Multiple Secret Image Sharing scheme is a protected approach to transmit more than one secret image over a communication channel. Conventionally, only single secret image is shared over a channel at a time. But as technology grew up, there is a need to share more than one secret image. A fast (r, n) multiple secret image sharing scheme based on discrete haar wavelet transform has been proposed to encrypt m secret images into n noisy images that are stored over different servers. To recover m secret images r noise images are required. Haar Discrete Wavelet Transform (DWT) is employed as reduction process of each secret image to its quarter size (i.e., LL subband). The LL subbands for all secrets have been combined in one secret that will be split later into r subblocks randomly using proposed high pseudo random generator. Finally, a developed (r, n) threshold multiple image secret sharing based one linear system has been used to generate unrelated shares. The experimental results showed that the generated shares are more secure and unrelated. The size reductions of generated shares were 1:4r of the size of each of original image. Also, the randomness test shows a good degree of randomness and security.
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
The document proposes a new method for securing image steganography using visual cryptography and integer wavelet transform. The method embeds a secret image into a cover image in the following steps: 1) Apply (2 out of 2) visual cryptography to the secret image to generate two secret shares. 2) Apply a two-level integer wavelet transform to the blue channel of the cover image, resulting in four sub-bands. 3) Embed each secret share into one of the four sub-bands. 4) Combine the channels to generate the stego-image. Extraction requires applying the same transforms to the stego-image to recover the secret shares and reconstruct the secret image, without needing the original cover image. The method
A Novel Visual Cryptographic Scheme Using Floyd Steinberg Half Toning and Block Replacement Algorithms Nisha Menon K – PG Scholar,
Minu Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
There are algorithms in existence for hiding data within an image. The proposed scheme treats the image as a whole. Here
Integer Cosine Transform (ICT) and Integer Wavelet Transform (IWT) is combined for converting signal to frequency. Hide Behind
Corner (HBC) algorithm is used to place a key at corners of the image. All the corner keys are encrypted by generating Pseudo
Random Numbers. The Secret keys are used for corner parts. Then the hidden image is transmitted. The receiver should be aware of
the keys that are used at the corners while encrypting the image. Reverse Data Hiding (RDH) is used to get the original image and it
proceeds once when all the corners are unlocked with proper secret keys. With these methods the performance of the stegnographic
technique is improved in terms of PSNR value.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
The document proposes a new method for securing image steganography using visual cryptography and integer wavelet transform. The method embeds a secret image into a cover image in the following steps: 1) Apply (2 out of 2) visual cryptography to the secret image to generate two secret shares. 2) Apply a two-level integer wavelet transform to the blue channel of the cover image, resulting in four sub-bands. 3) Embed each secret share into one of the four sub-bands. 4) Combine the channels to generate the stego-image. Extraction requires applying the same transforms to the stego-image to recover the secret shares and reconstruct the secret image, without needing the original cover image. The method
A Novel Visual Cryptographic Scheme Using Floyd Steinberg Half Toning and Block Replacement Algorithms Nisha Menon K – PG Scholar,
Minu Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
The document proposes a chaotic image encryption technique using Henon chaotic systems. It consists of two main steps: 1) Image fusion between the original image and a key image. 2) Encrypting the pixel values of the fused image using a Henon chaotic map. The technique aims to provide high security with less computational time compared to traditional encryption methods. Experimental results show the algorithm is sensitive to keys and resistant to brute force attacks. The technique can be used for applications like secure internet image transmission.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
Owing to advances in communication technology, a bulk of visual digital data is being stored and transmitted over the internet now-a-days. Particularly millions and millions of images transfer through the network per day as per the statistics and a result, the security of image data is an important requirement. Image encryption algorithm is used to provide this security. In this paper, an image encryption algorithm based on confusion diffusion architecture that uses dynamic key space is proposed. An internal key generator is used to generate the initial seeds for the overall encryption scheme is proposed. With these initial seeds logistic map generates pseudo random numbers then these numbers are converted into permutation order for permutation. The diffusion bits are generated in parallel using the logistic map and manipulated with pixels confused. The image pixels are iteratively confused and diffused using permutation order and diffusion bits respectively to produce cipher image in minimum number of rounds. This paper proposes a new kind of initial seed generation that utilizes the combo of logistic and tent maps. Even all external seeds are same. The internal seeds will be totally different. This ensures the key sensitivity. The simulation results and analysis confirm that the satisfactory level of security is achieved in three rounds and overall encryption time is saved.
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
Abstract With the rapid development of network technology, information security has become a mounting problem. Steganography involves hiding information in a cover media, in such a way that the cover media is not supposed to have any confidential message for its unintentional addressee In this paper, an ideal steganographic scheme in networks is proposed using twisted payload. The confidential image values are twisted by using scrambling techiques.The Discrete Wavelet Transform (DWT) is applied on cover image and Integer Wavelet Transform (IWT) is applied to the scrambled confidential image. Merge operation is done on both images and Inverse DWT is computed on the same to get the stego image. The information hiding algorithm is the reverse process of the extracting algorithm. After this an ideal steganographic scheme is applied which generates a stego image which is immune against conventional attack and performs good perceptibility compared to other steganographic approaches. Index Terms: Network security, Steganography, Discrete Wavelet Transform, Integer Wavelet Transform, Modified Arnold Transform, Merge Operation, Quality Measures
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
In today�s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. The basic concept of proposed approach is to secretly share private imag e into two meaningful and unexpanded shares (sheets) that are stored in two separate database servers such that decryption can be performed only when both shares are simultaneously available;at the same ti me,the individual share do not open identity of the private image. Previous research,such as Arun Ross et al. in 2011,was using pixel expansion for encryption,which causes the waste of storage space and transmission time. Furthermore,some researcher such as Hou and Quan�s research in 2011,producing m eaningless shares,which causes visually revealing existence of secret image. In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. So,using this technique we can secretly share biometric data over internet and only authorized user can decrypt the information.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image and text Encryption using RSA algorithm in java PiyushPatil73
This document provides an overview and implementation details of an image and text encryption/decryption project using RSA encryption. It includes chapters on introduction/background, hardware/software specifications, feasibility study, preliminary design including ER diagram and data flow diagram, screen layouts, testing approach including white and black box testing, and implementation details of the modules. The implementation utilizes Java and generates RSA public/private key pairs to encrypt and decrypt text and images.
Image secret sharing using Shamir's scheme with Steganography2510stk
This document discusses using Shamir's secret sharing algorithm and steganography to securely share secret images. The objectives are to provide more security for image communication while achieving transparency and preventing tampering. Shamir's algorithm is used to split images into shares, and steganography techniques like LSB encoding are used to hide the shares in cover images. This allows the shares to be transmitted securely without drawing attention. Potential applications include secure medical image sharing and military photography. The document reviews relevant literature and provides an example of a secret image being split and hidden in stego images. Future work could improve reconstruction quality and use additional cryptography techniques for enhanced security.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
The document proposes a hybrid approach for secure data transmission combining cryptography, steganography, and rotational visual cryptography. The approach involves encrypting data using DES encryption with a session key generated via Diffie-Hellman key exchange. The encrypted data is then hidden in the least significant bits of cover image pixels to create a stego image. The stego image is rotated by a specific angle during transmission. At the receiver, the image is de-rotated, the encrypted data extracted from the image, and decrypted using the session key to obtain the original data. The approach aims to provide improved security over traditional methods through multiple layers of encryption, data hiding, and image transformation.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
This seminar discusses visual cryptography, which allows images and text to be encrypted in a way that can be decrypted by the human visual system without computational tools. The document outlines several visual cryptography techniques including secret sharing schemes using 2 out of 2 pixel patterns for binary images and halftone patterns for gray-scale images. Color image encryption using 4 subpixels is also described. Advantages include ease of decryption and transmission of ciphertexts, while disadvantages include loss of image quality. Applications discussed include watermarking, steganography, and remote electronic voting.
Encryption converts plaintext into ciphertext using an algorithm and key. Gaussian elimination with partial pivoting and row exchange is used to encrypt images by converting the image matrix to an upper triangular matrix and generating a decryption key. The encrypted image matrix and key can then be multiplied to recover the original image matrix and decrypt the image. This algorithm allows for faster encryption time while still producing robust encryption to prevent unauthorized access to images.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
The astonishing developments have been occurring in the field of network communications for a long time and
these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web.
The web is not secure for the exchange of dependable data, for example, content, picture and video.
Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography,
for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt
decreased security for information protection. With a specific end goal to enhance the security, it is important to
expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption
methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based
encryption has its own significance in providing security for secret information i.e. data confidentiality than
conventional.
This document summarizes a research paper that proposes a new approach to visual cryptography using pextral coding in a cellular automaton framework. It begins by reviewing existing visual cryptography techniques that use pixel expansion to encrypt an image. The proposed method considers a 3x3 cellular automaton matrix and uses two symmetric pextral patterns to form signatures from an ASCII image pixel. These signatures are combined to reconstruct the original image without loss of information. The goal is to improve security over traditional visual cryptography while avoiding issues like noise and loss of quality during encryption and decryption.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
This document proposes a method called learnable image encryption that allows deep learning to be performed on encrypted images while protecting privacy. It works by applying weak block-wise encryption to images before training deep learning models. The models can still learn meaningful patterns from the encrypted images. This approach could help shopping malls analyze customer behavior from security camera footage or allow companies to develop AI systems using encrypted data without compromising privacy. The method achieves comparable accuracy to training on plain images while keeping the encrypted images unintelligible to humans. Code and details on the block-wise encryption and decryption algorithms are available online.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
This document discusses image encryption using a chaotic artificial neural network. It begins by introducing image encryption and its importance for securely transmitting valuable data over the internet. It then provides background on encryption techniques and discusses how image encryption works. The document outlines chaotic cryptography and why characteristics of chaos make it suitable for cryptography. It also discusses artificial neural networks and how they can be used for image encryption. In particular, it describes using a feedforward neural network with hidden layers to encrypt images.
In the present scenario the use of images increased extremely in the cyber world so that we can
easily transfer data with the help of these images in a secured way. Image steganography becomes
important in this manner. Steganography and cryptography are the two techniques that are often confused
with each other. The input and output of steganography looks alike, but for cryptography the output will be
in an encrypted form which always draws attraction to the attacker. This paper combines both
steganography and cryptography so that attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using
AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based
algorithm. Most of the steganographic algorithms available today is suitable for a specific image format
and these algorithms suffers from poor quality of the embedded image. The proposed work does not corrupt
the images quality in any form. The striking feature is that this algorithm is suitable for almost all image
formats e.g.: jpeg/jpg, Bitmap, TIFF and GIFF.
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
In today�s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. The basic concept of proposed approach is to secretly share private imag e into two meaningful and unexpanded shares (sheets) that are stored in two separate database servers such that decryption can be performed only when both shares are simultaneously available;at the same ti me,the individual share do not open identity of the private image. Previous research,such as Arun Ross et al. in 2011,was using pixel expansion for encryption,which causes the waste of storage space and transmission time. Furthermore,some researcher such as Hou and Quan�s research in 2011,producing m eaningless shares,which causes visually revealing existence of secret image. In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. So,using this technique we can secretly share biometric data over internet and only authorized user can decrypt the information.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image and text Encryption using RSA algorithm in java PiyushPatil73
This document provides an overview and implementation details of an image and text encryption/decryption project using RSA encryption. It includes chapters on introduction/background, hardware/software specifications, feasibility study, preliminary design including ER diagram and data flow diagram, screen layouts, testing approach including white and black box testing, and implementation details of the modules. The implementation utilizes Java and generates RSA public/private key pairs to encrypt and decrypt text and images.
Image secret sharing using Shamir's scheme with Steganography2510stk
This document discusses using Shamir's secret sharing algorithm and steganography to securely share secret images. The objectives are to provide more security for image communication while achieving transparency and preventing tampering. Shamir's algorithm is used to split images into shares, and steganography techniques like LSB encoding are used to hide the shares in cover images. This allows the shares to be transmitted securely without drawing attention. Potential applications include secure medical image sharing and military photography. The document reviews relevant literature and provides an example of a secret image being split and hidden in stego images. Future work could improve reconstruction quality and use additional cryptography techniques for enhanced security.
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
The document proposes a hybrid approach for secure data transmission combining cryptography, steganography, and rotational visual cryptography. The approach involves encrypting data using DES encryption with a session key generated via Diffie-Hellman key exchange. The encrypted data is then hidden in the least significant bits of cover image pixels to create a stego image. The stego image is rotated by a specific angle during transmission. At the receiver, the image is de-rotated, the encrypted data extracted from the image, and decrypted using the session key to obtain the original data. The approach aims to provide improved security over traditional methods through multiple layers of encryption, data hiding, and image transformation.
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
The need for keeping safe secrecy of secret and sensitive data has been ever increasing with the new
developments in digital system. In this paper, we present an increased way for getting embedding encrypted
secret facts in gray scale images to give high level safety of facts for news over unsecured narrow channels
Cryptography and Steganography are two closely related techniques are used in proposed system. Cryptography
gets into making one of religion the secret note into a non-recognizable chipper. Steganography is then sent in
name for using Double-Stegging to fix this encrypted data into a cover thing by which something is done and
keeps secret its existence.
This seminar discusses visual cryptography, which allows images and text to be encrypted in a way that can be decrypted by the human visual system without computational tools. The document outlines several visual cryptography techniques including secret sharing schemes using 2 out of 2 pixel patterns for binary images and halftone patterns for gray-scale images. Color image encryption using 4 subpixels is also described. Advantages include ease of decryption and transmission of ciphertexts, while disadvantages include loss of image quality. Applications discussed include watermarking, steganography, and remote electronic voting.
Encryption converts plaintext into ciphertext using an algorithm and key. Gaussian elimination with partial pivoting and row exchange is used to encrypt images by converting the image matrix to an upper triangular matrix and generating a decryption key. The encrypted image matrix and key can then be multiplied to recover the original image matrix and decrypt the image. This algorithm allows for faster encryption time while still producing robust encryption to prevent unauthorized access to images.
The document discusses various topics related to image encryption, including encryption algorithms, evolutionary algorithms, chaos theory, and swarm intelligence. It provides an analysis and comparison of existing image encryption algorithms such as techniques using digital signatures, SCAN-based compression and encryption, and mirror-like scrambling according to a chaotic binary sequence. It also describes encryption methods using double random phase encoding of color images and decomposing images into vectors before applying traditional cryptosystems.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
The astonishing developments have been occurring in the field of network communications for a long time and
these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web.
The web is not secure for the exchange of dependable data, for example, content, picture and video.
Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography,
for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt
decreased security for information protection. With a specific end goal to enhance the security, it is important to
expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption
methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based
encryption has its own significance in providing security for secret information i.e. data confidentiality than
conventional.
This document summarizes a research paper that proposes a new approach to visual cryptography using pextral coding in a cellular automaton framework. It begins by reviewing existing visual cryptography techniques that use pixel expansion to encrypt an image. The proposed method considers a 3x3 cellular automaton matrix and uses two symmetric pextral patterns to form signatures from an ASCII image pixel. These signatures are combined to reconstruct the original image without loss of information. The goal is to improve security over traditional visual cryptography while avoiding issues like noise and loss of quality during encryption and decryption.
The document provides an introduction to image encryption using AES key expansion. It discusses how traditional encryption techniques are not well-suited for encrypting large multimedia files like images due to their size and characteristics. The objective of the study is to develop an image encryption system that is computationally secure, fast enough for real-time use, and widely acceptable. It reviews related works in image encryption and discusses limitations of only using a 128-bit AES key. The document is organized into chapters covering cryptography fundamentals, image cryptosystems, AES algorithm details, an example of AES key expansion, and experimental analysis.
This document proposes a method called learnable image encryption that allows deep learning to be performed on encrypted images while protecting privacy. It works by applying weak block-wise encryption to images before training deep learning models. The models can still learn meaningful patterns from the encrypted images. This approach could help shopping malls analyze customer behavior from security camera footage or allow companies to develop AI systems using encrypted data without compromising privacy. The method achieves comparable accuracy to training on plain images while keeping the encrypted images unintelligible to humans. Code and details on the block-wise encryption and decryption algorithms are available online.
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted
images, since it maintains the excellent property that the original cover can be losslessly recovered
after embedded data is extracted while protecting the image content’s confidentiality. All previous
methods embed data by reversibly vacating room from the encrypted images, which may be subject
to some errors on data extraction and/or image restoration. In this survey paper, we discuss about
various methods and algorithms which were used for reversible data hiding (RDH) in encrypted
image to make data hiding process effortless. We also use visual cryptographic approach for
encryption which helps to protect the image during transmission. The scheme is suitable for
authentication based application where collective acceptance and decision making plays an important
role. The main goal is to retrieve the original image with lossless process and minimum computation
during image encryption /decryption by using keyless approach.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
An increasing demand of secure data transmission over internet leads to the challenge of implementing a
consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to
initial condition, due to which small change in input produces a major change in output. This paper
summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The
algorithms covered both private key encryption as well as public key encryption technique in the paper.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To
encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each
channel is encrypted using a technique called double random matrix key encoding then three new coding
image matrices are constructed. To obtain the reconstructed image that is the same as the original image
in the receipted side; simple extracted and decryption operations can be maintained. The results shown
that the proposed technique is powerful for color image encryption and decryption and a MATLAB and
simulations were used to get the results.
The proposed technique has high security features because each color component is separately treated
using its own double random matrix key which is generated randomly and make the process of hacking the
three keys very difficult.
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
This document proposes a design for image steganography using Haar discrete wavelet transform (DWT) and average alpha blending techniques. The Haar DWT is used to decompose images into four frequency bands (LL, LH, HL, HH) because it requires less hardware than other transforms like DCT or DFT. The LL bands of the cover and secret images are then blended using average alpha blending according to an alpha value, which represents the percentage of pixel values considered. This blending embeds the secret image into the cover image in the frequency domain. The design aims to balance imperceptibility, quality, and capacity while reducing hardware requirements compared to other transforms.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document proposes a method for hiding data in video sequences using RC6 encryption and lifting wavelet transformation.
2) Key steps include separating video frames, encrypting the data using RC6, applying lifting wavelet transforms to split frames into subbands, and hiding the encrypted data in the least significant bits of coefficients in the high frequency subbands.
3) The method aims to provide secure data transmission while maintaining high quality of the stego video and avoiding detection of the hidden data. It effectively hides presence of secret messages in video frames.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
2. Int J Elec& Comp Eng ISSN: 2088-8708
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform (Suhad A. Ahmed)
5005
This scheme is called a r out of n, (r, n) threshold cryptography scheme or simply a secret sharing
system. Secret sharing system provides a higher level of protection for the key from being lost or falls in the
wrong hands by providing secure backup copies to the secret key distributed over several servers or
locations. Moreover, secret sharing can be considered as a mechanism to transfer secret information using
public communication channels [2]. The secret sharing scheme is an advanced cryptography branch that
plays crucial role in defense passively, and it would be used to protect valuable or classified information and
documents against dangers like robbery and illegal accesses [2]. Multiple Secret Image Sharing or simply
(MSIS) is a secret image sharing scheme that protect more than one secret images at a time. Conventionally,
transmission of a single secret image is possible over a channel at a time. But as long as technology grows,
there is an enormous need to share more than one secret image at a time [3].
2. RELATED WORKS
In 1979, Shamir [4] introduced the concepts and theory of secret sharing. Shamir’s secret sharing
scheme was based on a n-degree polynomial, and shares were the points on that polynomial. In 2002, Thien
and Lin [5] proposed an extension of Shamir’s scheme where the secret image is shared by n shares, and any
r (r <n) shares can be used to reconstruct the secret. This scheme is started with a permutation technique to
shuffle the image’s pixels and de-correlate it, then shares were made by processing the image pixels or
patterns in the spatial domain, each participant receiveing his own share as a shadow image looks like a
random noise image holding partial information of the secret. Share size is just 1/r of the secret image. In
2007, Chin and Ching [6], introduced a way of share images based on the reversible integer-to-integer (ITI)
wavelet transform.
This method processes the transform coefficients in each subband, and each of the resulting
combination coefficients were divided into n shares. It was allowing the recovery of the complete secret
image using any r or more shares (r ≤ n). This method has larger shadow images without coding than those
belong to the methods that applying coding as a preprocessing for the inputting to the sharing phase. Also, in
this method, the data is encoded either by Huffman coding or by arithmetic coding before the data is sent to
the sharing phase. Also, in this method the Huffman coding or arithmetic coding have been used to encode
data before it is sent to the sharing phase. In 2007, Jun et al [7], proposed a scalable secure approach to share
and hide secret image. The secret image given first is divided into numerous nonoverlapping blocks, and each
block is then transformed into one-level discrete wavelet transform. Then, the wavelet coefficients have been
quantized into 256 gray levels. After that the gray value information of the quantized image was rearranged
by using a bit-plane scanning method. Finally, the image data is rearranged into n shadows by using multiple
thresholds. Finally, each shadow image of R, G, and B channels is hidden in the cover image.
The results of the test indicated that the increasing of the number of shadows can lead to recovery of
the secret image with better quality. In 2011, Yang et al [8], suggested a fast secret image sharing method
based on Haar wavelet transform and Shamir’s method. Firstly, they used discrete Haar wavelet transform to
reduce the secret image to its quarter size (i.e., 1-level LL subband). Then, the modified Shamir’s algorithm
has been applied to only this LL subband for generating the shadow images. In 2011, T. Hoang and et al [9],
proposed a (2, n) gray image secret sharing scheme. The proposed scheme is basis on three existing
approaches: block truncation coding (BTC), vector quantization (VQ) and discrete wavelet transform (DWT).
In this scheme, the set of generated shares have been much smaller than the original image. Any gray image
can be reconstructed by combining at least two shadows.
The quality of the reconstructed image ranged from 29.5 bears to 36.5 dB. In 2012, Sagar et al. [10]
proposed a new method to perform color visual cryptography based on wavelet transform. Wavelet transform
has been utilized to obtain a gray image from a color image where the intensity image (Y) formed from the
YCbCr color transform. Then, Error-Diffusion Filter has been applied on the obtained grey image. After that
the visual cryptography system (VCS) model was applied on the generated halftone image. In 2014, Ashwaq
and Loay [2] introduce a security secret color image sharing based on transform coding, using wavelet or
cosine transformation to produce secure secret shares by first compress the image using one of the transform
coding techniques mentioned earlier. The compressed stream is then subject to a data diffuser followed by a
random generator to shuffle the image into shares; a secret shares generator system is then applied on these
shares to produce the secret shares.
3. THE TINY ENCRYPTION ALGORITHM
The Tiny Encryption Algorithm (TEA) is a block cipher known as a simple of description and easy
to implement. This cipher was firstly introduced by (Wheeler and Needham 1994). TEA works on 64-bit
plaintext at a time and using 128-bit key. It is a Feistel network of 64 rounds, typically applied on pairs
3. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5004 - 5013
5006
termed rounds. The key schedule was extremely simple by mixing all of the key material in exactly the same
way for each round. Various multiples of a magic constant have been utilized to prevent simple attacks on
basis of the symmetry of the rounds. The magic constant, 2654435769 or 9E3779B916 has been chosen to be
232/ϕ, where ϕ was the golden ratio [12].
Figure 1 shows the structure of TEA algorithm. TEA is a Feistel cipher that uses different
(orthogonal) algebraic groups - XOR, ADD and SHIFT in this instance. This is a truly ingenious way of
saving Shannon's twin properties of diffusion and confusion which are important for a secure block cipher,
without needing the explicitly of P-boxes and S-boxes respectively. It seems highly resistant to differential
cryptanalysis, and achieves complete diffusion (where a one bit difference in the plaintext will cause about
32 bit differences in the cipher text) after only six cycles [13].
4. THE PROPOSED SYSTEM
An approach of multiple image secret sharing for secret gray images for set of participants has been
proposed. In this approach, each participant can share a gray secret image with the other of participants in a
way that of all them can reconstruct your secret gray image if only k out of n shares have been collected. The
proposed approach is basis on: (i) Applying Haar DWT to reduce each input image to its quarter size, (ii)
Using proposed pseudo random generator to distribute the combined compressed streams into r subblocks
randomly and (iii) Performing the developed multiple image secret sharing based on linear system to
generate unrelated shares. Algorithm (1) shows the steps of proposed system.
ALGORITHM 1: MULTIPLE SECRET IMAGE SHARING
Input: I1, I2, …,Im// m gray images of equal size.
r // Threshold value
n // Number of generated shares
Output: Shares // n shares
Step1: Applying haar DWT on input images secret imagesI1, I2, …,Im. The subbandsLL1, LL2, …,LLm of the
transform images have been used to generate shares.
Step2: Combined the LL1, LL2, …, LLm subbands in one total image T.
Step3: Separate the total image T into r sub blocks randomly using proposed pseudo random generator
system
Step 4: Generate n shares Sh1, Sh2, …, Shn using Linear System
4.1. Proposed Pseudo Random Generator
Digital cryptography relies greatly on randomness in providing the security requirements imposed
by various information systems. Just as different requirements call for specific cryptographic techniques,
randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic
primitives. Block ciphers are the most popular cryptographic primitives; due to the standardization of DES
followed by AES, but also due to the fact that block ciphers constitute some of the fundamental building
blocks for pseudorandom number generators, stream ciphers, hash functions and message authentication
codes.
A pseudo random generator has been proposed.thw length of random sequence that has been
generated by proposed system is 192 bits. This step is to decorrelate the output result from compression
stage; it has been distributed into rsubblocks. By using a proposed pseudo random generator based on a
secret key, it will be generated a random sequence of numbers each has a length equal to the length of
combined secret data for all images after compression and the values of generated sequence are ranged to be
1..r, then the secret information will be permuted randomly into nsubblocks according to generated sequence.
Algorithm (2) illustrates the detail steps of the proposed pseudo random generator.
Figure 1 depicts the general structure of the pseudo random generator where the keystream
generator (KSG) is a pseudo random number generator based on block cipher and the keys (i.e., K1, K’1) is
the seed of the pseudo random generator.
4. Int J Elec& Comp Eng ISSN: 2088-8708
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform (Suhad A. Ahmed)
5007
Figure 1. The proposed block cipher based pseudorandom generator
The KSG is a consecutive of two proposed block ciphers. Each of them is a cascaded design of TEA
block cipher, denoted by Cascaded TEA1 and Cascaded TEA2. The Cipher Block Chaining encryption mode
has been used in proposed block cipher where the input to the first Cascaded TEA is a public IV, and the
inputs to each of them is one of two master keys, denoted kiand k’i respectively, these keys is considered as a
seed for the pseudorandom generator. Figure 2 shows the block diagram of KSG.
Figure 2. The proposed keystream generator KSG
As notice the xi is the input to the first Cascaded TEA, and the mi is an intermediate. Then the output
of the KSG is yi. The detail of Cascaded TEA has been showed in Figures 3 and 4.
Figure 3. The proposed of Cascaded TEA Figure 4. The proposed of Feistel TEA
5. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5004 - 5013
5008
ALGORITHM 3: PROPOSED PSEUDO RANDOM GENERATOR
Input: T // Combined the LL1, LL2, …, LLmsubbands
n // Length of T
r// Threshold value
K, K' // Master keys each of which 64 bits
Output: SBk // Generated rsubblocks
Step1: The new input for the first Cascaded TEA is:
xi= IV
(3)
Step2: The mi is computed as intermediate value:
mi= Cascaded TEAki (xi) (4)
Step3: The KSG output yi is computed as:
yi = Cascaded TEAk’i(mi) (5)
Step4: The new input for the next Cascaded TEA is:
xi+1= IV ⊕yi. (6)
Step5: In the KSG design, the internal state at each step has been used to update running keys such as
following
ki+1 = ki⊕ mi (7)
and
k’
i+1 = k’
i⊕mi (8)
The k and k’ represented the master keys and the ki and k’i the running keys.
Step6: Repeat step2 to step5 until generate yiwhere i=1..n
Step7: For each yi components (i.e.,C1, C2, and C3) where i=1..n, Do the following:
Step7-1:Let K = C1, I=n-1
Step7-2: While 1>1
K←(𝐶2 × K + 𝐶3) modular I
Swap b[I], b[K]
End loop I
Step8: For I=1 ⇾ n
X←b[I]
IF(X <> 0)
X←X× n / r
ENDIF
no←count[X]+1
w←X+ no
SBk[w]=S[I]
end loop I
4.2. Multiple Secret Image Sharing Based on Linear System
The input I1, I2, …, Im images have been reduced (i.e., to its quarter size) and shuffled randomly into
rsubblocks. In the multiple secret images sharing, the input content is composed by a set of equal sized
blocks (i.e., SBk1, SBk2,…, SBkr). Each of the blocks can be any type of content. For a block of data {Qj| j=1..r}
(i.e., each Qjis a byte from jth
block), the ith
share is calculated by using the linear equations adapted from [2]
and shown in (9):
Shi = cijQj + cijQj+ ..... +cijQj mod 255, i=1,…,n, j=1,..,r (9)
6. Int J Elec& Comp Eng ISSN: 2088-8708
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform (Suhad A. Ahmed)
5009
Where, Shi is the ith
share which is generated for the subblockQ(), cij is the jth
coefficient belong to the linear
equation denoted the ith
share.
5. EXPERIMENTAL RESULTS AND DISCUSSION
Different tests were implemented to evaluate the proposed system algorithm performance. Six grays
of size 512×512 images (“Lena”, “Jet-plane”, “Splash”, “Peppers” and “Sailboat” and “House”) have been
used. The test images have different visual properties, like a natural scene, having lot of edges and having
high correlated sections. These six test images are shown in Figure 5.
Figure 5. Test images
Table 1 lists the PSNR after applying haar DWT; the only distortion of the proposed multiple secret
image sharing was due to the use of this step, no further loss was caused by the rest operations or functions of
the proposed system.
Table 1. The CR, Number of bytes and PSNR of each image when applying proposed compression scheme
Image PSNR
Lena 34.52
Jet_plane 30.01
Splash 33.35
Peppers 33.28
Sailboat 30.90
House 41.21
The results that have been listed in Table 1 showed that the size of each has been reduced, 1/4 of the
size of the original secret image and the qualities of all images were at acceptable level (i.e., greater than30
dB). So that the total size for all input images have been reduced to 1/4r after applying a (r, n) threshold
multiple secret image sharing.
The proposed Pseudo-random number generator depends on two master keys and an initial vector to
generate and many random numbers as needed. Many statistical tests have been applied to test the
randomness of a sequence, in general many sequences that considered random may be easy to predict. So it's
important to test the generators to prove its efficiency. Table 2 shows first three samples generated using the
specified initial vector and keys. Table 3 shows the differences between each two consecutive generated
sequences. Table 4 shows the results of randomness test of 18 random sequences that are generated in
table 2.
8. Int J Elec& Comp Eng ISSN: 2088-8708
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform (Suhad A. Ahmed)
5011
Table 2. Three consecutive random sequences that is generated using different initial and master keys
Sample
no
Initial
vector
Master
Key 1
Master
Key 2
First random
sequence
Second random
sequence
Third random
sequence
6 0 0
11111111111
11111111111
11111111111
11111111111
11111111111
11111111111
11111111111
11111111111
11111111111
11111111111
11111111111
111111
0001111001111000
1100100010001101
0010011010011001
1010111011010000
1001111000110111
0111100110111001
1101101111100100
1101001100110001
1001011011000100
0000000101001100
0101100111001011
1011100101010010
0010010111100101
0000110110110110
1111000101010001
1001011010011000
0011010111010010
0100001001010010
0000111111100001
0111101011010111
0110111100111011
0111111001011100
0100010011101110
0010101010100110
1001010101110101
0111100101111001
0100000110101111
0010110100110100
0001111101000011
1011011010110010
1011111011011111
0101010111100111
1101101010110110
1110101000000100
1101000110100010
0000100100101001
Table 3. Difference between consecutive generated sequences
Sample no
Differences between
1st and 2nd
Differences
between 2nd and
3rd
1 101 (52.6%) 99 (51.56%)
2 99 (51.56%) 92 (47.92%)
3 102 (53.13%) 97 (50.52%)
4 98(51.04% 103 (53.64%)
5 98 (51.04% ) 102 (53.13%)
6 105 (54.69%) 94 (48.96%))
Table 4. Results of NIST Statistical of generated random sequences
Frequency
(Monobit)
Frequency
Test within
a Block
M=16
Runs
Test
Longest
Run Of
Ones
Cumulative
Sums
Serial
M=3
Approximate
Entropy
M=2
Linear
Complexity
M=8
0.0123 0.2117 0.8537 0.3339 0.3981 0.9248 0.1860 0.8654
0.0233 0.0116 0.4577 0.1299 0.0267 0.7316 0.1423 0.0811
0.0417 0.5083 0.9023 0.4124 0.0432 0.9845 0.4119 0.5523
0.0405 0.0664 1.0000 0.4124 0.1175 0.9845 0.4119 0.8231
0.1472 0.6512 0.4232 0.7208 0.2543 0.8825 0.5218 0.0996
0.1157 0.0299 0.3422 0.7208 0.1783 0.6766 0.6006 0.3241
0.1371 0.6512 0.1907 0.7208 0.0781 0.8825 0.4646 0.0445
0.2527 0.0276 0.5752 0.7208 0.1046 0.6356 0.5760 0.2883
0.2146 0.6309 0.4230 0.7208 0.1772 0.2650 0.3002 0.8877
0.2777 0.0424 0.3286 0.7208 0.3251 0.4437 0.5427 0.7619
0.4563 0.4066 0.3269 0.7891 0.1362 0.1607 0.2709 0.3242
0.9542 0.0642 0.8124 0.6928 0.3524 0.4369 0.6103 0.0222
0.4871 0.5661 0.2540 0.7632 0.3697 0.1054 0.1664 0.4987
0.3222 0.0642 0.2348 0.7208 0.2765 0.1038 0.2532 0.3245
0.7234 0.5879 0.7236 0.7891 0.3555 0.1038 0.2990 0.7856
0.8234 0.0843 0.7655 0.8770 0.3241 0.2096 0.5089 0.4759
0.9271 0.6506 0.2767 0.8770 0.9977 0.3622 0.5500 0.8921
0.2333 0.6564 0.4766 0.6487 0.3777 0.4437 0.5919 0.5437
0.3532 0.4814 0.2435 0.9145 0.2341 0.2096 0.3294 0.7321
0.2821 0.6642 0.4210 0.6487 0.2342 0.4369 0.4737 0.5911
The result listed in Table 3 shows that most differences are greater than 50% of the length of
generated random sequences while Table 4 shows that all the P-values are greater than α (α = 0.01 )value. So
the proposed pseudo random generator output have passed NIST statistical test suite. Figures 6 and 7 show an
example of coding and decoding of proposed multiple image secret sharing phases.
Table 5 illustrates the time required to recover the secret images of size 512×512 when applying
(2,5) threshold multiple secret image using linear system and the sharing coefficient values for share1 are:
a11=131, a12=132 and for share2 the coefficient values are: a21=133, a22=135.
9. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5004 - 5013
5012
Table 5. The time required to encode and recover multiple secret images using (2,5) threshold multiple secret
image using linear system
No. of
Secret
images
(m)
Size in
bytes
Time in Sec.
Haar
(DWT)
Encoding of
Linear
system
Revealing of
linear
system
Inverse of
Haar
(DWT)
Pseudo
Random
Generator
TOTAL
Encoding
Phase
TOTAL
Revealing
Phase
2 131072 0.04 0.014 6.72 0.020 0.026 0.08 6.766
3 196608 0.06 0.022 10.08 0.032 0.019 0.101 10.131
4 262144 0.08 0.029 13.45 0.040 0.026 0.135 13.516
5 327680 0.10 0.039 16.81 0.053 0.033 0.172 16.896
Figure 6. Example for encoding phase of proposed multiple secret image sharing
Figure 7. Example for revealing phase of proposed multiple secret image sharing
10. Int J Elec& Comp Eng ISSN: 2088-8708
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform (Suhad A. Ahmed)
5013
6. CONCLUSION
In this paper, a (r, n)-threshold multiple image secret sharing based on linear system with the haar
wavelet transform has been proposed. The benefit of a small computation time of reduced data has been
exploited after applying haar wavelet. All secret images have been preserved of their quality (i.e., greater
than 30 Db) after the reduced their sizes to quarter size. The proposed system employed pseudo random
number generator to permute the transformed images data in pre-generated shares randomaly. The proposed
pseudo random generator based on block cipher technique which is depended on a re-keying approach to
overcome key schedule weakness in TEA algorithm and used the rounds of the TEA which is a highly
random block cipher algorithm. The developed multiple secret image sharing has been applied to generate
uncorrelated shares to store in different servers. If any r out of n shares have been collected, can be recovered
the m secret images.
REFERENCES
[1] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC
Press, Oct 16, 1996.
[2] Ashwaq T. Hashim and Loay E. George; "Secret Image Sharing Based on Wavelet Transform", International
Conference on Information Technology in Signal and Image Processing (ITSIP-2013), Oct 18-19, 2013, Mumbai.
[3] Mohit Rajputa and Maroti Deshmukhb, "A Technique to Share Multiple Secret Images", International Journal of
Information Processing, Vol. 10, No. 3, Pp. 35-44, 2016.
[4] A. Shamir, "How to Share a Secret", Communications of the ACM, Vol. 22, No. 11, PP. 612-613, 1979.
[5] C. Thien, J. Lin, "Secret Image Sharing", Computers & Graphics, Vol. 26, PP. 765-770, 2002.
[6] C. Yang, Y. Huang and J. Syue, "Reversible Secret Image Sharing Based on Shamir’s Scheme with Discrete Haar
Wavelet Transform", Electrical and Control Engineering (ICECE), International Conference, Yichang, PP. 1250 -
1253, 2011.
[7] C. Huang and C. Li, "A Secret Image Sharing Method Using Integer Wavelet Transform", Eurasip Journal on
Advances in Signal Processing, Vol. 2007, No. 2, PP. 1-13, 2007.
[8] J. Kong, Y. Zhang, X. Meng, Y. Zheng, Y. Lu, "A Scalable Secret Image Sharing Method Based on Discrete
Wavelet Transform", Lecture Notes in Computer Science, Springer, Berlin, Vol. 4688, PP. 736-745, 2007.
[9] C. Huang and C. Li, "Secret Image Sharing Using Multiwavelet Transform", Journal of Information Science and
Engineering, Vol. 27, PP. 733-748, 2011.
[10] S. Nerella, K. Gadi, R. Chaganti, "Securing Images Using Colour Visual Cryptography and Wavelets",
International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 3, PP.
164-168, 2012.
[11] Hernández, Julio César; Isasi, Pedro; Ribagorda, Arturo. "An application of genetic algorithms to the cryptoanalysis
of one round TEA". Proceedings of the 2002 Symposium on Artificial Intelligence and its Application, 2002.
[12] Hernández, Julio César; Sierra, José María; Ribagorda, Arturo; Ramos, Benjamín; Mex-Perera, J.C. (2001).
"Distinguishing TEA from a random permutation: Reduced round versions of TEA do not have the SAC or do not
generate random numbers", Proceedings of the IMA Int. Conf. On Cryptography and Coding 2001: 374–377.