This document presents a method for low bandwidth, high security image transmission using steganography and cryptography techniques. The secret image is first scrambled using Arnold transform and decomposed using discrete wavelet transform. Referable values from the frequency components are embedded into the least significant bits of frames in a cover video. The secret key used for embedding is then encrypted with a second key using a Twisted Exchange algorithm and hidden in a cover audio file. At the receiver, the encrypted key is extracted from the audio and decrypted to recover the secret key, which is used to extract the secret image values from the video frames. Image compression using Haar wavelet transform is also used to reduce bandwidth. The proposed method aims to provide secure, robust and imper
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET Journal
This document proposes an image encryption technique that uses the Arnold transform to scramble pixel positions, generalized logistic equations to generate secret keys, and non-subsampled contourlet transforms to change pixel values. Differential evolution is used to fine-tune the key space. The technique encrypts images in RGB layers by applying the Arnold transform, generating secret keys with the logistic equation, diffusing the keys into the transformed pixel values, and decrypting in reverse order. Analysis shows the encrypted images have uniform histograms, low pixel correlation, high PSNR values, and can withstand attacks like changes to the secret keys.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
This document proposes a new method for securely transmitting images over a medium using mosaic image creation in video. The method has two main phases:
1) Mosaic video creation: A video is selected and its frames are used to create a mosaic image that resembles a target secret image. Color transformations are applied to fit tiles of the secret image into blocks of frames. Relevant information for recovery is embedded into the mosaic video.
2) Secret image recovery: At the receiving end, the frames are extracted from the video. The embedded information is extracted to recover tiles of the secret image from the mosaic frames through inverse transformations. The secret image is thus reconstructed without any loss.
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
This document proposes a method for enhancing cloud data security using combined encryption and steganography. The method involves encrypting data using RSA encryption, hiding the encrypted data within an image using discrete wavelet transform steganography, and uploading the stego image to the cloud. When needed, the image can be downloaded from the cloud and decrypted to extract the original data file. Encrypting and hiding the data provides augmented security compared to storing data directly in the cloud. The system design incorporates RSA encryption to encrypt files, DWT steganography to hide the encrypted data within an image, and a cloud platform for file storage.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
A novel secure combination technique of steganography and cryptographyZac Darcy
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image encryption and decryption using aes algorithmIAEME Publication
This document summarizes an article that describes using the AES algorithm to encrypt and decrypt images. It begins with background on AES and its advantages over DES such as larger key sizes. It then describes modifications made to the AES key expansion to improve encryption quality and avalanche effect. The implementation takes an input key, generates expanded keys using a modified key expansion, then encrypts images by applying AES operations to blocks of 16 pixels using the expanded keys. Decryption reverses this process to recover the original image. Results show the encrypted image is secure and decrypts correctly when using the proper key.
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET Journal
This document proposes an image encryption technique that uses the Arnold transform to scramble pixel positions, generalized logistic equations to generate secret keys, and non-subsampled contourlet transforms to change pixel values. Differential evolution is used to fine-tune the key space. The technique encrypts images in RGB layers by applying the Arnold transform, generating secret keys with the logistic equation, diffusing the keys into the transformed pixel values, and decrypting in reverse order. Analysis shows the encrypted images have uniform histograms, low pixel correlation, high PSNR values, and can withstand attacks like changes to the secret keys.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
This document proposes a new method for securely transmitting images over a medium using mosaic image creation in video. The method has two main phases:
1) Mosaic video creation: A video is selected and its frames are used to create a mosaic image that resembles a target secret image. Color transformations are applied to fit tiles of the secret image into blocks of frames. Relevant information for recovery is embedded into the mosaic video.
2) Secret image recovery: At the receiving end, the frames are extracted from the video. The embedded information is extracted to recover tiles of the secret image from the mosaic frames through inverse transformations. The secret image is thus reconstructed without any loss.
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
This document proposes a method for enhancing cloud data security using combined encryption and steganography. The method involves encrypting data using RSA encryption, hiding the encrypted data within an image using discrete wavelet transform steganography, and uploading the stego image to the cloud. When needed, the image can be downloaded from the cloud and decrypted to extract the original data file. Encrypting and hiding the data provides augmented security compared to storing data directly in the cloud. The system design incorporates RSA encryption to encrypt files, DWT steganography to hide the encrypted data within an image, and a cloud platform for file storage.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
A novel secure combination technique of steganography and cryptographyZac Darcy
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
IRJET- GSVD Algorithm for Image EncryptionIRJET Journal
This document describes a Generalized Singular Value Decomposition (GSVD) algorithm for encrypting and decrypting RGB images. The algorithm works by:
1) Splitting the plaintext image into R, G, and B channels and applying GSVD encryption to each channel using an encryption key.
2) Combining the encrypted channels to form the ciphertext image.
3) For decryption, the ciphertext image is split into channels and GSVD is applied to each using the encryption key to recover the original plaintext image.
The algorithm aims to provide stronger security for images transmitted between parties compared to other encryption methods through the use of GSVD and an additional reference key image during the encryption process.
The document describes a modified AES key expansion algorithm for image encryption and decryption. It discusses basics of cryptography and image encryption. It introduces AES and describes the standard AES key expansion process. It then presents a modified AES key expansion algorithm tailored for images where the keys are expanded based on image pixel count, Rcon values are derived from the initial key, and the S-box is shifted based on the initial key. It analyzes the proposed algorithm and shows it offers high encryption quality with minimal time compared to previous techniques.
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
This document discusses methods for encrypting and decrypting images using reversible data hiding and least significant bit algorithms with asymmetric cryptography. It proposes a method that reserves room in the image before encryption using histogram shift-based reversible data hiding and least significant bit algorithms with a public key cryptosystem. This allows data to be embedded in the encrypted image simply for the user. The embedded data and original image can then be extracted and recovered later without any loss of pixels or data. The method claims to embed more than ten times as much data as other techniques while maintaining image quality and restoration after encryption.
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
This document discusses securing data by combining JPEG2000 compression, RSA encryption, and discrete wavelet transform (DWT) steganography. It describes how the data is first substituted using a 14 square algorithm and then encrypted with RSA. The encrypted message is compressed with JPEG2000 before being hidden within an image using DWT steganography. At the receiver end, the reverse process is performed to decrypt the original message. Combining encryption, compression, and steganography makes the secured information more robust and difficult to hack within a feasible time frame.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
Audio video steganography using forensic techniquefor data securityIAEME Publication
This document summarizes an academic paper that proposes a method for hiding secret data in audio and video files using steganography and computer forensics techniques for authentication. The method embeds secret text or images in selected video frames using 4LSB steganography for images and phase coding for audio. At the receiver side, authentication involves verifying frame parameters and comparing recovered images to originals before secret data recovery. Computer forensics techniques are used to authenticate the sender and prevent unauthorized access to the embedded secret data. The proposed method aims to provide improved security for transmitting hidden data over untrusted channels.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
Image and text Encryption using RSA algorithm in java PiyushPatil73
This document provides an overview and implementation details of an image and text encryption/decryption project using RSA encryption. It includes chapters on introduction/background, hardware/software specifications, feasibility study, preliminary design including ER diagram and data flow diagram, screen layouts, testing approach including white and black box testing, and implementation details of the modules. The implementation utilizes Java and generates RSA public/private key pairs to encrypt and decrypt text and images.
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
The astonishing developments have been occurring in the field of network communications for a long time and
these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web.
The web is not secure for the exchange of dependable data, for example, content, picture and video.
Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography,
for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt
decreased security for information protection. With a specific end goal to enhance the security, it is important to
expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption
methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based
encryption has its own significance in providing security for secret information i.e. data confidentiality than
conventional.
This document describes an audio cryptography system project that embeds encrypted messages within audio files. The system has two main modules: a GUI module built using AWT, Swing components; and an encryption/decryption module. Messages are encrypted before being embedded in audio files using LSB coding and encryption algorithms. The encrypted audio files can then be transmitted and decrypted at the recipient end to extract the original message. The system aims to provide security, confidentiality and integrity to transmitted messages.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
This document proposes a hybrid approach to text and image steganography using AES encryption and LSB substitution. It begins with background on cryptography, steganography, and image steganography techniques. It then reviews related work that uses direct hiding, XOR encryption, AES encryption with LSB nibble substitution, and techniques requiring pre-agreed cover images. The proposed system first encrypts a text or image using AES before embedding it in a cover image using an improved LSB technique that can store more data while maintaining image quality. It presents the methodology, sample screenshots and concludes the technique provides improved security while being user friendly. Future work could extend it to other file types and formats.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
The document summarizes a block-based image transformation and encryption algorithm. It divides images into blocks that are rearranged to decrease correlation between pixels. The transformed image is then encrypted with Blowfish. Three cases using different block sizes were tested. Results showed that using smaller blocks decreased correlation and increased entropy, strengthening encryption. The technique enhances security by transforming before encrypting with Blowfish.
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave). As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
IRJET- GSVD Algorithm for Image EncryptionIRJET Journal
This document describes a Generalized Singular Value Decomposition (GSVD) algorithm for encrypting and decrypting RGB images. The algorithm works by:
1) Splitting the plaintext image into R, G, and B channels and applying GSVD encryption to each channel using an encryption key.
2) Combining the encrypted channels to form the ciphertext image.
3) For decryption, the ciphertext image is split into channels and GSVD is applied to each using the encryption key to recover the original plaintext image.
The algorithm aims to provide stronger security for images transmitted between parties compared to other encryption methods through the use of GSVD and an additional reference key image during the encryption process.
The document describes a modified AES key expansion algorithm for image encryption and decryption. It discusses basics of cryptography and image encryption. It introduces AES and describes the standard AES key expansion process. It then presents a modified AES key expansion algorithm tailored for images where the keys are expanded based on image pixel count, Rcon values are derived from the initial key, and the S-box is shifted based on the initial key. It analyzes the proposed algorithm and shows it offers high encryption quality with minimal time compared to previous techniques.
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
This document discusses methods for encrypting and decrypting images using reversible data hiding and least significant bit algorithms with asymmetric cryptography. It proposes a method that reserves room in the image before encryption using histogram shift-based reversible data hiding and least significant bit algorithms with a public key cryptosystem. This allows data to be embedded in the encrypted image simply for the user. The embedded data and original image can then be extracted and recovered later without any loss of pixels or data. The method claims to embed more than ten times as much data as other techniques while maintaining image quality and restoration after encryption.
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
This document discusses securing data by combining JPEG2000 compression, RSA encryption, and discrete wavelet transform (DWT) steganography. It describes how the data is first substituted using a 14 square algorithm and then encrypted with RSA. The encrypted message is compressed with JPEG2000 before being hidden within an image using DWT steganography. At the receiver end, the reverse process is performed to decrypt the original message. Combining encryption, compression, and steganography makes the secured information more robust and difficult to hack within a feasible time frame.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
Abstract :Multimedia data security is becoming important with the continuous increase of digital communications on internet. With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. . The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. Therefore, there is a great demand for secured data storage and transmission techniques. Information security has traditionally been ensured with data encryption and authentication techniques. The secrecy of communication is maintained by secret key exchange. In effect the strength of the algorithm depends solely on the length of the key. The presented work aims at secure video transmission using randomness in encryption algorithm, thereby creating more confusion to obtain the original data. The security of the original cipher has been enhanced by addition of impurities to misguide the cryptanalyst. Since the encryption process is one way function, the artificial neural networks are best suited for this purpose as they possess features like high security, no distortion and its ability to perform for non linear input-output characteristics, In the presented work the need for key exchange is also eliminated, which is otherwise a perquisite for most of the algorithms used today. The proposed work finds its application in medical imaging systems, military image database communication and confidential video conferencing, and similar such application. The results are obtained through the use of MATLAB 7.14.0 Keywords: Artificial Neural networks, Back propagation algorithm, video encryption and decryption, cipher and decipher.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
Audio video steganography using forensic techniquefor data securityIAEME Publication
This document summarizes an academic paper that proposes a method for hiding secret data in audio and video files using steganography and computer forensics techniques for authentication. The method embeds secret text or images in selected video frames using 4LSB steganography for images and phase coding for audio. At the receiver side, authentication involves verifying frame parameters and comparing recovered images to originals before secret data recovery. Computer forensics techniques are used to authenticate the sender and prevent unauthorized access to the embedded secret data. The proposed method aims to provide improved security for transmitting hidden data over untrusted channels.
A New Steganographic Method for Embedded Image In Audio FileCSCJournals
Abstract Secure transaction of information has increasing attention in the recent days, such that information concealment has become very important modern used strategies, in which the information is concealment in any other information such that the second information does not change significantly and it appears the same as original. Information hiding is the technology to embed the secret information into a cover data in a way that keeps the secret information invisible. This paper presents a new steganographic method for embedding an image in an Audio file. Emphasis will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method of data hiding in audio.
Image and text Encryption using RSA algorithm in java PiyushPatil73
This document provides an overview and implementation details of an image and text encryption/decryption project using RSA encryption. It includes chapters on introduction/background, hardware/software specifications, feasibility study, preliminary design including ER diagram and data flow diagram, screen layouts, testing approach including white and black box testing, and implementation details of the modules. The implementation utilizes Java and generates RSA public/private key pairs to encrypt and decrypt text and images.
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
The astonishing developments have been occurring in the field of network communications for a long time and
these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web.
The web is not secure for the exchange of dependable data, for example, content, picture and video.
Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography,
for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt
decreased security for information protection. With a specific end goal to enhance the security, it is important to
expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption
methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based
encryption has its own significance in providing security for secret information i.e. data confidentiality than
conventional.
This document describes an audio cryptography system project that embeds encrypted messages within audio files. The system has two main modules: a GUI module built using AWT, Swing components; and an encryption/decryption module. Messages are encrypted before being embedded in audio files using LSB coding and encryption algorithms. The encrypted audio files can then be transmitted and decrypted at the recipient end to extract the original message. The system aims to provide security, confidentiality and integrity to transmitted messages.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
This document proposes a hybrid approach to text and image steganography using AES encryption and LSB substitution. It begins with background on cryptography, steganography, and image steganography techniques. It then reviews related work that uses direct hiding, XOR encryption, AES encryption with LSB nibble substitution, and techniques requiring pre-agreed cover images. The proposed system first encrypts a text or image using AES before embedding it in a cover image using an improved LSB technique that can store more data while maintaining image quality. It presents the methodology, sample screenshots and concludes the technique provides improved security while being user friendly. Future work could extend it to other file types and formats.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data. Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective encryption-based algorithm has never been adequately studied. This paper introduces a new selective encryption-based security system which will transfer data with protection even in unauthenticated network. Selective encryption-based security system will also minimize time during encryption process which there by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
Steganography is the technique of hiding any secret information like password, data andimage behind any cover file. This paper proposes a method which is an audio-video crypto steganography system which is the combination of audio steganography and video steganography using advanced chaotic algorithm as the secure encryption method. The aim is to hide secret information behind image and audio of video file. Since video is the application of many audio and video frames. We can select a particular frame for image hiding and audio for hiding our secret data.4LSB substitution can be used for image steganography and LSB substitution algorithm with location selection for audio steganography. Advanced chaotic algorithm can be used for encryption and decryption of data and images. Suitable parameter of security and authentication such as PSNR value, histograms are obtained at both the receiver side and transmitter sides which are found to be identical at both ends. Reversible data hiding methods for both video and audio are also being mentioned. Hence the security of the data and image can be enhanced. This method can be used in fields such as medical and defence which requires real time processing.
This document describes an audio-video crypto steganography system that combines audio and video steganography. It hides secret information like text and images in video frames and audio using the least significant bit substitution method and an advanced chaotic encryption algorithm. At the transmitter side, an image is embedded in a selected video frame and text is hidden in the audio by replacing least significant bits. The audio and video are then combined and encrypted using a chaotic algorithm before transmission. At the receiver side, the frame and audio are decrypted and the hidden image and text can be extracted by analyzing the least significant bits.
1. The document proposes a natural image-based visual secret sharing (NVSS) scheme to share digital images securely. It uses diverse natural images like photographs, paintings, etc. as carriers rather than altering them.
2. Feature extraction is performed on the natural images to generate feature matrices. These features along with the secret image are encrypted using XOR operation to produce a noise-like share.
3. To further enhance security during transmission, the noise-like share is hidden using techniques like embedding it in a QR code. The proposed NVSS scheme reduces transmission risk by using diverse media and hiding the share.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
The document proposes a new method for securing image steganography using visual cryptography and integer wavelet transform. The method embeds a secret image into a cover image in the following steps: 1) Apply (2 out of 2) visual cryptography to the secret image to generate two secret shares. 2) Apply a two-level integer wavelet transform to the blue channel of the cover image, resulting in four sub-bands. 3) Embed each secret share into one of the four sub-bands. 4) Combine the channels to generate the stego-image. Extraction requires applying the same transforms to the stego-image to recover the secret shares and reconstruct the secret image, without needing the original cover image. The method
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
This document discusses a proposed lossless encryption technique for finger biometric images. It begins with an abstract that outlines the need for biometric template protection and discusses existing approaches that offer tradeoffs between security and performance. The introduction provides background on encryption algorithms and notes that direct extensions of text-based algorithms are not suitable for images due to their large size and computational overhead of encryption/decryption. The literature review covers requirements for image encryption like security, compression, and efficiency. It describes complete and selective encryption approaches. The proposed methodology involves preprocessing the input fingerprint image, generating an encryption key, and encrypting/decrypting the image using a cryptosystem algorithm. Performance will be evaluated based on encryption time and security parameters like NPCR
IRJET- Machine Learning Application for Data SecurityIRJET Journal
1) The document proposes a machine learning approach for improving data security through steganography. It hides secret messages in images by modifying pixel values and uses machine learning models like SVM and DNN for smoothing distorted images and retrieving lost data.
2) The method first appends a secret text file onto an image, then performs image-to-image steganography to provide additional security. It decrypts the stego images and uses an SVM for classification and noise removal, along with a DNN network model.
3) Experimental results show that as the size of the hidden text file increases, more noise is introduced, but the machine learning models can effectively smooth the images and retrieve the lost message bits.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that proposes a new image encryption method using magnitude and phase manipulation with crossover and mutation approaches. The proposed method encrypts images in the frequency domain. It performs crossover operations to swap real and complex parts of frequency components. It also applies a mutation operation using NOT logic. This makes the encrypted image sensitive to key changes and difficult to decrypt without the key. The method is evaluated on different types of images and is shown to encrypt images with 84-98% efficiency depending on the image content. The authors conclude the method provides an efficient encryption scheme and future work could further improve encryption of images containing easily recognizable objects.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
This document presents a literature review and proposed system for implementing steganographic techniques to conceal and retrieve secret information hidden in digital files like images. The proposed system would allow users to hide messages in images, videos and documents using an interface. It would also include a classifier trained to detect common steganography techniques to identify if hidden information is present in images. The system aims to provide a secure communication method and could be used for applications like digital watermarking, covert communication and detecting media piracy. It would use techniques like LSB substitution and AES encryption to hide data in bit planes of images selected by the user. An activity log and user profiles with private keys are also proposed to manage operations and provide additional security.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
This document presents a proposed system for confidential login and encrypted data storage using visual cryptography and steganography. The key aspects are:
1. A visual cryptography scheme is used to generate image CAPTCHAs for user login verification, aiming to prevent phishing attacks.
2. A steganography technique embeds encrypted user data into video files by breaking the data into chunks and hiding chunks in the least significant bits of different video frames, making the hidden data imperceptible.
3. Algorithms like scene change detection, split algorithm, and least significant bit are utilized in the steganography process.
The proposed system aims to provide stronger security and privacy for user login and data storage compared to
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
The document discusses two lossless image encryption algorithms: the bit plane crypt algorithm and the edge map crypt algorithm. Both algorithms use a key image of the same size as the original image to encrypt the image. The bit plane algorithm extracts a bit plane from another image to generate the key image. It then performs an XOR operation between the key image and each bit plane of the original image. The edge map algorithm generates the key image by detecting edges in another image and encrypts each bit plane of the original image using an XOR with the edge map. Both algorithms invert the bit plane order and combine them to produce the encrypted image. Simulation results show the original image can be recovered losslessly from the encrypted image using the decryption process for
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
This document discusses a new image steganography method that uses zero order hold (ZOH) zooming and reversible data hiding techniques to hide secret messages in cover images. The proposed method aims to improve on existing techniques by introducing less noise and allowing for lossy image compression schemes. It uses ZOH and least significant bit (LSB) techniques to embed data in the encrypted cover image. Experimental results showed the proposed ZOH method achieved higher peak signal-to-noise ratios than other methods, indicating improved stego image quality. The goal is to hide secret messages in cover images in a way that is difficult for humans to detect visually.
Similar to IRJET- Low Band Width High Secured Image Transmission in Robust Channels (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.