This document provides an overview of digital image steganography and steganalysis. It discusses various image steganography techniques including least significant bit modification in the spatial domain, and algorithms like JSteg and F5 that operate in the transform domain. It also covers hybrid techniques like patchwork and spread spectrum. The document compares the techniques based on parameters like invisibility, bit rate, and robustness. Finally, it discusses steganalysis methods for detecting hidden information in images, including techniques based on higher-order image statistics.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
This document summarizes a research paper that proposes a conditional entrench spatial domain steganography technique (CESS). CESS embeds secret information in the least significant bit and most significant bit of cover images based on predefined conditions to increase security and capacity. It decomposes cover images into 8x8 blocks. The first block embeds upper and lower bound values used for payload retrieval. Each subsequent 8x8 block embeds the payload in LSBs and MSBs of pixels based on the block's mean of median values and difference between consecutive pixels. The technique is evaluated based on capacity, security and PSNR compared to existing methods.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation
Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert
the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using
a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary
sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted
binary sequence into BMP image file format. The performance of algorithm was given a preliminary
evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited
number of experiments comprised hiding text files of various sizes into BMP images. This paper presents a
deeper algorithm performance evaluation; in particular, it evaluates the effects of length of permutation
and occupation ratio on stego image quality and steganography processing time. Furthermore, it evaluates
the algorithm performance for concealing different types of secret media, such as MS office file formats,
image files, PDF files, executable files, and compressed files.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
This document summarizes research on using machine learning techniques for data security, specifically steganography (hiding secret messages within images). It discusses how machine learning algorithms like support vector machines (SVM) can help smooth distorted images and retrieve lost data after a secret message is hidden within an image. The document reviews several related works applying techniques like least significant bit substitution, artificial immune systems, deep learning models for steganalysis, and hash-based approaches. It concludes that the goal is to develop an application for information security using machine learning algorithms to better handle any data loss during transmission from source to destination.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
This document describes an implementation of image steganography that uses two techniques - Five Modulus Method (FMM) and Least Significant Bit (LSB) substitution - to hide a secret image within a cover image. The secret image is divided into two halves, with the upper half embedded using FMM and the lower half using LSB substitution. A private stego-key is also used during embedding to make detection of the secret image more difficult. The quality of the embedded and extracted images is evaluated using PSNR and MSE metrics, with the results showing good visual quality.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
This document presents a method for securing high capacity data hiding using combined data hiding techniques. The method encrypts a message using transposition cipher cryptography, applies a password, and then hides the encrypted message in an image using least significant bit steganography. Experimental results on hiding messages in various images found peak signal-to-noise ratios remained above 30 decibels, indicating hidden data did not noticeably degrade image quality. Statistical analysis of image parameters before and after hiding data also showed little difference, making the hidden message difficult to detect. The combination of encryption, password protection, and steganography provides three layers of security to better protect sizable messages.
A Study on Video Steganographic Techniquesijceronline
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of Steganography is used to share the data secretly and securely. It is the science of embedding secret information into the cover media with the modification to the cover image, which cannot be easily identified by human eyes. Steganography algorithms can be applied in audio, video and image file. Hiding secret information in video file is known as video steganography. Video Steganography means hiding a secret message that can be either a secret text message or an image within a larger one in such a way that just by looking at it, an unwanted person cannot detect the presence of any hidden message. For hiding secret information in the video, there are many Steganography techniques which are further explained in this paper along with some of the research works done in some fields under video steganography by some authors. The paper describes the progress in the field of video Steganography and intends to give the comparison between its different uses and techniques
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
The document proposes a new approach for secure data hiding that combines compression, encryption, and steganography. It uses Lempel-Ziv-Welch compression to reduce file sizes, elliptic curve cryptography for encryption, and modified pixel value differencing with least significant bit substitution to hide encrypted data in images. The proposed method aims to provide higher security than existing techniques by requiring encryption keys to extract hidden messages from stego images with minimal quality degradation.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
Data Hiding Using Green Channel as Pixel Value IndicatorCSCJournals
Steganography is an art of hiding the existence of data that is it hides the secret message in the digital cover medium. This paper introduces an improved algorithm that uses pixel value indicator technique for the concealment of the secret message in most significant bits (MSBs) of the cover image. Here, Green channel serves as a pixel value indicator for hiding the secret message in 5th and 6th bits of Blue channel or Red channel of RGB cover image. If Green channel has even number of 1's, Blue channel is used for embedding the secret message otherwise Red channel is used for the embedding process. The experimental results of the proposed method are obtained using MATLAB R2017a. The experimental results obtained show that the stego-image formed is of great quality having high PSNR value and it provides good security and in distinguishability.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
89 jan-roger linna - 7032576 - capillary heating control and fault detectio...Mello_Patent_Registry
Jan-Roger Linna, John Paul Mello - Capillary Heating Control and Fault Detection System and Methodology for Fuel System in an Internal Combustion Engine
This document presents a study on the optimal design of a bi-layer perforated electromagnetic shield using an improved particle swarm optimization (IPSO) algorithm. The study formulates the problem of minimizing the effective mass of the shield while meeting a target shielding effectiveness. It describes using a bi-layer of copper and permalloy with air holes to reduce mass. The IPSO algorithm is applied to determine the optimum thickness of each layer to minimize the effective mass subject to achieving an acceptable shielding effectiveness level based on standards. Simulation results show the proposed IPSO method finds solutions that provide shielding effectiveness comparable to standard values.
The document discusses improving power system performance using Flexible AC Transmission System (FACTS) devices. It describes three types of FACTS devices: Static Var Compensator (SVC), Thyristor Controlled Series Compensator (TCSC), and Unified Power Flow Controller (UPFC). The SVC and TCSC are able to control voltage and improve the voltage profile. Simulations showed adding FACTS devices decreased power losses and improved the voltage level. The UPFC can simultaneously control parameters like line impedance, voltage, and phase angle to regulate power flow.
Intelligent Fault Identification System for Transmission Lines Using Artifici...IOSR Journals
Transmission and distribution lines are vital links between generating units and consumers. They are
exposed to atmosphere, hence chances of occurrence of fault in transmission line is very high, which has to be
immediately taken care of in order to minimize damage caused by it. This paper focuses on detecting the faults
on electric power transmission lines using artificial neural networks. A feed forward neural network is
employed, which is trained with back propagation algorithm. Analysis on neural networks with varying number
of hidden layers and neurons per hidden layer has been provided to validate the choice of the neural networks
in each step. The developed neural network is capable of detecting single line to ground and double line to
ground for all the three phases. Simulation is done using MATLAB Simulink to demonstrate that artificial
neural network based method are efficient in detecting faults on transmission lines and achieve satisfactory
performances. A 300km, 25kv transmission line is used to validate the proposed fault detection system.
Hardware implementation of neural network is done on TMS320C6713.
1. The document examines a local Nigerian game called "tsorry checkerboard" and applies group theory concepts.
2. The game is played on a 2x2 board with each player having up to 3 pieces, and the goal is to line up all three of one's pieces horizontally, vertically, or diagonally.
3. The possible moves of each piece (vertical, horizontal, diagonal, or staying in place) form a Klein four-group, satisfying the group properties of closure, associativity, identity, and inverses. Therefore, group theory can be applied to model the game.
The document discusses the use of shunt active filters to mitigate current harmonics in power systems. It analyzes the performance of a shunt active filter controlled by a PI controller and fuzzy logic controller (FLC) under normal and increased load conditions with balanced and unbalanced source voltages. The main points are:
A) Shunt active filters inject compensating current to make the source current sinusoidal and maintain unity power factor.
B) Both PI and FLC controllers perform well under balanced voltages but FLC provides better compensation under unbalanced voltages.
C) The FLC with a triangular membership function offers superior results compared to the PI controller in mitigating current harmonics.
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
This document summarizes research on using machine learning techniques for data security, specifically steganography (hiding secret messages within images). It discusses how machine learning algorithms like support vector machines (SVM) can help smooth distorted images and retrieve lost data after a secret message is hidden within an image. The document reviews several related works applying techniques like least significant bit substitution, artificial immune systems, deep learning models for steganalysis, and hash-based approaches. It concludes that the goal is to develop an application for information security using machine learning algorithms to better handle any data loss during transmission from source to destination.
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
This document describes an implementation of image steganography that uses two techniques - Five Modulus Method (FMM) and Least Significant Bit (LSB) substitution - to hide a secret image within a cover image. The secret image is divided into two halves, with the upper half embedded using FMM and the lower half using LSB substitution. A private stego-key is also used during embedding to make detection of the secret image more difficult. The quality of the embedded and extracted images is evaluated using PSNR and MSE metrics, with the results showing good visual quality.
This document describes a study that compares the Random Scan algorithm to the Modified Least Significant Bit (MLSB) algorithm for video steganography. The Random Scan algorithm hides encrypted secret data by randomly replacing bits in the 1-4 least significant bit positions of cover video frame pixels. The MLSB algorithm replaces bits only in the 2 least significant bit positions. Experimental results on two video files showed that MLSB had lower mean square error and higher peak signal-to-noise ratio, indicating better imperceptibility. However, Random Scan had a higher correlation factor between cover and stego frames, indicating it better preserves the statistical properties of the cover and provides more security against detection. Therefore, the Random Scan algorithm is preferable over MLSB
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
This document presents a method for securing high capacity data hiding using combined data hiding techniques. The method encrypts a message using transposition cipher cryptography, applies a password, and then hides the encrypted message in an image using least significant bit steganography. Experimental results on hiding messages in various images found peak signal-to-noise ratios remained above 30 decibels, indicating hidden data did not noticeably degrade image quality. Statistical analysis of image parameters before and after hiding data also showed little difference, making the hidden message difficult to detect. The combination of encryption, password protection, and steganography provides three layers of security to better protect sizable messages.
A Study on Video Steganographic Techniquesijceronline
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of Steganography is used to share the data secretly and securely. It is the science of embedding secret information into the cover media with the modification to the cover image, which cannot be easily identified by human eyes. Steganography algorithms can be applied in audio, video and image file. Hiding secret information in video file is known as video steganography. Video Steganography means hiding a secret message that can be either a secret text message or an image within a larger one in such a way that just by looking at it, an unwanted person cannot detect the presence of any hidden message. For hiding secret information in the video, there are many Steganography techniques which are further explained in this paper along with some of the research works done in some fields under video steganography by some authors. The paper describes the progress in the field of video Steganography and intends to give the comparison between its different uses and techniques
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
The document proposes a new approach for secure data hiding that combines compression, encryption, and steganography. It uses Lempel-Ziv-Welch compression to reduce file sizes, elliptic curve cryptography for encryption, and modified pixel value differencing with least significant bit substitution to hide encrypted data in images. The proposed method aims to provide higher security than existing techniques by requiring encryption keys to extract hidden messages from stego images with minimal quality degradation.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
Data Hiding Using Green Channel as Pixel Value IndicatorCSCJournals
Steganography is an art of hiding the existence of data that is it hides the secret message in the digital cover medium. This paper introduces an improved algorithm that uses pixel value indicator technique for the concealment of the secret message in most significant bits (MSBs) of the cover image. Here, Green channel serves as a pixel value indicator for hiding the secret message in 5th and 6th bits of Blue channel or Red channel of RGB cover image. If Green channel has even number of 1's, Blue channel is used for embedding the secret message otherwise Red channel is used for the embedding process. The experimental results of the proposed method are obtained using MATLAB R2017a. The experimental results obtained show that the stego-image formed is of great quality having high PSNR value and it provides good security and in distinguishability.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
The document presents a novel hash-based 2-3-3 least significant bit (LSB) image steganography technique for embedding secret images in the spatial domain of color cover images. The technique embeds 8 bits of secret image data at a time in the LSBs of color image pixels in a 2-3-3 pattern across the red, green, and blue channels. Experimental results show the proposed 2-3-3 technique improves mean squared error and peak signal-to-noise ratio values compared to the base 3-3-2 LSB insertion technique. The proposed technique provides better imperceptibility of the stego image and higher embedding capacity than previous hash-based LSB methods.
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
89 jan-roger linna - 7032576 - capillary heating control and fault detectio...Mello_Patent_Registry
Jan-Roger Linna, John Paul Mello - Capillary Heating Control and Fault Detection System and Methodology for Fuel System in an Internal Combustion Engine
This document presents a study on the optimal design of a bi-layer perforated electromagnetic shield using an improved particle swarm optimization (IPSO) algorithm. The study formulates the problem of minimizing the effective mass of the shield while meeting a target shielding effectiveness. It describes using a bi-layer of copper and permalloy with air holes to reduce mass. The IPSO algorithm is applied to determine the optimum thickness of each layer to minimize the effective mass subject to achieving an acceptable shielding effectiveness level based on standards. Simulation results show the proposed IPSO method finds solutions that provide shielding effectiveness comparable to standard values.
The document discusses improving power system performance using Flexible AC Transmission System (FACTS) devices. It describes three types of FACTS devices: Static Var Compensator (SVC), Thyristor Controlled Series Compensator (TCSC), and Unified Power Flow Controller (UPFC). The SVC and TCSC are able to control voltage and improve the voltage profile. Simulations showed adding FACTS devices decreased power losses and improved the voltage level. The UPFC can simultaneously control parameters like line impedance, voltage, and phase angle to regulate power flow.
Intelligent Fault Identification System for Transmission Lines Using Artifici...IOSR Journals
Transmission and distribution lines are vital links between generating units and consumers. They are
exposed to atmosphere, hence chances of occurrence of fault in transmission line is very high, which has to be
immediately taken care of in order to minimize damage caused by it. This paper focuses on detecting the faults
on electric power transmission lines using artificial neural networks. A feed forward neural network is
employed, which is trained with back propagation algorithm. Analysis on neural networks with varying number
of hidden layers and neurons per hidden layer has been provided to validate the choice of the neural networks
in each step. The developed neural network is capable of detecting single line to ground and double line to
ground for all the three phases. Simulation is done using MATLAB Simulink to demonstrate that artificial
neural network based method are efficient in detecting faults on transmission lines and achieve satisfactory
performances. A 300km, 25kv transmission line is used to validate the proposed fault detection system.
Hardware implementation of neural network is done on TMS320C6713.
1. The document examines a local Nigerian game called "tsorry checkerboard" and applies group theory concepts.
2. The game is played on a 2x2 board with each player having up to 3 pieces, and the goal is to line up all three of one's pieces horizontally, vertically, or diagonally.
3. The possible moves of each piece (vertical, horizontal, diagonal, or staying in place) form a Klein four-group, satisfying the group properties of closure, associativity, identity, and inverses. Therefore, group theory can be applied to model the game.
The document discusses the use of shunt active filters to mitigate current harmonics in power systems. It analyzes the performance of a shunt active filter controlled by a PI controller and fuzzy logic controller (FLC) under normal and increased load conditions with balanced and unbalanced source voltages. The main points are:
A) Shunt active filters inject compensating current to make the source current sinusoidal and maintain unity power factor.
B) Both PI and FLC controllers perform well under balanced voltages but FLC provides better compensation under unbalanced voltages.
C) The FLC with a triangular membership function offers superior results compared to the PI controller in mitigating current harmonics.
1) The document presents the results of a stability analysis of a reinforced earth wall for the approach road of a rail over bridge along a national highway.
2) The maximum height of the embankment is 7m, and stability is a concern due to weak subgrade soil. Stability analysis using Slope/W software indicates a factor of safety below recommended values without reinforcement.
3) The addition of geosynthetic reinforcement in the form of geogrids placed at various depths and tensions within the embankment fill improves the factor of safety. The optimum reinforcement configuration is found to be 3 geogrid layers.
This document provides a review of information technology implementation for the educational development of rural India. It discusses several key points:
1) It provides an overview of the Indian education system, including the roles of public and private sectors as well as various supporting institutions.
2) It identifies several problems faced by students in rural areas, such as lack of adequate teachers and infrastructure like classrooms and toilets.
3) It discusses how information and communication technologies (ICT) like computers, internet, mobile phones can help improve quality of education through distance learning programs and training teachers.
4) It outlines several approaches that have been used to promote education in rural India using ICT, including village knowledge centers, e
This document summarizes a research paper analyzing the sustainability opportunities and challenges of the biofuels industry in India. The paper aims to answer three questions: 1) What are some significant sustainability opportunities and challenges of the biofuels industry? 2) What is the current state of biofuel operations in India? 3) What initial steps can be taken toward sustainable biofuel development? The response analyzes strategic sustainable development approaches and tools like the Natural Step Framework. Key points discussed include economic, environmental and social sustainability assessments of biomass and biofuels, including issues of profitability, efficiency, equity, energy balance, greenhouse gas emissions and life cycle assessments. Challenges in implementing ethanol blending programs in India like taxation and availability of
This document provides details on calculating various losses that occur in high voltage underground power cables, including dielectric losses, conductor losses, and sheath losses. It presents formulas to calculate voltage-dependent and current-dependent dielectric losses, as well as ohmic conductor losses and sheath eddy current and circulating current losses. The document also provides methods to calculate cable parameters like inductance, impedance, and mutual impedances between conductors and screen. It describes using these calculations and ETAP modeling to analyze losses in an existing 33kV cable network and determine that installing VAR compensators could reduce total daily power losses by approximately 2471 kW.
The document describes a method for image fusion and optimization using stationary wavelet transform and particle swarm optimization. It summarizes that image fusion combines information from multiple images to extract relevant information. The proposed method uses stationary wavelet transform for image decomposition and particle swarm optimization to optimize the fused results. It applies stationary wavelet transform to source images to decompose them into wavelet coefficients. Particle swarm optimization is then used to optimize the transformed images. The inverse stationary wavelet transform is applied to the optimized coefficients to generate the fused image. The method is tested on various images and performance is evaluated using metrics like peak signal-to-noise ratio, entropy, mean square error and standard deviation.
This document presents a new segmentation technique for brain MRI images and compares it to existing techniques. The proposed technique is a two-stage brain extraction algorithm (2D-BEA) that first removes noise and enhances brain boundaries, then uses morphological operations to extract the brain region. It is shown to accurately extract the brain from MRI images. The technique is then compared to other segmentation methods like thresholding, edge detection, fuzzy c-means clustering, and k-means clustering. The results demonstrate that the 2D-BEA technique outperforms these other methods in effectively segmenting the brain region from MRI images.
This document describes the design and fabrication of a prototype for testing the durability of seat belt retractors. The current testing machine has limitations like not being able to test retractors at different mounting angles and extract/retract lengths. The new prototype aims to address these using a stepper motor, spring system instead of bungee, and sensors to detect the snatch produced every 4 cycles. It involves calculations to select components like the pneumatic cylinder, FRL unit, spring, and shaft based on the required forces, strokes and flows. A 3D model was developed and simulations conducted to validate the design. The physical prototype was then fabricated to cater to increasing demand for seat belt testing.
This document proposes laying fiber-optic cables underwater along the River Nile to connect cities in Sudan. It notes that the River Nile and its tributaries pass through many Sudanese cities, providing a natural pathway. Laying cables underwater would be more cost-effective than overland routes due to avoiding expenses like drilling and land permits. It suggests constructing monitoring centers every 100km and connecting cities within that distance to create a network with significant cost savings over traditional methods. In conclusion, an underwater fiber-optic network along the River Nile could efficiently connect inland Sudanese cities and provide benefits over satellite or overland cable routes.
This document compares the performance of IPv4 and IPv6 over MPLS networks. It summarizes the results of simulations run using OPNET 14.5 that evaluated packet delay, packet loss, and throughput for IPv4 and IPv6 over MPLS. The simulations found that IPv6 over MPLS exhibited higher packet loss, higher throughput, and higher delay compared to IPv4 over MPLS which had lower throughput and delay with less dropped packets. Therefore, IPv6 may be suitable for applications requiring high bandwidth but not for real-time applications due to its higher delays and packet loss.
This document discusses fault analysis of power distribution systems through simulation. It begins with an introduction describing the importance of fault analysis for designing reliable and cost-efficient power systems. It then describes different types of faults that can occur, including balanced/unbalanced faults and series/shunt faults. Symmetrical components are used to model and analyze unbalanced faults. The document presents simulations of various fault scenarios on a 5-bus system, such as single line-to-ground faults and three-phase faults. Results are analyzed to observe impacts on voltages and currents. In conclusion, observations are made about how fault characteristics differ based on fault type.
This document summarizes a study on the body composition of children participating in regular football, cricket, and gymnastics training. The study aimed to compare the anthropometric and body composition status of children in these three sports. Body composition measurements including body fat percentage, fat mass, and lean mass were taken for children in each sport. Statistical analysis found that footballers had significantly lower body fat percentage and fat mass than cricketers but did not differ significantly in lean mass. Footballers also had significantly lower body fat percentage and fat mass than cricketers as well as significantly higher lean mass. Gymnasts had significantly lower body fat percentage and fat mass than cricketers but did not differ significantly in lean mass. The study concluded that footballers generally had a better body
This document analyzes the modeling of overhead transmission lines for lightning studies. It summarizes guidelines for modeling transmission line components like towers, grounding impedance, and insulator strings. It then models a 400kV transmission line in Albania using these guidelines. Simulation results show that towers with higher characteristic impedance and grounding resistance experience lower peak lightning currents. Accurately modeling transmission line components is important for evaluating lightning performance and maintenance.
This document discusses different algorithms for task scheduling in cloud computing environments based on various quality of service (QoS) parameters. It summarizes several QoS-based scheduling algorithms including QDA, Improved Cost Based, PAPRIKA, ANT Colony, CMultiQoSSchedule, and SHEFT Workflow. It also provides a comparative table of these algorithms and discusses the various metrics considered by QoS-based scheduling algorithms like time, cost, makespan, trust, and resource utilization. The paper concludes that scheduling is an important factor for cloud environments and that existing algorithms can be improved by considering additional parameters like trust values, execution rates, and success rates.
This document summarizes a research paper that proposes using sink mobility to maximize the lifetime of wireless sensor networks. The paper introduces wireless sensor networks and describes the existing problem of energy-inefficient routing. It then proposes a solution that involves moving the sink node to different locations to reduce energy consumption. The framework creates alternative paths using AODV routing when nodes have low energy. Results show improved network lifetime, packet delivery ratio, and lower bit error rate compared to stationary sink approaches. Future work may extend the approach to networks with moving sensor nodes.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
This document summarizes a research paper that proposes a new methodology for reducing additive distortion in steganography. The paper introduces a method to embed 2 bits of information in a pixel by altering only one bit plane. This is expected to make detection of covert communication more difficult for steganalysis algorithms compared to altering the least significant bit. The method uses Java for implementation and MATLAB to analyze histograms of original and stego images. Experimental results on embedding secret text in images are presented, along with analysis of the distortion levels and security of the proposed approach.
This document discusses data hiding techniques for images. It begins by introducing steganography and some common image steganography methods like LSB substitution, blocking, and palette modification. It then reviews related work on minimizing distortion in steganography, modifying matrix encoding for minimal distortion, and designing adaptive steganographic schemes. The document proposes using a universal distortion measure to evaluate embedding changes independently of the domain. It presents a system for reversible data hiding in encrypted images that partitions the image, encrypts it, hides data in the encrypted image, and allows extraction from the decrypted or encrypted image. Least significant bit substitution is discussed as an approach for hiding data in the encrypted image.
Steganography using visual cryptography: ReportAparna Nk
This document is a seminar report submitted by Aparna N K to the University of Kerala in partial fulfillment of the requirements for a Master of Computer Applications degree. The report discusses steganography using a genetic algorithm along with visual cryptography for wireless network applications. It provides background on steganography, cryptography, genetic algorithms, the LSB steganography algorithm, and describes a proposed system that uses LSB embedding combined with genetic algorithm pixel modification and visual cryptography to hide secret messages in images for secure transmission. The performance of the proposed system is analyzed based on metrics like mean squared error and peak signal-to-noise ratio.
1. The document discusses data hiding techniques for images, specifically uniform embedding. It reviews existing methods like LSB substitution and proposes developing a new technique to select pixels for embedding, reduce embedded text size, and increase confidentiality.
2. It surveys related work on minimizing distortion in steganography, a modified matrix encoding technique for low distortion, and designing adaptive steganographic schemes.
3. The objectives are to develop a new pixel selection technique for embedding, reduce embedded text size, and increase resistance to extraction through high confidentiality. The significance is providing a solution to digital image steganography problems and focusing on choosing pixels to embed text under conditions.
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
This document summarizes a research paper that proposes a new data embedding technique called adaptive pixel pair matching (APPM) for digital image steganography. The APPM technique hides secret data by replacing pairs of pixels in the cover image with coordinates that represent the hidden data. This allows data to be hidden in any numerical system. The document outlines existing steganography techniques including least significant bit replacement and transform domain methods. It then describes the proposed APPM technique in more detail, asserting it offers lower distortion than other methods by providing more compact pixel neighborhoods and flexible numerical representation of hidden data.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
Data hiding is the art of hiding data for various purposes such as--- to maintain private data, secure confidential data. Well known technique is the Steganography; Steganography has evolved into a digital strategy of hiding a file in some form of multimedia, such as an image, an audio file or even a video file. This paper presents a new Steganography technique in spatial domain for encoding extra information in an image by making small modifications to its pixels. The proposed method focuses on one particular popular technique, Least Significant Bit (LSB) Embedding. Instead of using the LSB-1 of the cover for embedding the message, LSB-2 has been used to increase the robustness of system. and protect the message against the external influences such as noise, filter, compression…etc.[Using SBR Algo].
For more protection to the message bits a Stego-Key has been used to permute the message bits before embedding it. An experimental result of the modified method shows that this paper helps to successfully hide the secret data into the image file with minimum distortion made to the image file.
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
This document discusses a new image steganography method that uses zero order hold (ZOH) zooming and reversible data hiding techniques to hide secret messages in cover images. The proposed method aims to improve on existing techniques by introducing less noise and allowing for lossy image compression schemes. It uses ZOH and least significant bit (LSB) techniques to embed data in the encrypted cover image. Experimental results showed the proposed ZOH method achieved higher peak signal-to-noise ratios than other methods, indicating improved stego image quality. The goal is to hide secret messages in cover images in a way that is difficult for humans to detect visually.
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
1. The document presents a method for secure data transfer using delta steganography.
2. Delta steganography embeds secret data by replacing the differences between pixel values in the cover image, rather than the pixel values themselves.
3. This provides improved security over traditional LSB steganography as the secret data is scattered throughout the cover image in a non-sequential manner.
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganographyn involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image, audio or video stego media vis-à-vis the corresponding cover media (without the hidden information) and understand the process of embedding the information and its detection. It is noteworthy that each of these cover media has different special attributes that are altered by a steganography algorithm in such a way that the changes are not perceivable for the unintended recipients; but, the changes are identifiable using appropriate steganlysis algorithms. We anticipate that this paper can also give a clear picture of the current trends in
steganography so that we can develop and improvise appropriate steganlysis algorithms.
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
This document proposes a secure image hiding algorithm using cryptography and steganography. It first encrypts an image using the Blowfish encryption algorithm. Then, it hides the encrypted image in a video file using least significant bit (LSB) steganography. Blowfish was chosen for encryption due to its strong security and fast processing compared to other algorithms. LSB steganography in BMP images provides high invisibility and payload capacity. The proposed method provides two layers of security by encrypting the image before hiding it, making it difficult for unauthorized users to detect or extract the hidden information.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 1 (Sep. - Oct. 2013), PP 56-60
www.iosrjournals.org
www.iosrjournals.org 56 | Page
A Survey on Digital Image Steganography and Steganalysis
Gangadhar Tiwari 1
, Arun Kumar Yadav2
, Madhusudhan Mishra3
1
(IT Department, NIT Durgapur, India) 2
(CSE Department, M.G. Institute of Management and Technology,
Lucknow, India), 3
(ECE Department, NERIST, India)
Abstract: Steganography is an information security approach used to hide messages inside suitable covers in
such a way that it is not known to attackers. The cover files may be any digital data including Image or Audio
files. For steganography several methods exists where each of them has some advantages and disadvantages.
Steganographic applications have varying requirements depending upon the steganography technique used. In
this paper we present an overview of image steganography and steganalsysis, its uses and techniques. It also
attempts to identify the requirements of a good steganographic algorithm and compares their performance with
respect to requirements.
Keywords: Image Steganography, Data Hiding, Steganalysis, Spread Spectrum, Patchwork
I. Introduction
Steganography means covered writing. It is used to conceal information inside cover files making it impossible
to detect them. Various steganography terminologies are discussed below.
1. Embedded data Type- It is the data to be hidden.
2. Stego-data Type- Output of the hiding process.
3. Cover-data Type- An input which is original form of stego data type.
4. Stego key- Additional secret data needed in hiding process.
5. Embedding- It is process of hiding embedded message.
6. Extracting- Getting embedded message out of Stego-message again.
7. Stego-analyst- From whom message is hidden
In this paper, Section-2 presents a comparison between Steganography and Cryptography. Section-3 describes
various Steganographic Techniques. Section-4 is devoted on Image Steganalysis. Section-5 presents the
conclusion and future scope.
II. Steganography vs. Cryptography
The term steganography means covered writing whereas cryptography means secret writing. In this
section we compare steganography and cryptography based on key criterion [1].
1. Carrier for Steganography is any digital media while for cryptography it is text based image files.
2. Secret data for steganography is payload while for cryptography it is plain text.
3. In steganography Key is optional while for cryptography it is necessary.
4. At least two input files are required for steganography but one is sufficient for cryptography.
5. In steganography as well as cryptography, detection scheme is blind.
6. For authentication both require full data retrieval.
7. The objective of steganography is covert communication while cryptography is deployed for data protection.
8. Output of steganography is a stego file while that of cryptography it is cipher text.
9. Steganography is concerned with detecting capacity while cryptography stresses on robustness.
10. Attacks on steganography is known as steganalsysis while for cryptography it is called cryptanalysis.
11. Steganography fails when it is detected while cryptography fails when deciphered.
12. Steganography is a very old information security approach except its digital version while cryptography is a
present era technique.
III. Different kinds of Steganography
3.1. Based on type of Original signal
There are four different types of steganography on the basis of original signal viz. Text, Audio, Image
and Protocol. Given the proliferation of digital images on Internet and large amount of redundant bits present in
it, images are the most popular cover objects for Steganography. This review will focus on hiding information in
images in the next sections. The term Protocol Steganography refers to the technique of embedding information
within messages and network control protocols used in network transmission.
2. A Survey on Digital Image Steganography and Steganalysis
www.iosrjournals.org 57 | Page
3.2 Based on Key Usage
The various types of Steganographic techniques based on usage of key are: Pure Steganography, Secret
key Steganography and Public key Steganography.
3.2.1 Pure Steganography
It is the process of embedding the data into the object without using any private keys. It fully relies on
the secrecy and a cover image is used for data embedding, personal information to be transmitted, and
encryption decryption algorithms to embed the message into image. It cannot provide the better security.
3.2.2 Secret key Steganography
It uses the same method as discussed above while employing secure keys. Individual keys are deployed
for embedding the data into the cover object.
3.2.3 Public key Steganography
Public key Steganography uses two types of keys- one for encryption and another for decryption. The
encryption key is kept private while decryption key is made public and available in a public database.
3.3 Based on Embedding Domain
There are number of image steganography algorithm proposed on the basis of embedding domain that
includes Spatial or Transform, depending on redundancies used from domain for the embedding process [2].
3.3.1 Spatial Domain Embedding- LSB Modification
In spatial domain techniques messages are embedded in intensity of pixels directly. It encompasses bit-
wise methods that apply noise manipulation and bit insertion. LSB technique is the most commonly used
steganographic algorithm. It makes use of fact that least significant bits in an image could be thought of random
noise and changes to them would not affect the image. LSB based methods can be divided into two groups viz.-
LSB Replacement and LSB Matching. In the LSB replacement technique, the LSB of the pixels is replaced by
the message to be sent. While in LSB Matching Technique the pixels are randomly incremented or decremented
by secret bits. Popular Steganographic algorithms change LSB of pixels randomly while others amend pixels in
particular areas of images. It is most suitable for applications where the focus is on the amount of information to
be transmitted and not on secrecy of that information. LSB technique performs better in terms of speed and
quality of data hiding however security is a major concern.
Palette based images are popular image file format used on the Internet. GIF images can also be used
for LSB Steganography. An obvious demerit of the palette approach when used with GIF images is that any
single change in the least significant bit of a pixel, leads to a completely different color. If adjacent palette
entries are dissimilar the change would be evident. One solution is to add new colors which are visually similar
to the existing colors in the palette that results in original image to have less unique colors than the maximum
number of colors. In this method, care should be taken to select the right cover image. But any tampering with
the palette of an indexed image leaves a trail making detection easier.
Another solution to the problem is to use grayscale images. In an 8-bit grayscale GIF image, there are
256 different shades of grey. The changes between the colors are very gradual, making it harder to detect.
Moreover, the amount of information that can be hidden is less than BMP. GIF images are especially vulnerable
to statistical/ visual attacks – since the palette processing that has to be done leaves a very definite signature on
image. This approach is relies on image and its file format, as because a wrong choice of image would lead to
message visibility.
Another approach for embedding messages in spatial domain is introducing statistically similar noise to
pixel randomly e.g., scanner noise. A pseudo random noise generator is employed to generate the noise using a
shared key. Embedding and detection of the message modulated by the generated noise is achieved by a parity
function.
Naseem et al proposed a technique based on using Distributed LSB for Data Hiding in Images which
has better hiding capacity and causes less degradation in the resulted stego image by using the lower bits to hide
secret bits as per the new rule which takes into account the intensity level of each pixel [3, 6]. The proposed
algorithm is reversible as the secret data is recovered properly. In order to protect the stego image from channel
induced interference, channel encoding and modulation techniques can be used. In the recovery process each
pixel is inspected for its intensity value. The last three bits are extracted if a pixel belongs to the first range. This
process continues till exhausting first range pixels after which the second range of pixels are found and the
lower four bits are extracted. However, security is a major concern as it does not uses encryption key. Moreover,
it assumes a communication channel to be perfect which is not possible due to noise.
3. A Survey on Digital Image Steganography and Steganalysis
www.iosrjournals.org 58 | Page
3.3.2 Transform Domain Techniques- JSteg and F5 Alogorithm
Here images are first transformed and then the message is embedded in it. These methods hide
messages in more significant parts of the cover image, making it secure against common signal processing
distortions. Transform domain techniques are does not depend on the image format and thus an embedded
message survives compression attacks. A majority of transform domain techniques focus on using redundancies
in discrete cosine transform (DCT) domain.
JSteg algorithm is a steganographic technique for embedding data into JPEG images. The image
content is transformed into frequency coefficients so as to achieve compressed storage. It replaces LSBs of
quantized Discrete Cosine Transform [4]. In this process the hiding skips all coefficients with the values of 0 or
1. It has high capacity and had a compression ratio of 12%. This algorithm is secure against visual attacks and
offers higher embedding capacity for Steganographic messages but it is vulnerable to statistical attacks.
The F5 algorithm embeds the message into randomly chosen Discrete Courier Transform (DCT) coefficients.
By employing matrix embedding which minimizes the changes to be made to the length of certain message. It
provides high Steganographic capacity, faster speed and can prevent visual and statistical attacks. This
algorithm supports almost all image file formats. The performance of the algorithms differs with the type of
cover image or source on which the data is embedded. The comparison of algorithms is given in Table-III below
From the above review it is clear that both the spatial domain and transform domain steganographic techniques
had their own weakness and hence some hybrid methods were required. We describe two hybrid techniques viz.
Patchwork and Spread Spectrum Techniques in our next section.
3.3.3 Hybrid Techniques-Patchwork and Spread Spectrum
Patchwork is a statistical technique that uses redundant pattern encoding to embed a message in an image. It
adds redundancy to the secret information and scatters it throughout the image. Two areas of image, patch A and
patch B, are selected using a pseudorandom generator All patch A pixels are lightened simultaneously darkening
patch B pixels. The contrast changes in this patch subset encodes one bit and the changes are usually small and
invisible, while keeping average luminosity intact. The patchwork approach is used independent of the host
image and proves to be quite robust and message can survive conversion between lossy and lossless
compression. Also, since the secret message is distributed over the entire image, if one patch is destroyed, the
others exist which makes it suitable for transmitting sensitive information. However, it works well with small
size messages. If the message is too big, it can only be embedded once. Moreover, using patchwork approach
only one bit is embedded. The biggest disadvantage of the patchwork approach is the small amount of
information that can be hidden in one image and overcoming the menace hampers the secrecy.
In Spread Spectrum technique hidden data is spread throughout the cover-image making it harder to
detect. A system proposed by Marvel et al combines error control coding and image processing with spread
spectrum technique to hide information in images. It can be defined as the process of spreading the bandwidth of
a narrowband signal across a wide band of frequencies. It is achieved by adjusting the narrowband signal with a
wideband signal, such as white noise. After spreading, the energy of the narrowband signal in any one frequency
band is low and therefore difficult to detect. Here the message is embedded in noise and then combined with the
cover image to produce the stego image. Thus the embedded image is imperceptible without access to the
original image. It satisfies most requirements and is secure against statistical attacks, since the hidden
information is uniformly scattered keeping intact the statistical properties of image. Spread spectrum techniques
can be used for most Steganography applications, although it is highly mathematical and intricate approach.
3.4 Evaluation of various techniques
TABLE-1 below compares the effectiveness of common Image Steganographic Algorithms in terms
of six parameters namely Invisibility, Bit rate, Robustness against Statistical Attack, Robustness Against Image
Processing(IP) Attacks, Independence of file format and Use of Unsuspicious files[5, 7]. The levels at which
the algorithms satisfy the requirements are defined as high, medium and low. If the algorithm completely
satisfies the requirement it is rated high, whereas an algorithm with a weakness in requirements is rated low. A
medium level indicates that the requirement depends on other factors like the cover image used. For e.g. LSB in
GIF images can hide large messages provided suitable cover image are selected. It is to be noted that an ideal
Steganographic algorithm would have a high level in every requirement which is non-existent yet creating a
trade-off, depending on which requirements are more important for the specific application.
Table-1
LSB in GIF JPEG Patchwork Spread Spectrum
Invisibility Medium High High High
Bit rate Medium Medium Low Medium
Robustness against Statistical Attack Low Medium High High
Robustness against IP Attack Low Medium High Medium
4. A Survey on Digital Image Steganography and Steganalysis
www.iosrjournals.org 59 | Page
Independent of file extension Low Low High High
Unsuspicious file Low High High High
IV. Image Steganalysis
Aiming at detecting secret information hidden in a given image using steganographic tool,
steganalsysis has been of interest since the end of 1990’s. Steganographic attacks consist of extraction, detection
and destruction of hidden messages of the stego media [8].
4.1. Types of Attacks
There exist various attacks based on information available for analysis. It is divided into six main categories.
Stego-only attack- Only the stego-image is available for analysis.
Known cover attack- The original cover-image and stego- image are both available.
Known message attack- At some point, the hidden message becomes known to the attacker. Even with the
message, this may be very difficult and may even be considered equivalent to the stego-only attack.
Chosen stego attack- The steganography tool and stego-image are known.
Chosen message attack- Steganalyst generates a stego-image from steganography tool from a chosen message.
Known stego attack- algorithm is known and both the original and stego-image are available.
According to the targeted steganographic tools, steganalsysis can be also broadly classified into specific and
universal steganalsysis. Specific steganalsysis is designed to detect some particular steganalsysis while
Universal steganalsysis is also called blind steganalsysis or universal blind steganalsysis. It can detect the
existence of secret message without steganography algorithms and practicable than the specific steganalsysis.
4.2 Steganalysis Technique
There have been a number of steganalsysis techniques proposed each operating with its own unique
approach. In essence steganalsysis technique operates by obtaining a set of statistical feature from the input
image. Avcibas I first proposed a universal steganalsysis algorithm to detect embedded message in images
through a proper selection of image quality metrics (IQM) and a multi-variant regression analysis [9]. Then he
improved the algorithm and increased the detection precision. Jiang N improved some IQM standards and
combined them into a new feature vector. It adopted the supported vector machine (SVM) classifier to
distinguish between the original and stego images. There are many works reporting that high-order statistics are
very effective in differentiating stego-images from cover images. Farid proposed a general steganalsysis
algorithm based on image higher-order statistics. He modeled the universal steganalsysis by supervised learning
for the first time and indicated that the supervised learning was effective for detecting stego images without
knowing the statistics property of images and steganography methods. Later Farid used a wavelet-like
decomposition to build higher-order statistical models of natural images [10]. For each image, firstly three-scale
quadrature mirror filters (QMF) decomposition was made, then higher-order probability dimensional function
(PDF) moments were extracted, finally the classifier was used to detect the test images. Holotyak et al used
higher-order moments of the PDF of the estimated stego-image in the finest wavelet level to construct the
feature vectors [11]. Shi et al proposed the use of statistical moments of the characteristics functions of the
wavelet sub-bands. Since the n-th statistical moment of wavelet characteristics function is related to the n-th
derivative of the corresponding wavelet histogram, the constructed 3-Dimensional feature vector has proved to
be sensitive to embedded data. Usually, the steganalsysis algorithm based on the higher-order statistics achieved
satisfactory performance on image files, regardless of the underlying embedding algorithm. However, since the
image-embedding method is typically unknown to steganalyst, many researches focused on the design of a blind
steganalsysis algorithm to detect the presence of steganography independent of the steganography algorithm
used. In Geetha’s work they employed the higher order statistical features that were collected from a new
transform domain, i.e., curvelet transform domain [12]. This work is typically a novel and first attempt of
employing these features for Steganalysis. Experimental results also proved that their claim was justified.
V. Conclusion
Hybrid Steganography techniques like Patchwork and Spread Spectrum Techniques are efficient
enough for enabling covert communication. Combining them with Cryptographic techniques provides for high
security. In the present era of internet, steganography has undergone a lot of research and so the steganalsysis.
In this paper we presented a summary on Image Steganography and Steganalysis. However, steganography and
steganalsysis have different requirement for different applications and not one algorithm is sufficient to provide
a solution for all of them. There are many challenges which need to be investigated in Steganography and
corresponding steganalsysis. For e.g. How to choose good cover image for hiding information? Which image
formats are most suitable? Which steganographic/cryptographic algorithm should be employed to provide better
speed and security etc? Therefore steganography and steganalsysis requires further research.
5. A Survey on Digital Image Steganography and Steganalysis
www.iosrjournals.org 60 | Page
References
[1]. Abbas Cheddad A, Joan Condell, Kevin Curran, Paul Mc Kevit, Digital image steganography: Survey and
analysis of current methods, Signal Processing, Elsevier, 2009, 72-75
[2]. Mehdi Kharrazi, Husrev T. Sencar, and Nasir Memon, Image Steganography: Concepts and Practice. Lecture Notes, Polytechnic
University, Brooklyn, NY 11201, USA
[3]. Mohammad Kamran Khan, Mohammad Naseem, Ibrahim Mohammad Hussain and Aisha Ajmal, “Distributed Least Significant Bit
Technique for Data Hiding in Images”, Multitopic Conference (INMIC)”, IEEE, 2011, 149 – 154
[4]. Wai Wai Zin and Than Naing Soe, “Implementation and Analysis of Three Steganographic Approaches”, Computer Research and
Development (ICCRD), 3rd International Conference IEEE, 2, 2011, 60-64
[5]. A.W. Naji , Teddy S. Gunawan, Shihab A. Hameed, B.B Zaidan, A.A Zaidan, Stego-Analysis Chain, Session One-Investigations on
Steganography Weakness Vs Stego-Analysis System for Multimedia File, International Association of Computer Science and
Information Technology - Spring Conference, IEEE,2009, 405 – 409
[6]. B.B.Zaidan, A.A.zaidan, Enhancement of the Size of Hidden Data and the Quality of Image Using LSB Algorithm, Master research,
Kuala Lumpur University, Malaysia, 2008.
[7]. Ge Huayong, Huang Mingshenga, Wang Qian, Steganography and Steganalysis Based on Digital Image, 4th International Congress
on Image and Signal Processing, IEEE, 1, 2011, 252 – 255
[8]. S.Z. Wang, X.P. Zhang, Recent Advances in Image Based Steganalysis Research, Chinese Journal of Computers, 32, 2009, 1247-1263
[9]. I. Avcibas, N. D. Memon, Steganalysis using Image Quality Metrics, IEEE Trans Image Processing, 12, 2003, 221-229
[10]. H. Farid, Detecting hidden messages using higher order statistical models, IEEE transactions on signal processing, 2, 2002, 905-908
[11]. T. Holotyak, J. Fridrich, Blind Statistical steganalysis of additive Steganography using wavelet higher order statistics, Lecture notes in
Computer Science, 2005, 273-274
[12]. S. Geetha, K.Kamaraj, Passive steganalysis based on higher order image statistics of curvelet transform, International Journal for
Automation and Computing, 7, 2010, 531-542
.