The document proposes a method to improve security for LSB2 steganography. It involves:
1. Using LSB2 to hide a message in a cover image, generating a holding image.
2. Encrypting the holding image by dividing it into blocks, reordering the blocks, and using the reordering sequence as a private key.
3. To extract the message, the encrypted image is decrypted using the private key, then LSB2 is applied to extract the message.
Experimental results show the proposed encryption reduces the peak signal to noise ratio and increases the mean squared error compared to LSB2 alone, improving security. Larger cover images provide better results for LSB2 hiding and
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A new hybrid steganographic method for histogram preservation IJEEE
This paper presents a histogram preserving data embedding method for grey-scale images which is based on pixel value differencing (PVD) and least-significant-bit (LSB) substitution methods. Various PVD based steganographic methods achieve high data embedding capacity with minimum distortions in stego image at the cost of change in histogram characteristics which is can be detected by histogram based steganalysers. This persistent problem can been taken care off by proposed method of data hiding. The improved performance of the proposed method is verified through extensive simulations.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
Steganalysis is the method used to detect the presence of any hidden message in a cover medium. A novel
approach based on feature mining on the discrete cosine transform (DCT) domain based approach,
machine learning for steganalysis of JPEG images is proposed. The neighboring joint density on both
intra-block and inter-block are extracted from the DCT coefficient array. After the feature space has been
constructed, it uses SVM like binary classifier for training and classification. The performance of the
proposed method on different Steganographic systems named F5, Pixel Value Differencing, Model Based
Steganography with and without deblocking, JPHS, Steghide etc are analyzed. Individually each feature
and combined features classification accuracy is checked and concludes which provides better
classification.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A new hybrid steganographic method for histogram preservation IJEEE
This paper presents a histogram preserving data embedding method for grey-scale images which is based on pixel value differencing (PVD) and least-significant-bit (LSB) substitution methods. Various PVD based steganographic methods achieve high data embedding capacity with minimum distortions in stego image at the cost of change in histogram characteristics which is can be detected by histogram based steganalysers. This persistent problem can been taken care off by proposed method of data hiding. The improved performance of the proposed method is verified through extensive simulations.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
In this era of internet development, security of information sharing is the main problem faced by human being. Data hiding technique is one of the solutions. However, hiding credential information within a multimedia file such as image reduces its visual quality. Therefore, unauthorized users may suspect the existance of secret data within that image. In the past years, various data hiding algorithms have been developed by researchers to overcome the problem of high distortion of image after data embedding process. Achieving a high quality stego image, however, is still a challenging problem. In this paper, we proposed a new data hiding algorithm based on different expansion. It aims to enhance the quality of stego image for a given payload size. The new algorithm is evaluated on various medical images. Thereafter, the experimental results show that the visual quality is improved; and increasing the embedding capacity leads to more noises. Therefore, a better choice of base point and a reduced difference expansion affect the quality of stego image.
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
Steganalysis is the method used to detect the presence of any hidden message in a cover medium. A novel
approach based on feature mining on the discrete cosine transform (DCT) domain based approach,
machine learning for steganalysis of JPEG images is proposed. The neighboring joint density on both
intra-block and inter-block are extracted from the DCT coefficient array. After the feature space has been
constructed, it uses SVM like binary classifier for training and classification. The performance of the
proposed method on different Steganographic systems named F5, Pixel Value Differencing, Model Based
Steganography with and without deblocking, JPHS, Steghide etc are analyzed. Individually each feature
and combined features classification accuracy is checked and concludes which provides better
classification.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Performance Analysis of CRT for Image Encryption ijcisjournal
With the fast advancements of information technology, the security of image data transmitted or stored over
internet is become very difficult. To hide the details, an effective method is encryption, so that only
authorized persons can decrypt the image with the keys available. Since the default features of digital
image such as high capacity data, large redundancy and large similarities among pixels, the conventional
encryption algorithms such as AES, , DES, 3DES, and Blow Fish, are not applicable for real time image
encryption. This paper presents the performance of CRT for image encryption to secure storage and
transmission of image over internet.
We present a new image compression method to improve visual perception of the decompressed images and achieve higher image compression ratio. This method balances between the compression rate and image quality by compressing the essential parts of the image-edges. The key subject/edge is of more significance than background/non-edge image. Taking into consideration the value of image components and the effect of smoothness in image compression, this method classifies the image components as edge or non-edge. Low-quality lossy compression is applied to non-edge components whereas high-quality lossy compression is applied to edge components. Outcomes show that our suggested method is efficient in terms of compression ratio, bits per-pixel and peak signal to noise ratio.
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Reversible data hiding using histogram shifting methodHimanshu Bal
this is a ppt about rdh method using histogram shifting method anyone can contact me for more help like research papers related to this topic at himanshub536@gmail.com
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Performance Analysis of CRT for Image Encryption ijcisjournal
With the fast advancements of information technology, the security of image data transmitted or stored over
internet is become very difficult. To hide the details, an effective method is encryption, so that only
authorized persons can decrypt the image with the keys available. Since the default features of digital
image such as high capacity data, large redundancy and large similarities among pixels, the conventional
encryption algorithms such as AES, , DES, 3DES, and Blow Fish, are not applicable for real time image
encryption. This paper presents the performance of CRT for image encryption to secure storage and
transmission of image over internet.
We present a new image compression method to improve visual perception of the decompressed images and achieve higher image compression ratio. This method balances between the compression rate and image quality by compressing the essential parts of the image-edges. The key subject/edge is of more significance than background/non-edge image. Taking into consideration the value of image components and the effect of smoothness in image compression, this method classifies the image components as edge or non-edge. Low-quality lossy compression is applied to non-edge components whereas high-quality lossy compression is applied to edge components. Outcomes show that our suggested method is efficient in terms of compression ratio, bits per-pixel and peak signal to noise ratio.
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
Increased use of electronic communication has given birth to new ways of transmitting information securely. Steganography is a science of hiding information by embedding it in some other data called host message. Images are most known objects for steganography. The host message before steganography and stego message after steganography have the same characteristics. The given work is to be done by evaluating it on MATALAB. While evaluation one can calculate SNR, PSNR and BER for individual information Bit for conceal bit and analysis effect on results.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
ABSTRACT. This research discussed about the data hiding information using steganography and cryptography. New method are discussed to secure data without change the quality of image as cover medium. Steganographic method is used by find the similarity bit of the message with bit of the MSB (Most Significant Bit) image cover. Finding of similarity process is done by divide and conquer method.The results are bit indexposition, thenthenencrypted using cryptographic. In this paper we using DES (Data Encryption Standard) algorithm. We use data information as message, images, and key as an input. Then, we use our method to secure message. The output is encrypted bit index which containt data hiding information and can be used to secure the messages. To reconstruct the contents, we require the same image and same key. Outcomes of our method can be used to secure the data. The advantages of this method are the capacity of stored data hiding of messages can be larger than the image. The image quality will not change and the capacity of stored messages can be larger than the image. Acoording to the research, both gray scale and colorful images can be used as image cover, except the image contains 100% black and 100% white. Bit matching process on image which have much variety of color takes less time. The damage of messages due to the addition of “salt and pepper” noise starts from 0.00049 of MSE.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
Similar to Improving wpt color_image_decomposition (20)
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
1. Improving WPT color image decomposition
Dr. Mohammad S. Khrisat1
, Prof. Ziad Alqadi2
, Dr. Saleh A. Khawatreh3
Al-Ahliyya Amman University3
, Albalqa Applied University 1, 2
, Faculty of engineering technology, Jordan, Amman.
Abstract
Securing the confidential secret and personal messages is a vital and important task. In this paper we will show how to increase the
security of LSB2 method of data steganography to protect the message imbedded in digital color image.
An encryption phase will be added to the hiding process, this encryption will be based on dividing the holding image into blocks and
reordering the blocks to get the encrypted image, the reordering sequence here will be kept as a PK to decrypt the encrypted image.
Key words: Steganography, encryption, blocking factor, reordering table, PK, MSE, PSNR.
I- Introduction
Social media has spread recently, as it is now widely used in
the circulation of various messages [1], [2], [3], [4]. Some of
the messages in circulation are confidential or may be of a
personal nature [49], [50], which requires their protection [51],
[52], [53] and preventing intruders from reading [23[, [24],
[25] or understanding them by hiding or encrypting them
[46], [47], [48].
The digital color image is considered one of the most
important types of digital data used to carry and hide private
messages [5], [6], [7], for several reasons, the most important
of which are: easy access to the image, ease of image
processing, and the possession of a large size image that can
hide short and long messages without affecting the digital
image.
The digital color image is a three-dimensional matrix [1], [2] in
which the first dimension is devoted to represent the red color
[11], [12], [13]; the second dimension represents the green
color, while the third dimension represents the blue color.
Digital images are usually characterized by high resolution
[14], [15], which means that the matrix is large and contains a
huge number of pixels, which enables us to hide large text
messages [16], [17].
To find out how clear the image is, we can use the histogram
as shown in figure 1, where one trend is assigned to each color
[18], [19]. Histogram [20] , [21], [22]is a one column matrix of
256 elements, each element value points to the repetition of
color (0 to 255), the tree histograms can be added together to
give use the image total histogram as shown in figure 2.
Figure 1: Color image and associated histograms
Figure 2: Image total histogram
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
13 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. II- Steganography and cryptography
Steganography is the art of hiding secret message in another
holding or covering data, mainly color image [46], [47], [48].
The method of concealment shall be characterized by the
following:
- Ease of implementation.
- The ability to fulfil messages of different sizes (short
messages and long messages).
- That the concealment process does not significantly
affect the image so that the observation result does not
take place with the galaxy eye to prevent intruders
from trying to process the image that carries the
message [40], [41], [46].
- The method of concealment shall be safe [14], [15].
Many methods were introduced for message steganography
[45], [48], [49], and the most widely used methods are based
on least significant bit (LSB) method such as LSB2 method.
LSB method of message hiding reserves 8 bytes from the
covering image to hold one message character, thus the
capacity of this method is equal to the image size divided by 8.
LSB2 method of steganography reserves 4 bytes from the
covering image to hold one character from the message, thus
the capacity of LSB2 method equal the image size divided by
4, figure 3 shows how LSB and LSB2 act with the bits to hold
the message characters.
Figure 3: LSB and LSB2 operation
Here in this paper we will use LSB2 method of data hiding
because it has a higher capacity as shown in table 1:
Table 1: Capacities of LSB and LSB2
Image number Size(byte) Maximum message
length(byte) using LSB
Maximum message
length(byte) using LSB2
1 150849 18856 37712
2 77976 9747 19494
3 518400 64800 129600
4 5140800 642600 1285200
5 4326210 540776 1081552
6 122265 15283 30566
7 151353 18919 37838
8 1890000 236250 472500
9 6119256 764907 1529814
10 151875 18984 37968
LSB2 method has in noticeable effect [23], [24] on the holding
image and the changes on the holding byte range from -3 to 3
as shown in table 2:
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
14 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. Table 2: Changes of the holding byte using LSB2 method
Original LSB2 bits Holding LSB2 bits Remark
00 00 No change
00 01 Add 1
00 10 Add 2
00 11 Add 3
01 00 Subtract 1
01 01 No change
01 10 Add 1
01 11 Add 2
10 00 Subtract 2
10 01 Subtract 1
10 10 No change
10 11 Add 1
11 00 Subtract 3
11 01 Subtract 2
11 10 Subtract 1
11 11 No change
LSB2 method provides the following advantages:
High capacity.
Easy to implement.
Minor changes in the holding image, LSB2 provides a
high value for peak-to-signal-noise ratio (PSNR), and
low vale for mean square error (MSE) between the
original and the holding images, thus the changes in
the image can not be noticed by a human eyes .
The disadvantage of LSB2 method is that it easy can be hacked
(not secure), and to overcome this disadvantage we have to
encrypt the holding image [11], [12], [13].
Encryption is the destruction of data [8], [9], [10] that becomes
incomprehensible, and here many methods were introduced for
encryption, and in our paper we will focus on blocking and
reordering method of data encryption [25-45].
Encryption method must provide the following:
Low value of PSNR between the original image and
the encrypted one [31], [32].
High value of MSE between the original image and
the encrypted one [33], [34].
High level of security by using a private key, which
can not be hacked [35], [36].
III- The proposed method
The proposed method for secret message hiding will be
implemented as follows:
Hiding process:
This phase can be implemented as shown in figure 4 applying
the following tasks:
1) Message hiding:
In this task we shall select the message and the
covering image, and then we have to apply LSB2
method to generate the holding image.
2) The holding image must be encrypted using blocking
and reordering method: here we have to select the
number of blocks (blocking factor); then we have to
divide the holding image into equal blocks (as shown
in table 3: here blocking factor equal 11), at the end
we have to reorder the blocks to get the encrypted
image (here the sequence of the reordering will be
used as a PK).
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
15 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. Figure 4: Hiding diagram
Table 3: Reordering table for image 5
Block number Size Order(PK)
1 393291 7
2 393291 11
3 393291 9
4 393291 12
5 393291 6
6 393291 2
7 393291 4
8 393291 8
9 393291 3
10 393291 1
11 393291 5
12 9 10
Extracting process: The extraction process as shown in figure 5 will be
implemented applying the following tasks:
Figure 5: Message extracting diagram
- Decryption
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
16 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. Here we must have the PK (see table 4), this key can
be used to reorder the image to get the decrypted
image
Table 4: PK
Order(PK)
7
11
9
12
6
2
4
8
3
1
5
10
- Apply LSB2 to extract the message from the
decrypted image.
IV- Implementation and experimental
results
The proposed method was implemented using the images
shown in table 1, figures 6, 7 and 8 shows the obtained outputs
of using image 2 and the message " 'May God protect
Jordan and the Jordanians' with length=41:
Figure 6: Covering image (example)
Figure 7: Holding image (example)
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
17 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. Figure 8: Encrypted holding image (example)
LSB2 method was applied using the smallest image in size,
table 5 shows the experimental results, while table 6 shows the
experimental results using bigger image.
Table 5: using the smallest image (image 2)
Message length MSE PSNR Hiding time(second)
41 0.0062 161.6874 0.00001
82 0.0107 156.2165 0.0001
164 0.0205 149.6892 0.0020
328 0.0411 142.7390 0.0040
656 0.0810 135.9584 0.0060
1312 0.1631 128.9575 0.0120
2624 0.3243 122.0860 0.0250
5248 0.6503 115.1290 0.0730
Average 0.1622 139.0579 0.0153
Table 6: using the biggest image (image 9)
Message length MSE PSNR Hiding time(second)
41 0.000055072 208.8940 0.0030
82 0.00011554 201.4845 0.0030
164 0.00024055 194.1510 0.0050
328 0.00050022 186.8298 0.0060
656 0.0010 179.7846 0.0080
1312 0.0020 173.1017 0.0140
2624 0.0040 165.9906 0.0270
5248 0.0081 158.9733 0.0530
Average 0.0020 183.6512 0.0149
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
18 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. From tables 5 and 6 we can see that using bigger images will
enhance the parameter PSNR and MSE for LSB2.
The encryption phase must reduce the value of PSNR and
increase the value of MSE; this was proved by the
experimental results shown in table 7:
Table 7: Encryption result
Use message :'May God protect Jordan and the Jordanians' with length=41
Image number Block size MSE PSNR Encryption time
1 13713 13984 15.3689 0.000100
2 7088 4352.1 27.0410 0.000010
3 47127 8114.9 20.8107 0.0020
4 467345 8887.4 19.9014 0.0260
5 393291 8389.6 20.4777 0.0220
6 11115 5198.4 25.2642 0.0010
7 13759 9584.8 19.1460 0.000010
8 171818 11909 16.9744 0.0090
9 556296 3206.4 30.0962 0.0310
10 13806 15797 14.1496 0.0010
Average 8942.4 20.9230 0.0092
From table 7 we can see the following:
- Low PSNR value.
- High MSE value.
- The encryption process add significant small value to
the hiding time (0.009 seconds in average);
- The same blocking factor and PK may be used for
deferent images.
Conclusion
A method of improving the security of LSB2 method of secret
message steganography was introduced.
The obtained experimental results showed that the proposed
method satisfies the requirements of data encryption by
decreasing the value of PSNR and decreasing the value of
MSE. The method is secure because it uses a PK which is very
difficult to guess and hack.
References
[1] Majed O Al-Dwairi, Ziad A Alqadi, Amjad A Abujazar, Rushdi Abu Zneit,
Optimized true-color image processing, World Applied Sciences Journal, vol.
8, issue 10, pp. 1175-1182, 2010.
[2] Jamil Al Azzeh, Hussein Alhatamleh, Ziad A Alqadi, Mohammad Khalil
Abuzalata, Creating a Color Map to be used to Convert a Gray Image to Color
Image, International Journal of Computer Applications, vol. 153, issue 2, pp.
31-34, 2016.
[3] AlQaisi Aws, AlTarawneh Mokhled, A Alqadi Ziad, A Sharadqah Ahmad,
Analysis of Color Image Features Extraction using Texture Methods,
TELKOMNIKA, vol. 17, issue 3, 2018.
[4] Mohammed Ashraf Al Zudool, Saleh Khawatreh, Ziad A. Alqadi, Efficient
Methods used to Extract Color Image Features, IJCSMC, vol. 6, issue 12, pp.
7-14, 2017.
[5] Akram A. Moustafa and Ziad A. Alqadi, Reconstructed Color Image
Segmentation, Proceedings of the World Congress on Engineering and
Computer Science, WCECS 2009, vol. II, 2009.
[6] JAMIL AL-AZZEH, BILAL ZAHRAN, ZIAD ALQADI, BELAL
AYYOUB AND MAZEN ABU-ZAHER, A NOVEL ZERO-ERROR
METHOD TO CREATE A SECRET TAG FOR AN IMAGE, Journal of
Theoretical and Applied Information Technology, vol. 96, issue 13, pp. 4081-
4091, 2018.
[ 7] BILAL ZAHRAN, JAMIL AL-AZZEH, ZIAD ALQADI, MOHD–
ASHRAF ALZOGHOUL, SALEH KHAWATREH, A MODIFIED LBP
METHOD TO EXTRACT FEATURES FROM COLOR IMAGES, Journal of
Theoretical and Applied Information Technology, vol. 96, issue 10, pp. 3014-
3024, 2018.
[ 8] Waheeb Abu Ulbeh, Akram Moustafa, Ziad A Alqadi, Gray image
reconstruction, European Journal of Scientific Research, vol. 27, issue 2, pp.
167-173, 2009.
[9] Dr Rushdi S Abu Zneit, Dr Ziad AlQadi, Dr Mohammad Abu Zalata, A
Methodology to Create a Fingerprint for RGB Color Image, IJCSMC, vol. 6,
issue 1, pp. 205-212. 2017.
[10] RA Zneit, Ziad Alqadi, Dr Mohammad Abu Zalata, Procedural analysis of
RGB color image objects, IJCSMC, vol. 6, issue 1, pp. 197-204, 2017.
[11] Amjad Y Hindi, Majed O Dwairi, Ziad A AlQadi, A Novel Technique for
Data Steganography, Engineering, Technology & Applied Science Research,
vol. 9, issue 6, pp. 4942-4945, 2019.
[11] Mutaz Rasmi Abu Sara Rashad J. Rasras, Ziad A. AlQadi, A
Methodology Based on Steganography and Cryptography to Protect Highly
Secure Messages, Engineering, Technology & Applied Science Research, vol.
9, issue 1, pp. 3681-3684, 2019.
[12] Dr. Amjad Hindi, Dr. Ghazi M. Qaryouti, Prof. Yousif Eltous, Prof.
Mohammad Abuzalata, Prof. Ziad Alqadi, Color Image Compression using
Linear Prediction Coding, International Journal of Computer Science and
Mobile Computing, vol. 9, issue 2, pp. 13 – 20, 2020.
[13] Ziad Alqadi, Mohammad Abuzalata, Yousf Eltous, Ghazi M Qaryouti,
Analysis of fingerprint minutiae to form fingerprint identifier, International
Journal on Informatics Visualization, vol. 4, issue 1, pp. 10-15, 2020.
[14] Prof. Ziad Alqadi, Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr.
Majed Omar Dwairi, USING SPEECH SIGNAL HISTOGRAM TO CREATE
SIGNAL FEATURES, International Journal of Engineering Technology
Research & Management, vol. 4, issue 3, pp. 144-153, 2020.
[15] Prof. Ziad Alqadi, Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Dr.
Mohammad S. Khrisat, Features Analysis of RGB Color Image based on
Wavelet Packet Information, IJCSMC, vol. 9, issue 3, pp. 149 – 156, 2020.
[16] Ziad Alqadi Dr. Mohammad S. Khrisat, Dr. Amjad Hindi, Dr. Majed
Omar Dwairi, VALUABLE WAVELET PACKET INFORMATION TO
ANALYZE COLOR IMAGES FEATURES, International Journal of Current
Advanced Research, vol. 9, issue 2, pp. 2319-6505, 2020.
[17] Amjad Hindi, Majed Omar Dwairi, Ziad Alqadi, Analysis of Digital
Signals using Wavelet Packet Tree, IJCSMC, vol. 9, issue 2, pp. 96-103, 2020.
[18] Amjad Y. Hindi, Majed O. Dwairi, Ziad A. AlQadi, Creating Human
Speech Identifier using WPT, International Journal of Computer Science and
Mobile Computing, vol. 9, issue 2, pp. 117 – 123, 2020.
[19] Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Prof. Ziad Alqadi, Efficiency
analysis of color image features extraction methods, International Journal of
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
19 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
8. Software & Hardware Research in Engineering, vol. 8, issue 2, pp. 58-65,
2020.
[20] Ziad A. AlQadi Amjad Y. Hindi, Majed O. Dwairi, PROCEDURES FOR
SPEECH RECOGNITION USING LPC AND ANN, International Journal of
Engineering Technology Research & Management, vol. 4, issue 2, pp. 48-55,
2020.
[21] Dr. Amjad Hindi, Dr. Majed Omar Dwairi, Prof. Ziad Alqadi, Analysis of
Procedures used to build an Optimal Fingerprint Recognition System,
International Journal of Computer Science and Mobile Computing, vol. 9,
issue 2, pp. 21 – 37, 2020.
[22] Ziad alqadi, Analysis of stream cipher security algorithm, Journal of
Information and Computing Science, vol. 2, issue 4, pp. 288-298, 2007.
[23] Ziad Alqad, Prof. Yousf Eltous Dr. Ghazi M. Qaryouti, Prof. Mohammad
Abuzalata, Analysis of Digital Signal Features Extraction Based on LBP
Operator, International Journal of Advanced Research in Computer and
Communication Engineering, vol. 9, issue 1, pp. 1-7, 2020.
[24] Ziad A. AlQadi, A Highly Secure and Accurate Method for RGB Image
Encryption, IJCSMC, vol. 9, issue 2, pp. 12-21, 2020.
[25] Belal Zahran Rashad J. Rasras, Ziad Alqadi, Mutaz Rasmi Abu Sara,
Developing new Multilevel security algorithm for data encryption-decryption
(MLS_ED), International Journal of Advanced Trends in Computer Science
and Engineering, vol. 8, issue 6, pp. 3228-3235, 2020.
[26] Ziad Alqad, Majid Oraiqat, Hisham Almujafet, Salah Al-Saleh, Hind Al
Husban, Soubhi Al-Rimawi, A New Approach for Data Cryptography,
International Journal of Computer Science and Mobile Computing, vol. 8,
issue 9, pp. 30-48, 2019.
[27] Majed O Al-Dwairi, A Hendi, Z AlQadi, An efficient and highly secure
technique to encrypt-decrypt color images, Engineering, Technology &
Applied Science Research, vol. 9, issue 3, pp. 4165-4168, 2019.
[28] Amjad Y Hendi, Majed O Dwairi, Ziad A Al-Qadi, Mohamed S Soliman,
A novel simple and highly secure method for data encryption-decryption,
International Journal of Communication Networks and Information Security,
vol. 11, issue 1, pp. 232-238, 2019.
[29] Ziad Alqadi, Ahmad Sharadqh, Naseem Asad, Ismail Shayeb, Jamil Al-
Azzeh, Belal Ayyoub, A highly secure method of secret message encoding,
International Journal of Research in Advanced Engineering and Technology,
vol. 5, issue 3, pp. 82-87, 2019.
[30] Rushdi Abu Zneit, Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad
Sharadqh, Using Color Image as a Stego-Media to Hide Short Secret
Messages, IJCSMC, Vol. 8, Issue 6, pp. 106 –123, 2019.
[31] Qazem Jaber Rashad J. Rasras, Mohammed Abuzalata, Ziad Alqadi, Jamil
Al-Azzeh, Comparative Analysis of Color Image Encryption-Decryption
Methods Based on Matrix Manipulation, IJCSMC, vol. 8, issue 3, pp. 14-26,
2019.
[32] Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Belal Ayyoub, Muhammed
Mesleh, A Novel Based On Image Blocking Method To Encrypt-Decrypt
Color, International Journal on Informatics Visualization, vol. 3, issue 1, pp.
86-93, 2019.
[33] Jamil Al-Azzeh, Ziad Alqadi, Qazem Jaber, A Simple, Accurate and
Highly Secure Method to Encrypt-Decrypt Digital Images,
INTERNATIONAL JOURNAL ON INFORMATICS VISUALIZATION,
VOL 3 (2019) NO 3, pp. 262-265.
[34] S. Wang, Y. Zheng, Z. Gao, “A New Image Scrambling Method through
Folding Transform”, IEEE International Conference on Computer Application
and System Modeling, Taiyuan, China, October 22-24, 2010.
[35] J. N. Abdel-Jalil, “Performance analysis of color image
encryptiondecryption techniques”, International Journal of Advanced
Computer Technology, Vol. 5, No. 4, pp. 13-17, 2016.
[36] G. Ye, “An Efficient Image Encryption Scheme based on Logistic maps”,
International Journal of Pure and Applied Mathematics, Vol. 55, No. 1, pp. 37-
47, 2009.
[37] T. Sivakumar, R. Venkatesan, “A Novel Image Encryption Approach
using Matrix Reordering”, WSEAS Transactions on Computers, Vol. 12, No.
11, pp. 407-418, 2013.
[38] H. Gao, Y. Zhang, S. Liang, D. Li, “A New Logistic maps for Image
Encryption”, Chaos- Solutions & Fractals, Vol. 29, No. 2, pp. 393- 399, 2006.
[39] G. Chen, Y. Mao, C. K. Chui, “A Symmetric Image Encryption Scheme
based on 3D Chaotic Cat Maps”, Chaos, Solutions & Fractals, Vol. 21, No. 3,
pp. 749–761, 2004.
[40] K. Loukhaoukha, J. Y. Chouinard, A. Berdai, “A Secure Image
Encryption Algorithm Based on Rubik's Cube Principle”, Journal of Electrical
and Computer Engineering, Vol. 2012, Article ID 173931, pp. pp. 1-13, 2012.
[41] X. Wang, J. Zhang, “An Image Scrambling Encryption using Chaos-
controlled Poker Shuffle Operation”, IEEE International Symposium on
Biometrics and Security Technologies, Islamabad, Pakistan, April 23-24, 2008.
[42] Prof. Ziad Alqad i Prof. Yousif Eltous, Dr. Majed Omar Dwairi, Dr.
Mohammad S. Khrisat, Dr. Saleh A. Khawatreh, Secure Secret Message
Steganography (SSMS), International Journal of Computer Science and
Mobile Computing, vol. 9, issue 6, pp. 1-9, 2020.
[43] Dr. Saleh A. Khawatreh Dr. Majed Omar Dwairi, Prof. Ziad Alqadi, Dr.
Mohammad S. Khrisat, Dr. Amjad Hindi, Digital color image encryption-
decryption using segmentation and reordering, International Journal of Latest
Research in Engineering and Technology (IJLRET), vol. 6, issue 5, pp. 6-12,
2020.
[44] Prof. Ziad Alqadi Prof. Yousif Eltous, Dr. Akram Moustafa Hamarchi,
Dr. Mohammad S. Khrisat, Dr. Saleh A. Khawatreh, Color Image Encryption-
Decryption using RANDOM Noise and PMT, International Journal of
Advanced Research in Computer and Communication Engineering, vol. 9,
issue 5, pp. 1-7, 2020.
[45] Prof. Ziad Alqadi Prof. Yousif Eltous, Dr. Akram Moustafa Hamarchi,
Dr. Mohammad S. Khrisat, Dr. Saleh A. Khawatreh, SPEECH SIGNAL
ENCRYPTION-DECRYPTION USING NOISE SIGNAL AND PMT,
International Journal of Engineering Technology Research & Management,
vol. 4, issue 5, pp. 49-59, 2020.
[46] Prof. Ziad Alqadi Dr. Saleh A. Khawatreh, Dr. Mohammad S. Khrisat, Dr.
Amjad Hindi, Dr. Majed Omar Dwairi, A Novel Method to Encrypt-Decrypt
Digital Speech Signal (EDDSS), International Journal of Advanced Research
in Computer and Communication Engineering, vol. 9, issue 4, pp. 117-123,
2020.
[47] Prof. Ziad Alqadi Dr. Mohammad S. Khrisat, Dr. Saleh A. Khawatreh, Dr.
Majed Omar Dwairi, Dr. Amjad Hindi, Prof. Yousif Eltous, Analysis of Color
Image Noising Process, International Journal of Computer Science and Mobile
Computing, vol. 9, issue 6, pp. 65 – 72, 2020.
[48] Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, Ahmad Sharadqh,
Improving the security of LSB image steganography, JOIV: International
Journal on Informatics Visualization, vol. 3, issue 4, pp. 384-387, 2019.
[49] Rashad J. Rasras, Mutaz Rasmi Abu Sara, Ziad A. AlQadi, Rushdi Abu
Zneit, Comparative Analysis of LSB, LSB2, PVD Methods of Data
Steganography, International Journal of Advanced Trends in Computer
Science and Engineering, vol. 8, issue 3, pp. 748-754, 2019.
[50] Ahmad Sharadqh Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub,
Jamil Al-Azzeh, Proposed Implementation Method to Improve LSB
Efficiency, International Journal of Computer Science and Mobile Computing,
vol. 8, issue 3, pp. 306 – 319, 2019.
[51] J Al-Azzeh M Abuzalata, Ziad Alqadi, Modified Inverse LSB Method for
Highly Secure Message Hiding, International Journal of Computer Science and
Mobile Computing, vol. 8, issue 2, pp. 93-103, 2019.
[52] Mutaz Rasmi Abu Sara Rashad J. Rasras, Ziad A. AlQadi, A
Methodology Based on Steganography and Cryptography to Protect Highly
Secure Messages, Engineering, Technology & Applied Science Research, vol.
9, issue 1, pp. 3681-3684, 2019.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
20 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
9. [53] Ziad Alqadi, Bilal Zahran, Qazem Jaber, Belal Ayyoub, Jamil Al-Azzeh,
Enhancing the Capacity of LSB Method by Introducing LSB2Z Method,
International Journal of Computer Science and Mobile Computing, vol. 8,
issue 3, pp.18, 2019.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 18, No. 7, July 2020
21 https://sites.google.com/site/ijcsis/
ISSN 1947-5500