple times for security. It claims this approach provides strong encryption with minimal data loss or computational costs compared to other methods.
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
In recent time, the Steganography technique is broadly used for the secret data communication. It’s an art of hiding the secret data in another objects like videos, images, videos, graphics and documents to gain the stego or steganographic object so which it’s not affected by the insertion. In this paper, we are introducing a new methodology in which security of stego-image increase by embedding even and odd part secret image into R, G, B plane of cover image using LSB and ISB technique. As we can see from the results session the value of PSNR , NCC are getting increase while the value of MSE is getting decrease.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document proposes an adaptive steganography technique for hiding secret data in digital images. The technique uses variable bit length embedding based on wavelet coefficients of the cover image. A logistic map is used to generate a secret key, which determines the RGB color planes and blocks used for data hiding. Wavelet coefficients are classified into ranges, and the number of bits hidden corresponds to the coefficient value range. Extraction involves selecting the same coefficients based on the key and calculating the hidden bits. The technique aims to improve security, capacity and imperceptibility compared to existing constant bit length methods. Evaluation shows the proposed method provides good security since variable bits are hidden randomly using the secret key.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform IJECEIAES
Multiple Secret Image Sharing scheme is a protected approach to transmit more than one secret image over a communication channel. Conventionally, only single secret image is shared over a channel at a time. But as technology grew up, there is a need to share more than one secret image. A fast (r, n) multiple secret image sharing scheme based on discrete haar wavelet transform has been proposed to encrypt m secret images into n noisy images that are stored over different servers. To recover m secret images r noise images are required. Haar Discrete Wavelet Transform (DWT) is employed as reduction process of each secret image to its quarter size (i.e., LL subband). The LL subbands for all secrets have been combined in one secret that will be split later into r subblocks randomly using proposed high pseudo random generator. Finally, a developed (r, n) threshold multiple image secret sharing based one linear system has been used to generate unrelated shares. The experimental results showed that the generated shares are more secure and unrelated. The size reductions of generated shares were 1:4r of the size of each of original image. Also, the randomness test shows a good degree of randomness and security.
Efficient Reversible Data Hiding Algorithms Based on Dual Predictionsipij
In this paper, a new reversible data hiding (RDH) algorithm that is based on the concept of shifting of
prediction error histograms is proposed. The algorithm extends the efficient modification of prediction
errors (MPE) algorithm by incorporating two predictors and using one prediction error value for data
embedding. The motivation behind using two predictors is driven by the fact that predictors have different
prediction accuracy which is directly related to the embedding capacity and quality of the stego image. The
key feature of the proposed algorithm lies in using two predictors without the need to communicate
additional overhead with the stego image. Basically, the identification of the predictor that is used during
embedding is done through a set of rules. The proposed algorithm is further extended to use two and three
bins in the prediction errors histogram in order to increase the embedding capacity. Performance
evaluation of the proposed algorithm and its extensions showed the advantage of using two predictors in
boosting the embedding capacity while providing competitive quality for the stego image.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
IRJET- Data Embedding using Image SteganographyIRJET Journal
This document presents a method for secure communication using both steganography and cryptography techniques. It discusses embedding encrypted text into an image using discrete wavelet transform (DWT). Specifically, it first encrypts a text message using the advanced encryption standard (AES) algorithm. It then embeds the encrypted text into an image by applying DWT to decompose the image into sub-bands and hiding the data in the high frequency sub-bands. MATLAB is used to implement a graphical user interface that allows a sender to encrypt a message, embed it into an image, and send the stego-image to a receiver. The receiver interface extracts the encrypted text from the stego-image and decrypts it using AES. The method aims to
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
This document proposes a new hybrid approach for improving data security and reducing the size of hidden data in image steganography. It uses three techniques: 1) Huffman encoding is applied to compress the text message, 2) DNA encryption is applied to the compressed data, and 3) a state transition algorithm is used to update the pixel locations in the cover image where bits will be hidden. The implementation and evaluation of the proposed technique shows that it provides higher security than traditional techniques like LSB, LF-DCT, and MF-DCT substitution. It is also more efficient and secure while maintaining good image quality as measured by PSNR and MSE metrics.
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
This document summarizes research on using machine learning techniques for data security, specifically steganography (hiding secret messages within images). It discusses how machine learning algorithms like support vector machines (SVM) can help smooth distorted images and retrieve lost data after a secret message is hidden within an image. The document reviews several related works applying techniques like least significant bit substitution, artificial immune systems, deep learning models for steganalysis, and hash-based approaches. It concludes that the goal is to develop an application for information security using machine learning algorithms to better handle any data loss during transmission from source to destination.
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
This document proposes a new chaos-based image encryption and decryption scheme using Arnold's cat map for pixel permutation and the Lorenz system for diffusion. A hash function, specifically MurmurHash3, is used to generate the permutation and diffusion keys. This helps accelerate the diffusion process and reduces the number of cipher cycles needed compared to previous schemes. The encryption process involves first permuting the pixel positions using the cat map, with control parameters determined by the hash value of the original image. Then diffusion is performed using the Lorenz system to generate the keystream. Decryption follows the reverse process using the same keys. Security analysis demonstrates the scheme has a large key space and the encrypted images pass various statistical tests, indicating the
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
This document summarizes a research paper that proposes a new data embedding technique called adaptive pixel pair matching (APPM) for digital image steganography. The APPM technique hides secret data by replacing pairs of pixels in the cover image with coordinates that represent the hidden data. This allows data to be hidden in any numerical system. The document outlines existing steganography techniques including least significant bit replacement and transform domain methods. It then describes the proposed APPM technique in more detail, asserting it offers lower distortion than other methods by providing more compact pixel neighborhoods and flexible numerical representation of hidden data.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
The document describes a proposed asymmetric image encryption scheme based on the Massey Omura cryptosystem. The scheme works as follows: the sender and receiver agree on public parameters like a prime number p. The sender then represents the plaintext image as a matrix and encrypts it using their public key to get the first ciphertext image. This is sent to the receiver who encrypts it again with their public key to produce the second ciphertext image, which is sent back to the sender. The sender decrypts this using their private key to produce the third ciphertext image, which is sent to and decrypted by the receiver using their private key to recover the original plaintext image. The document provides an example of implementing the scheme and discusses evaluating its security using
IRJET- Machine Learning Application for Data SecurityIRJET Journal
1) The document proposes a machine learning approach for improving data security through steganography. It hides secret messages in images by modifying pixel values and uses machine learning models like SVM and DNN for smoothing distorted images and retrieving lost data.
2) The method first appends a secret text file onto an image, then performs image-to-image steganography to provide additional security. It decrypts the stego images and uses an SVM for classification and noise removal, along with a DNN network model.
3) Experimental results show that as the size of the hidden text file increases, more noise is introduced, but the machine learning models can effectively smooth the images and retrieve the lost message bits.
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingIJMTST Journal
Now a day with incredible change in social media network like mobile communication and computer, all
type of a data such as audio, video, images are used for the communication .Privacy for that data is an
important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing
integrity of that data. In research area encryption and decryption scheme is used based on image pixel
shuffling and transposition. For security purpose we can use cipher algorithm for generating key using RGB
values of the pixel instead of using only pixel values. For that purpose in our proposed system we are using
m*n size image on which different operations can be performed. Our proposed system is more secure as
compare to existing system.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
This document proposes a new hybrid algorithm for enhanced data security combining encryption, compression, and steganography. It first describes existing algorithms and their limitations. It then proposes a new encryption algorithm using pseudo-random number generation and key scheduling. Encrypted data is compressed with LZW and hidden in an image using modified LSB steganography. Analysis shows this hybrid algorithm improves security parameters like timing and distortion compared to existing methods.
A new partial image encryption method for document images using variance base...IJECEIAES
The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the partially encrypted image. Two levels of diffusion are performed. The first level simply modifies the pixels in the partially encrypted image with the Bernoulli’s chaotic map. The second level establishes the interdependency between rows and columns of the first level diffused image. The experiment is conducted for both partial and complete image encryption on the Document images. The proposed scheme yields better results for both partial and complete encryption on Speed, statistical and dynamical attacks. The results ensure better security when compared to existing encryption schemes.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
In recent time, the Steganography technique is broadly used for the secret data communication. It’s an art of hiding the secret data in another objects like videos, images, videos, graphics and documents to gain the stego or steganographic object so which it’s not affected by the insertion. In this paper, we are introducing a new methodology in which security of stego-image increase by embedding even and odd part secret image into R, G, B plane of cover image using LSB and ISB technique. As we can see from the results session the value of PSNR , NCC are getting increase while the value of MSE is getting decrease.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document proposes an adaptive steganography technique for hiding secret data in digital images. The technique uses variable bit length embedding based on wavelet coefficients of the cover image. A logistic map is used to generate a secret key, which determines the RGB color planes and blocks used for data hiding. Wavelet coefficients are classified into ranges, and the number of bits hidden corresponds to the coefficient value range. Extraction involves selecting the same coefficients based on the key and calculating the hidden bits. The technique aims to improve security, capacity and imperceptibility compared to existing constant bit length methods. Evaluation shows the proposed method provides good security since variable bits are hidden randomly using the secret key.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform IJECEIAES
Multiple Secret Image Sharing scheme is a protected approach to transmit more than one secret image over a communication channel. Conventionally, only single secret image is shared over a channel at a time. But as technology grew up, there is a need to share more than one secret image. A fast (r, n) multiple secret image sharing scheme based on discrete haar wavelet transform has been proposed to encrypt m secret images into n noisy images that are stored over different servers. To recover m secret images r noise images are required. Haar Discrete Wavelet Transform (DWT) is employed as reduction process of each secret image to its quarter size (i.e., LL subband). The LL subbands for all secrets have been combined in one secret that will be split later into r subblocks randomly using proposed high pseudo random generator. Finally, a developed (r, n) threshold multiple image secret sharing based one linear system has been used to generate unrelated shares. The experimental results showed that the generated shares are more secure and unrelated. The size reductions of generated shares were 1:4r of the size of each of original image. Also, the randomness test shows a good degree of randomness and security.
Efficient Reversible Data Hiding Algorithms Based on Dual Predictionsipij
In this paper, a new reversible data hiding (RDH) algorithm that is based on the concept of shifting of
prediction error histograms is proposed. The algorithm extends the efficient modification of prediction
errors (MPE) algorithm by incorporating two predictors and using one prediction error value for data
embedding. The motivation behind using two predictors is driven by the fact that predictors have different
prediction accuracy which is directly related to the embedding capacity and quality of the stego image. The
key feature of the proposed algorithm lies in using two predictors without the need to communicate
additional overhead with the stego image. Basically, the identification of the predictor that is used during
embedding is done through a set of rules. The proposed algorithm is further extended to use two and three
bins in the prediction errors histogram in order to increase the embedding capacity. Performance
evaluation of the proposed algorithm and its extensions showed the advantage of using two predictors in
boosting the embedding capacity while providing competitive quality for the stego image.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
IRJET- Data Embedding using Image SteganographyIRJET Journal
This document presents a method for secure communication using both steganography and cryptography techniques. It discusses embedding encrypted text into an image using discrete wavelet transform (DWT). Specifically, it first encrypts a text message using the advanced encryption standard (AES) algorithm. It then embeds the encrypted text into an image by applying DWT to decompose the image into sub-bands and hiding the data in the high frequency sub-bands. MATLAB is used to implement a graphical user interface that allows a sender to encrypt a message, embed it into an image, and send the stego-image to a receiver. The receiver interface extracts the encrypted text from the stego-image and decrypts it using AES. The method aims to
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
This document proposes a new hybrid approach for improving data security and reducing the size of hidden data in image steganography. It uses three techniques: 1) Huffman encoding is applied to compress the text message, 2) DNA encryption is applied to the compressed data, and 3) a state transition algorithm is used to update the pixel locations in the cover image where bits will be hidden. The implementation and evaluation of the proposed technique shows that it provides higher security than traditional techniques like LSB, LF-DCT, and MF-DCT substitution. It is also more efficient and secure while maintaining good image quality as measured by PSNR and MSE metrics.
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
This document summarizes research on using machine learning techniques for data security, specifically steganography (hiding secret messages within images). It discusses how machine learning algorithms like support vector machines (SVM) can help smooth distorted images and retrieve lost data after a secret message is hidden within an image. The document reviews several related works applying techniques like least significant bit substitution, artificial immune systems, deep learning models for steganalysis, and hash-based approaches. It concludes that the goal is to develop an application for information security using machine learning algorithms to better handle any data loss during transmission from source to destination.
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
This document proposes a new chaos-based image encryption and decryption scheme using Arnold's cat map for pixel permutation and the Lorenz system for diffusion. A hash function, specifically MurmurHash3, is used to generate the permutation and diffusion keys. This helps accelerate the diffusion process and reduces the number of cipher cycles needed compared to previous schemes. The encryption process involves first permuting the pixel positions using the cat map, with control parameters determined by the hash value of the original image. Then diffusion is performed using the Lorenz system to generate the keystream. Decryption follows the reverse process using the same keys. Security analysis demonstrates the scheme has a large key space and the encrypted images pass various statistical tests, indicating the
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
This document summarizes a research paper that proposes a new data embedding technique called adaptive pixel pair matching (APPM) for digital image steganography. The APPM technique hides secret data by replacing pairs of pixels in the cover image with coordinates that represent the hidden data. This allows data to be hidden in any numerical system. The document outlines existing steganography techniques including least significant bit replacement and transform domain methods. It then describes the proposed APPM technique in more detail, asserting it offers lower distortion than other methods by providing more compact pixel neighborhoods and flexible numerical representation of hidden data.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
The document describes a proposed asymmetric image encryption scheme based on the Massey Omura cryptosystem. The scheme works as follows: the sender and receiver agree on public parameters like a prime number p. The sender then represents the plaintext image as a matrix and encrypts it using their public key to get the first ciphertext image. This is sent to the receiver who encrypts it again with their public key to produce the second ciphertext image, which is sent back to the sender. The sender decrypts this using their private key to produce the third ciphertext image, which is sent to and decrypted by the receiver using their private key to recover the original plaintext image. The document provides an example of implementing the scheme and discusses evaluating its security using
IRJET- Machine Learning Application for Data SecurityIRJET Journal
1) The document proposes a machine learning approach for improving data security through steganography. It hides secret messages in images by modifying pixel values and uses machine learning models like SVM and DNN for smoothing distorted images and retrieving lost data.
2) The method first appends a secret text file onto an image, then performs image-to-image steganography to provide additional security. It decrypts the stego images and uses an SVM for classification and noise removal, along with a DNN network model.
3) Experimental results show that as the size of the hidden text file increases, more noise is introduced, but the machine learning models can effectively smooth the images and retrieve the lost message bits.
A Cryptographic Key Generation Using 2D Graphics pixel ShufflingIJMTST Journal
Now a day with incredible change in social media network like mobile communication and computer, all
type of a data such as audio, video, images are used for the communication .Privacy for that data is an
important issue .Cryptography is one of the technique used for stopping unauthorized access and increasing
integrity of that data. In research area encryption and decryption scheme is used based on image pixel
shuffling and transposition. For security purpose we can use cipher algorithm for generating key using RGB
values of the pixel instead of using only pixel values. For that purpose in our proposed system we are using
m*n size image on which different operations can be performed. Our proposed system is more secure as
compare to existing system.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
This document proposes a new hybrid algorithm for enhanced data security combining encryption, compression, and steganography. It first describes existing algorithms and their limitations. It then proposes a new encryption algorithm using pseudo-random number generation and key scheduling. Encrypted data is compressed with LZW and hidden in an image using modified LSB steganography. Analysis shows this hybrid algorithm improves security parameters like timing and distortion compared to existing methods.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
The document provides a survey of optimization algorithms that have been used in cryptography. It discusses how optimization algorithms can help generate cryptographic keys. Several studies are summarized that have used genetic algorithms, differential evolution, ant colony optimization, particle swarm optimization, and other algorithms to optimize keys for encryption algorithms like AES, ECC, and RSA. The purpose is to develop optimal cryptographic keys that improve security and efficiency for real-world applications.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
Information hiding in edge location of video using amalgamate fft and cubic s...IAEME Publication
This document summarizes a research paper that proposes a new video steganography technique. The technique encrypts a secret message using RSA before embedding it in pre-determined pixel locations of video frames. Edge detection is used to find control points for cubic spline interpolation, which dynamically determine the pixel locations. The secret bits are embedded in the least significant bits and real parts of the Fast Fourier Transform of pixel values. Experimental results show the technique maintains high video quality with minimal degradation, as measured by average PSNR and MSE values. The technique aims to increase security by hiding the locations and parameters used to extract the secret message.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
This document proposes a design for image steganography using Haar discrete wavelet transform (DWT) and average alpha blending techniques. The Haar DWT is used to decompose images into four frequency bands (LL, LH, HL, HH) because it requires less hardware than other transforms like DCT or DFT. The LL bands of the cover and secret images are then blended using average alpha blending according to an alpha value, which represents the percentage of pixel values considered. This blending embeds the secret image into the cover image in the frequency domain. The design aims to balance imperceptibility, quality, and capacity while reducing hardware requirements compared to other transforms.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
The document proposes a new approach for secure data hiding that combines compression, encryption, and steganography. It uses Lempel-Ziv-Welch compression to reduce file sizes, elliptic curve cryptography for encryption, and modified pixel value differencing with least significant bit substitution to hide encrypted data in images. The proposed method aims to provide higher security than existing techniques by requiring encryption keys to extract hidden messages from stego images with minimal quality degradation.
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images from false mistakes. The grey wolf optimizer (GWO) is used to choose the pixel’s image that would be utilized to insert the hidden image in the cover image. GWO effectively selects pixels by calculating entropy, pixel intensity, and fitness function using the cover images. Moreover, the secret image was encrypted by utilizing a proposed hyper-chaotic improved Henon map and fractal Tromino. The suggested method increases computational security and efficiency with increased embedding capacity. Following the embedding algorithm of the secret image and the alteration of the cover image, the least significant bit (LSB) is utilized to locate the tempered region and to provide self-recovery characteristics in the digital image. According to the findings, the proposed technique provides a more secure transmission network with lower complexity in terms of peak signal-to-noise ratio (PSNR), normalized cross correlation (NCC), structural similarity index (SSIM), entropy and mean square error (MSE). As compared to the current approaches, the proposed method performed better in terms of PSNR 70.58% Db and SSIM 0.999 respectively.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This document presents a study that uses linear regression to predict university freshmen's academic performance (GPA) based on their scores on the Joint Matriculation Examination (JME). The study finds a weak positive correlation (R=0.137) between GPA and JME scores, with the regression model only explaining 1.9% of variability in GPA. Statistical tests show no significant relationship between JME score and university GPA (p>0.05). The study concludes that JME score is not a strong predictor of freshmen academic performance.
This document describes a school bus tracking and security system that uses face recognition, GPS, and notification technologies. The system uses a camera to identify students as they board and exit the bus. A GPS module tracks the bus location and uploads coordinates to a database. Parents and school administrators can access this information through a mobile app to track students. When a student's face is recognized, a notification is sent to the parents. The system aims to increase student safety by monitoring their locations and notifying parents when they enter or exit the bus.
BigBasket encashing the Demonetisation: A big opportunityIJSRED
1. BigBasket is India's largest online grocery retailer, launched in 2011 when online grocery shopping was still nascent.
2. During India's 2016 demonetization, when cash was scarce, online grocery saw a major boost as consumers turned to sites like BigBasket for contactless digital payments.
3. However, BigBasket faced challenges in meeting consumer expectations for quick delivery while expanding partnerships with local vendors for fresh produce during this surge in demand.
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
This document discusses a technique for detecting plant leaf diseases using image processing. It begins with an introduction to plant pathology and the importance of identifying plant diseases. Common plant leaf diseases like Alternaria Alternata, Anthracnose, Bacterial blight, and Cercospora Leaf Spot are described along with their symptoms. The existing methods of disease identification are discussed. The proposed method uses various image processing techniques like filtering, histogram equalization, k-means clustering, and Gray Level Co-occurrence Matrix (GLCM) feature extraction to detect diseases. Image quality is then assessed to identify the affected regions of the leaf.
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
This document discusses the development of a DC fast charger and battery management system for electric vehicles. It aims to reduce charging times for EVs by designing an efficient charging mechanism. A PIC microcontroller controls the charging voltage and a battery management system monitors battery temperature, voltage, current and provides notifications. The system uses a step-down transformer, rectifier, voltage regulators and temperature sensor to charge lithium-ion batteries safely and quickly, while the battery management system protects the batteries from overcharging or overheating. Faster charging times through more charging stations could encourage greater adoption of electric vehicles.
France has experienced steady economic growth through policies that develop human capital and innovation. It has a highly organized education system that has increased enrollments over time, particularly in tertiary education. France also invests heavily in research and development, ranking highly in patents and innovative organizations. Infrastructure investment has also increased tangible capital stock. Additionally, factors like political stability, rule of law, and low corruption create an environment conducive to business investment and growth. Major events like the French Revolution helped shape France culturally, legally and technologically in ways that still influence its growth path today.
This document describes an acquisition system designed to make the examination process more efficient. The system uses a Raspberry Pi to control various hardware components including an RFID reader, rack and pinion assembly, and motor. It is intended to reduce the time and effort required of staff to distribute exam materials by automating the process. When examiners scan their RFID tags, the system verifies their identity and allows them to retrieve the appropriate exam bundles via a motorized rack and pinion assembly. The goal is to minimize manual labor and speed up exam distribution using an automated hardware and software solution controlled by a Raspberry Pi microcontroller.
Parallelization of Graceful Labeling Using Open MPIJSRED
This document summarizes research on parallelizing the graceful graph labeling problem using OpenMP on multi-core processors. It introduces the concepts of parallelization, multi-core architecture, and OpenMP. An algorithm is designed to parallelize graceful labeling by distributing graph vertices across processor cores. Execution time and speedup are measured for graphs of increasing size, showing improved speedup and reduced time with parallelization. Results show consistent performance gains as graph size increases due to better utilization of the multi-core architecture.
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
This study examines the phenotypic plasticity of fruits in the plant Luffa acutangula var. amara across different locations in Sindhudurg district, Maharashtra, India. The study found that the plant exhibited plasticity in growth cycle, flowering season, leaf shape, and fruit size depending on location. Maximum fruit weights and sizes were recorded at Talebazar village, while minimum sizes were found at Dahibav village. The variation in fruit morphology is an adaptation to the different environmental conditions at each site.
Understanding Architecture of Internet of ThingsIJSRED
The document discusses the architecture of the Internet of Things (IoT). It begins by introducing IoT and its key components. It then discusses three traditional IoT architectures: (1) a three-layer architecture consisting of a perception, network and application layer; (2) the TCP/IP four-layer model; and (3) the Telecommunications Management Network's five-layer logical layered architecture. The document proposes a new five-layer IoT architecture combining aspects of these models. The five layers are the business, application, processing, transport and perception layers. The perception layer collects data via sensors while the business layer manages the overall enterprise.
This document describes a project report submitted by three students for their bachelor's degree. The report outlines the development of a smart shopping cart system that utilizes RFID and Zigbee technologies. The smart cart is intended to enhance the shopping experience for customers by automatically billing items as they are added to the cart, providing real-time stock levels, and reducing checkout times. The system aims to benefit both customers through a more personalized shopping experience and retailers by improving stock management and reducing shoplifting. The document includes sections on requirements, system design, implementation, results and discussion, and conclusions.
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
This document discusses an empirical study on the importance of soft skills for management students' careers. It finds that while hard skills and academic performance were once prioritized by employers, soft skills like communication, teamwork, and emotional intelligence are now essential for success. The study surveyed 50 management students and faculty in Bangalore to understand how well soft skills training is incorporated and its benefits. It determined that soft skills like communication are crucial as they influence interactions and job performance. However, older teaching methods do not sufficiently develop these skills. Integrating soft skills training into courses could better prepare students for today's work challenges.
The document describes a proposed smart canteen management system that uses various technologies like a web application, barcode scanner, and thermal printer to automate the food ordering process. The system aims to reduce wait times for students and avoid food wastage by allowing online ordering and monitoring stock. A barcode scanner will be used to identify students during ordering and payment. Thermal printers will generate receipts. The system is expected to reduce workload for staff and provide detailed sales reports for management.
This document discusses Gandhi's concept of trusteeship as an alternative economic system. It summarizes that Gandhi did not distinguish between economics and ethics, and based trusteeship on religious ideas like non-possession and truth as well as Western ideas like stewardship. Trusteeship aimed to persuade wealthy property owners to hold wealth in trust for the benefit of society rather than personal gain. It was meant as a non-violent alternative to capitalism and communism that eliminated class conflict through cooperation and trust between rich and poor. The document provides background on the philosophical and religious influences on Gandhi's views before explaining the key aspects of his theory of trusteeship.
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
This document discusses the impacts of introducing a new spatial variable in black hole metrics. It begins by summarizing Einstein and Rosen's 1935 paper which introduced a variable ρ = r - 2M in the Schwarzschild metric to remove the singularity. The document then introduces a similar new variable p = r - 2√M and analyzes how this impacts the Schwarzschild metric. Specifically, it notes that this new variable allows for negative radii values and multiple asymptotic regions beyond just two, introducing concepts of probability and imaginary spatial coordinates. Overall, the document explores how different mathematical variables can impact theoretical physics concepts like wormholes.
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
This document summarizes a study that assessed the effectiveness of a planned teaching program on mothers' knowledge of preventing acute respiratory infections in children under 5. 50 mothers were surveyed before and after the program. Before, 36% had moderate knowledge, 62% had inadequate knowledge, and 2% had adequate knowledge. After, 34% had moderate knowledge, 0% had inadequate knowledge, and 66% had adequate knowledge, showing the program improved mothers' knowledge. The study found no significant association between mothers' knowledge and factors like age, education, or family type.
This document describes a proposed ingenuous Trafalgar contrivition system to improve traffic flow and emergency vehicle access. The system uses embedded technologies like a Raspberry Pi, RF transmitter and receiver, and an Android app. When an emergency vehicle is detected approaching a traffic light, the system will open the lights on its path without disrupting other signals. The app will also help identify hit-and-run vehicles through a brief tracking period. The goal is to reduce traffic congestion and response times to save lives.
This document discusses a proposed system called the Farmer's Analytical Assistant, which aims to help farmers in India maximize crop yields through predictive analysis and recommendations. It analyzes agricultural data on factors like soil properties, rainfall, and past crop performance using machine learning techniques to predict optimal crops for different regions based on the environmental conditions. The proposed system would allow farmers to input local data, receive personalized yield predictions and crop suggestions, and get advice from experts online. The methodology section describes how climate/rainfall and soil data is collected and analyzed using machine learning models to provide crop recommendations. The goal is to improve upon traditional crop selection methods and help increase farmers' incomes.
Functions of Forensic Engineering Investigator in IndiaIJSRED
Forensic engineering involves applying engineering principles and methodologies to answer legal questions, especially regarding accidents and failures. A forensic engineer investigates failures through failure analysis and root cause analysis to determine how and why something failed. The engineer must be familiar with relevant codes and standards, understand eyewitness testimony, apply the scientific method to reconstruct events, and report findings clearly to assist courts. A forensic engineering investigation follows the scientific method to methodically analyze evidence and test hypotheses to determine the cause and circumstances of a failure or accident.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.