Information security is one of the main aspects of processes and methodologies in the technical age of information and communication. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies that are used, and they include steganography and cryptography. An effective digital image-steganographic method based on odd/even pixel allocation and random function to increase the security and imperceptibility has been improved. This lately developed outline has been verified for increasing the security and imperceptibility to determine the existent problems. Huffman coding has been used to modify secret data prior embedding stage; this modified equivalent secret data that prevent the secret data from attackers to increase the secret data capacities. The main objective of our scheme is to boost the peak-signal-to-noise-ratio (PSNR) of the stego cover and stop against any attack. The size of the secret data also increases. The results confirm good PSNR values in addition of these findings confirmed the proposed method eligibility.
Technical analysis of content placement algorithms for content delivery netwo...IJECEIAES
Content placement algorithm is an integral part of the cloud-based content de-livery network. They are responsible for selecting a precise content to be re-posited over the surrogate servers distributed over a geographical region. Although various works are being already carried out in this sector, there are loopholes connected to most of the work, which doesn't have much disclosure. It is already known that quality of service, quality of experience, and the cost is always an essential objective targeting to be improved in existing work. Still, there are various other aspects and underlying reasons which are equally important from the design aspect. Therefore, this paper contributes towards reviewing the existing approaches of content placement algorithm over cloud-based content delivery network targeting to explore open-end re-search issues.
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...IJECEIAES
Vehicle and vehicle license detection obtained incredible achievements during recent years that are also popularly used in real traffic scenarios, such as intelligent traffic monitoring systems, auto parking systems, and vehicle services. Computer vision attracted much attention in vehicle and vehicle license detection, benefit from image processing and machine learning technologies. However, the existing methods still have some issues with vehicle and vehicle license plate recognition, especially in a complex environment. In this paper, we propose a multivehicle detection and license plate recognition system based on a hierarchical region convolutional neural network (RCNN). Firstly, a higher level of RCNN is employed to extract vehicles from the original images or video frames. Secondly, the regions of the detected vehicles are input to a lower level (smaller) RCNN to detect the license plate. Thirdly, the detected license plate is split into single numbers. Finally, the individual numbers are recognized by an even smaller RCNN. The experiments on the real traffic database validated the proposed method. Compared with the commonly used all-in-one deep learning structure, the proposed hierarchical method deals with the license plate recognition task in multiple levels for sub-tasks, which enables the modification of network size and structure according to the complexity of sub-tasks. Therefore, the computation load is reduced.
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
Technical analysis of content placement algorithms for content delivery netwo...IJECEIAES
Content placement algorithm is an integral part of the cloud-based content de-livery network. They are responsible for selecting a precise content to be re-posited over the surrogate servers distributed over a geographical region. Although various works are being already carried out in this sector, there are loopholes connected to most of the work, which doesn't have much disclosure. It is already known that quality of service, quality of experience, and the cost is always an essential objective targeting to be improved in existing work. Still, there are various other aspects and underlying reasons which are equally important from the design aspect. Therefore, this paper contributes towards reviewing the existing approaches of content placement algorithm over cloud-based content delivery network targeting to explore open-end re-search issues.
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...IJECEIAES
Vehicle and vehicle license detection obtained incredible achievements during recent years that are also popularly used in real traffic scenarios, such as intelligent traffic monitoring systems, auto parking systems, and vehicle services. Computer vision attracted much attention in vehicle and vehicle license detection, benefit from image processing and machine learning technologies. However, the existing methods still have some issues with vehicle and vehicle license plate recognition, especially in a complex environment. In this paper, we propose a multivehicle detection and license plate recognition system based on a hierarchical region convolutional neural network (RCNN). Firstly, a higher level of RCNN is employed to extract vehicles from the original images or video frames. Secondly, the regions of the detected vehicles are input to a lower level (smaller) RCNN to detect the license plate. Thirdly, the detected license plate is split into single numbers. Finally, the individual numbers are recognized by an even smaller RCNN. The experiments on the real traffic database validated the proposed method. Compared with the commonly used all-in-one deep learning structure, the proposed hierarchical method deals with the license plate recognition task in multiple levels for sub-tasks, which enables the modification of network size and structure according to the complexity of sub-tasks. Therefore, the computation load is reduced.
Comparative study between metaheuristic algorithms for internet of things wir...IJECEIAES
Wireless networks are currently used in a wide range of healthcare, military, or environmental applications. Wireless networks contain many nodes and sensors that have many limitations, including limited power, limited processing, and narrow range. Therefore, determining the coordinates of the location of a node of the unknown location at a low cost and a limited treatment is one of the most important challenges facing this field. There are many meta-heuristic algorithms that help in identifying unknown nodes for some known nodes. In this manuscript, hybrid metaheuristic optimization algorithms such as grey wolf optimization and salp swarm algorithm are used to solve localization problem of internet of things (IoT) sensors. Several experiments are conducted on every meta-heuristic optimization algorithm to compare them with the proposed method. The proposed algorithm achieved high accuracy with low error rate (0.001) and low power consumption.
Asymmetric image encryption scheme based on Massey Omura scheme IJECEIAES
Asymmetric image encryption schemes have shown high resistance against modern cryptanalysis. Massey Omura scheme is one of the popular asymmetric key cryptosystems based on the hard mathematical problem which is discrete logarithm problem. This system is more secure and efficient since there is no exchange of keys during the protocols of encryption and decryption. Thus, this work tried to use this fact to propose a secure asymmetric image encryption scheme. In this scheme the sender and receiver agree on public parameters, then the scheme begin deal with image using Massey Omura scheme to encrypt it by the sender and then decrypted it by the receiver. The proposed scheme tested using peak signal to noise ratio, and unified average changing intensity to prove that it is fast and has high security.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
In recent years, wireless sensor networks (WSNs) have been considered one of the important topics for researchers due to their wide applications in our life. Several researches have been conducted to improve WSNs performance and solve their issues. One of these issues is the energy limitation in WSNs since the source of energy in most WSNs is the battery. Accordingly, various protocols and techniques have been proposed with the intention of reducing power consumption of WSNs and lengthen their lifetime. Cluster-oriented routing protocols are one of the most effective categories of these protocols. In this article, we consider a major issue affecting the performance of this category of protocols, which we call the intra/inter-cluster event-reporting problem (IICERP). We demonstrate that IICERP severely reduces the performance of a cluster-oriented routing protocol, so we suggest an effective Solution for IICERP (SIICERP). To assess SIICERP’s performance, comprehensive simulations were performed to demonstrate the performance of several cluster-oriented protocols without and with SIICERP. Simulation results revealed that SIICERP substantially increases the performance of cluster-oriented routing protocols.
Abstract: Energy consumption is one of the constraints in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. In existing system a hybrid optimization based PEGASIS-DSR optimized routing protocol (PDORP) is presented which used cache and directional transmission concept of both proactive and reactive routing protocols. The performance of PDORP has been evaluated and the results indicated that it performs better in most significant parameters. The performance of the existing method is checked when it is evaluated and validated with the nodes which are highly dynamic in nature based on the application requirement. The current system finds the trusted nodes in the case of only static environment. To overcome the issue the proposed system is applied for dynamic WSN’s with the location frequently being changed. The PDORP-LC is applied with local caching (LC) to acquire the location information so that the path learning can be dynamic without depending on the fixed location. The proposed work is performing in dynamic environment with the dynamic derivation of trusted nodes.
Keywords: local caching (LC), Wireless Sensor Networks (WSNs), PEGASIS-DSR optimized routing protocol (PDORP).
Title: Energy Efficient Optimal Paths Using PDORP-LC
Author: ADARSH KUMAR B, BIBIN CHRISTOPHER, ISSAC SAJAN, AJ DEEPA
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
Facial image retrieval on semantic features using adaptive mean genetic algor...TELKOMNIKA JOURNAL
The emergence of larger databases has made image retrieval techniques an essential component and has led to the development of more efficient image retrieval systems. Retrieval can either be content or text-based. In this paper, the focus is on the content-based image retrieval from the FGNET database. Input query images are subjected to several processing techniques in the database before computing the squared Euclidean distance (SED) between them. The images with the shortest Euclidean distance are considered as a match and are retrieved. The processing techniques involve the application of the median modified Weiner filter (MMWF), extraction of the low-level features using histogram-oriented gradients (HOG), discrete wavelet transform (DWT), GIST, and Local tetra pattern (LTrP). Finally, the features are selected using Adaptive Mean Genetic Algorithm (AMGA). In this study, the average PSNR value obtained after applying the Wiener filter was 45.29. The performance of the AMGA was evaluated based on its precision, F-measure, and recall, and the obtained average values were respectively 0.75, 0.692, and 0.66. The performance matrix of the AMGA was compared to those of particle swarm optimization algorithm (PSO) and genetic algorithm (GA) and found to perform better; thus, proving its efficiency.
Energy efficiency is one of the most critical issue in design of System on Chip. In Network On
Chip (NoC) based system, energy consumption is influenced dramatically by mapping of
Intellectual Property (IP) which affect the performance of the system. In this paper we test the
antecedently extant proposed algorithms and introduced a new energy proficient algorithm
stand for 3D NoC architecture. In addition a hybrid method has also been implemented using
bioinspired optimization (particle swarm optimization) technique. The proposed algorithm has
been implemented and evaluated on randomly generated benchmark and real life application
such as MMS, Telecom and VOPD. The algorithm has also been tested with the E3S benchmark
and has been compared with the existing algorithm (spiral and crinkle) and has shown better
reduction in the communication energy consumption and shows improvement in the
performance of the system. Comparing our work with spiral and crinkle, experimental result
shows that the average reduction in communication energy consumption is 19% with spiral and
17% with crinkle mapping algorithms, while reduction in communication cost is 24% and 21%
whereas reduction in latency is of 24% and 22% with spiral and crinkle. Optimizing our work
and the existing methods using bio-inspired technique and having the comparison among them
an average energy reduction is found to be of 18% and 24%.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Applying convolutional neural networks for limited-memory applicationTELKOMNIKA JOURNAL
Currently, convolutional neural networks (CNN) are considered as the most effective tool in image diagnosis and processing techniques. In this paper, we studied and applied the modified SSDLite_MobileNetV2 and proposed a solution to always maintain the boundary of the total memory capacity in the following robust bound and applied on the bridge navigational watch & alarm system (BNWAS). The hardware was designed based on raspberry Pi-3, an embedded single board computer with CPU smartphone level, limited RAM without CUDA GPU. Experimental results showed that the deep learning model on an embedded single board computer brings us high effectiveness in application.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Channel encoding system for transmitting image over wireless network IJECEIAES
Various encoding schemes have been introduced till date focusing on an effective image transmission scheme in presence of error-prone artifacts in wireless communication channel. Review of existing schemes of channel encoding systems infer that they are mostly inclined on compression scheme and less over problems of superior retention of signal retention as they lacks an essential consideration of network states. Therefore, the proposed manuscript introduces a cost effective lossless encoding scheme which ensures resilient transmission of different forms of images. Adopting an analytical research methodology, the modeling has been carried out to ensure that a novel series of encoding operation be performed over an image followed by an effective indexing mechanism. The study outcome confirms that proposed system outshines existing encoding schemes in every respect.
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
Methods like edge directed interpolation and projection onto convex sets (POCS) that are widely used for image error concealment to produce better image quality are complex in nature and also time consuming. Moreover, those methods are not suitable for real time error concealment where the decoder may not have sufficient computation power or done in online. In this paper, we propose a data-hiding scheme for error concealment of digital image. Edge direction information of a block is extracted in the encoder and is embedded imperceptibly into the host media using quantization index modulation (QIM), thus reduces work load of the decoder. The system performance in term of fidelity and computational load is improved using M-ary data modulation based on near-orthogonal QIM. The decoder extracts the embedded
features (edge information) and those features are then used for recovery of lost data. Experimental results duly support the effectiveness of the proposed scheme.
Cognitive radio networks enable a more efficient use of the radioelectric spectrum through dynamic access. Decentralized cognitive radio networks have gained popularity due to their advantages over centralized networks. The purpose of this article is to propose the collaboration between secondary users for cognitive Wi-Fi networks, in the form of two multi-criteria decision-making algorithms known as TOPSIS and VIKOR and assess their performance in terms of the number of failed handoffs. The comparative analysis is established under four different scenarios, according to the service class and the traffic level, within the Wi-Fi frequency band. The results show the performance evaluation obtained through simulations and experimental measurements, where the VIKOR algorithm has a better performance in terms of failed handoffs under different scenarios and collaboration levels.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Abstract: Energy consumption is one of the constraints in Wireless Sensor Networks (WSNs). The routing protocols are the hot areas to address quality-of-service (QoS) related issues viz. Energy consumption, network lifetime, network scalability and packet overhead. In existing system a hybrid optimization based PEGASIS-DSR optimized routing protocol (PDORP) is presented which used cache and directional transmission concept of both proactive and reactive routing protocols. The performance of PDORP has been evaluated and the results indicated that it performs better in most significant parameters. The performance of the existing method is checked when it is evaluated and validated with the nodes which are highly dynamic in nature based on the application requirement. The current system finds the trusted nodes in the case of only static environment. To overcome the issue the proposed system is applied for dynamic WSN’s with the location frequently being changed. The PDORP-LC is applied with local caching (LC) to acquire the location information so that the path learning can be dynamic without depending on the fixed location. The proposed work is performing in dynamic environment with the dynamic derivation of trusted nodes.
Keywords: local caching (LC), Wireless Sensor Networks (WSNs), PEGASIS-DSR optimized routing protocol (PDORP).
Title: Energy Efficient Optimal Paths Using PDORP-LC
Author: ADARSH KUMAR B, BIBIN CHRISTOPHER, ISSAC SAJAN, AJ DEEPA
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
Microstrip antenna is broadly used in the modern communication system due to its significant features such as light weight, inexpensive, low profile, and ease of integration with radio frequency devices. The fractal shape is applied in antenna geometry to obtain the ultra-wideband antennas. In this paper, the sierpinski carpet fractal monopole antenna (SCFMA) is developed for base case, first iteration and second iteration to obtain the wideband based on its space filling and self-similar characteristics. The dimension of the monopole patch size is optimized to minimize the overall dimension of the fractal antenna. Moreover, the optimized planar structure is proposed using the microstrip line feed. The monopole antenna is mounted on the FR4 substrate with the thickness of 1.6 mm with loss tangent of 0.02 and relative permittivity of 4.4. The performance of this SCFMA is analyzed in terms of area, bandwidth, return loss, voltage standing wave ratio, radiation pattern and gain. The proposed fractal antenna achieves three different bandwidth ranges such as 2.6-4.0 GHz, 2.5-4.3 GHz and 2.4-4.4 GHz for base case, first and second iteration respectively. The proposed SCFMA is compared with existing fractal antennas to prove the efficiency of the SCFMA design. The area of the SCFMA is 25×20 푚푚 2 , which is less when compared to the existing fractal antennas.
Facial image retrieval on semantic features using adaptive mean genetic algor...TELKOMNIKA JOURNAL
The emergence of larger databases has made image retrieval techniques an essential component and has led to the development of more efficient image retrieval systems. Retrieval can either be content or text-based. In this paper, the focus is on the content-based image retrieval from the FGNET database. Input query images are subjected to several processing techniques in the database before computing the squared Euclidean distance (SED) between them. The images with the shortest Euclidean distance are considered as a match and are retrieved. The processing techniques involve the application of the median modified Weiner filter (MMWF), extraction of the low-level features using histogram-oriented gradients (HOG), discrete wavelet transform (DWT), GIST, and Local tetra pattern (LTrP). Finally, the features are selected using Adaptive Mean Genetic Algorithm (AMGA). In this study, the average PSNR value obtained after applying the Wiener filter was 45.29. The performance of the AMGA was evaluated based on its precision, F-measure, and recall, and the obtained average values were respectively 0.75, 0.692, and 0.66. The performance matrix of the AMGA was compared to those of particle swarm optimization algorithm (PSO) and genetic algorithm (GA) and found to perform better; thus, proving its efficiency.
Energy efficiency is one of the most critical issue in design of System on Chip. In Network On
Chip (NoC) based system, energy consumption is influenced dramatically by mapping of
Intellectual Property (IP) which affect the performance of the system. In this paper we test the
antecedently extant proposed algorithms and introduced a new energy proficient algorithm
stand for 3D NoC architecture. In addition a hybrid method has also been implemented using
bioinspired optimization (particle swarm optimization) technique. The proposed algorithm has
been implemented and evaluated on randomly generated benchmark and real life application
such as MMS, Telecom and VOPD. The algorithm has also been tested with the E3S benchmark
and has been compared with the existing algorithm (spiral and crinkle) and has shown better
reduction in the communication energy consumption and shows improvement in the
performance of the system. Comparing our work with spiral and crinkle, experimental result
shows that the average reduction in communication energy consumption is 19% with spiral and
17% with crinkle mapping algorithms, while reduction in communication cost is 24% and 21%
whereas reduction in latency is of 24% and 22% with spiral and crinkle. Optimizing our work
and the existing methods using bio-inspired technique and having the comparison among them
an average energy reduction is found to be of 18% and 24%.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Applying convolutional neural networks for limited-memory applicationTELKOMNIKA JOURNAL
Currently, convolutional neural networks (CNN) are considered as the most effective tool in image diagnosis and processing techniques. In this paper, we studied and applied the modified SSDLite_MobileNetV2 and proposed a solution to always maintain the boundary of the total memory capacity in the following robust bound and applied on the bridge navigational watch & alarm system (BNWAS). The hardware was designed based on raspberry Pi-3, an embedded single board computer with CPU smartphone level, limited RAM without CUDA GPU. Experimental results showed that the deep learning model on an embedded single board computer brings us high effectiveness in application.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Lifetime centric load balancing mechanism in wireless sensor network based Io...IJECEIAES
Wireless sensor network (WSN) is a vital form of the underlying technology of the internet of things (IoT); WSN comprises several energy-constrained sensor nodes to monitor various physical parameters. Moreover, due to the energy constraint, load balancing plays a vital role considering the wireless sensor network as battery power. Although several clustering algorithms have been proposed for providing energy efficiency, there are chances of uneven load balancing and this causes the reduction in network lifetime as there exists inequality within the network. These scenarios occur due to the short lifetime of the cluster head. These cluster head (CH) are prime responsible for all the activity as it is also responsible for intra-cluster and inter-cluster communications. In this research work, a mechanism named lifetime centric load balancing mechanism (LCLBM) is developed that focuses on CH-selection, network design, and optimal CH distribution. Furthermore, under LCLBM, assistant cluster head (ACH) for balancing the load is developed. LCLBM is evaluated by considering the important metrics, such as energy consumption, communication overhead, number of failed nodes, and one-way delay. Further, evaluation is carried out by comparing with ES-Leach method, through the comparative analysis it is observed that the proposed model outperforms the existing model.
Channel encoding system for transmitting image over wireless network IJECEIAES
Various encoding schemes have been introduced till date focusing on an effective image transmission scheme in presence of error-prone artifacts in wireless communication channel. Review of existing schemes of channel encoding systems infer that they are mostly inclined on compression scheme and less over problems of superior retention of signal retention as they lacks an essential consideration of network states. Therefore, the proposed manuscript introduces a cost effective lossless encoding scheme which ensures resilient transmission of different forms of images. Adopting an analytical research methodology, the modeling has been carried out to ensure that a novel series of encoding operation be performed over an image followed by an effective indexing mechanism. The study outcome confirms that proposed system outshines existing encoding schemes in every respect.
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
Methods like edge directed interpolation and projection onto convex sets (POCS) that are widely used for image error concealment to produce better image quality are complex in nature and also time consuming. Moreover, those methods are not suitable for real time error concealment where the decoder may not have sufficient computation power or done in online. In this paper, we propose a data-hiding scheme for error concealment of digital image. Edge direction information of a block is extracted in the encoder and is embedded imperceptibly into the host media using quantization index modulation (QIM), thus reduces work load of the decoder. The system performance in term of fidelity and computational load is improved using M-ary data modulation based on near-orthogonal QIM. The decoder extracts the embedded
features (edge information) and those features are then used for recovery of lost data. Experimental results duly support the effectiveness of the proposed scheme.
Cognitive radio networks enable a more efficient use of the radioelectric spectrum through dynamic access. Decentralized cognitive radio networks have gained popularity due to their advantages over centralized networks. The purpose of this article is to propose the collaboration between secondary users for cognitive Wi-Fi networks, in the form of two multi-criteria decision-making algorithms known as TOPSIS and VIKOR and assess their performance in terms of the number of failed handoffs. The comparative analysis is established under four different scenarios, according to the service class and the traffic level, within the Wi-Fi frequency band. The results show the performance evaluation obtained through simulations and experimental measurements, where the VIKOR algorithm has a better performance in terms of failed handoffs under different scenarios and collaboration levels.
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Steganography is the art and science of invisible communication, which hides the existence of the communicated message into media such as text, audio, image and video without any suspicion. Steganography is different from cryptography and watermarking in its objectives which includes undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. Image Steganography uses digital image as its cover media. This paper analyzes and discusses various techniques available today for image steganography along with their strengths and weaknesses.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
Steganography is a vital technique for transferring confidential information via an insecure network. In addition, digital images are used as a cover to communicate sensitive information. The Least Significant Bit (LSB) method is one of the simplest ways to insert secret data into a cover image. In this paper, the secret text is compressed twice by an Arithmetic coding algorithm, and the resulting secret bits are hidden in the cover pixels of the image corresponding to the pixels of each of the following three methods, one of three methods is used in each experiment: The first method, the edges of the image are modified to increase the number of edges, in the second method the lighter-colored regions are selected, and in the third method, the two methods are combined together to increase security and keep the secret message unrecognized. Hiding in each of the previous methods is done by using the LSB technique in the last 2-bit. The correction approach is used to increase the stego image's imperceptibility. The experimental results show that with an average message size of 29.8 kb, the average Peak Signal-to-Noise Ratio (PSNR) for the second proposed (Light regions) method equals 62.76 dB and for the third proposed (Edge and region) method equals 62.72 dB, which is a reasonable result when compared to other steganographic techniques.
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
Steganography is a vital technique for transferring confidential information via an insecure network. In
addition, digital images are used as a cover to communicate sensitive information. The Least Significant
Bit (LSB) method is one of the simplest ways to insert secret data into a cover image. In this paper, the
secret text is compressed twice by an Arithmetic coding algorithm, and the resulting secret bits are hidden
in the cover pixels of the image corresponding to the pixels of each of the following three methods, one of
three methods is used in each experiment: The first method, the edges of the image are modified to increase
the number of edges, in the second method the lighter-colored regions are selected, and in the third
method, the two methods are combined together to increase security and keep the secret message
unrecognized. Hiding in each of the previous methods is done by using the LSB technique in the last 2-bit.
The correction approach is used to increase the stego image's imperceptibility. The experimental results
show that with an average message size of 29.8 kb, the average Peak Signal-to-Noise Ratio (PSNR) for the
second proposed (Light regions) method equals 62.76 dB and for the third proposed (Edge and region)
method equals 62.72 dB, which is a reasonable result when compared to other steganographic techniques.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
Security and imperceptibility improving of image steganography using pixel allocation and random function techniques
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 1, February 2022, pp. 694~705
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i1.pp694-705 694
Journal homepage: http://ijece.iaescore.com
Security and imperceptibility improving of image
steganography using pixel allocation and random function
techniques
Noor Alhuda F. Abbas1
, Nida Abdulredha1
, Raed Khalid Ibrahim2
, Adnan Hussein Ali3
1
Department of Technique Computer Engineering, Al-Esraa University College, Baghdad, Iraq
2
Department of Medical Instruments Engineering Techniques, Al-Farahidi University, Baghdad, Iraq
3
Department of Information Communication and Technology, Institute of Technology Baghdad, Middle Technical University,
Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Sep 6, 2020
Revised Jul 15, 2021
Accepted Jul 28, 2021
Information security is one of the main aspects of processes and
methodologies in the technical age of information and communication. The
security of information should be a key priority in the secret exchange of
information between two parties. In order to ensure the security of
information, there are some strategies that are used, and they include
steganography and cryptography. An effective digital image-steganographic
method based on odd/even pixel allocation and random function to increase
the security and imperceptibility has been improved. This lately developed
outline has been verified for increasing the security and imperceptibility to
determine the existent problems. Huffman coding has been used to modify
secret data prior embedding stage; this modified equivalent secret data that
prevent the secret data from attackers to increase the secret data capacities.
The main objective of our scheme is to boost the peak-signal-to-noise-ratio
(PSNR) of the stego cover and stop against any attack. The size of the secret
data also increases. The results confirm good PSNR values in addition of these
findings confirmed the proposed method eligibility.
Keywords:
Digital image-steganographic
Huffman coding
Odd/even pixels' allocation
PSNR
Random map function
This is an open access article under the CC BY-SA license.
Corresponding Author:
Adnan Hussein Ali
Department of Information Communication and Technology, Institute of Technology Baghdad Middle
Technical University
Baghdad, Iraq
Email: dr.adnan@mtu.edu.iq
1. INTRODUCTION
The mention of steganography for the science that converts a message into a form that certifies a
complete inability to discover any information hidden in the carrier. A system of steganography warrants each
secret information can be kept undetectable [1]. The word of steganographic originates from a Greek term that
means as a protected writing. It is regarded as a unique area of data concealment, also considered as an art of
science for transmission that is not visible. The aim of making the communication invisible in order to secret
data hiding inside the cover image (CI), thereby enhancing its imperceptibility. The existence of the secret
information (SI) is often recognized by just the sender's and receiver's [2].
The steganography elements, basically included an information, cover object, a stego key for
improved security and embedding mechanism. The carrier object in which the SI is hidden in could be a video,
an audio, text or image. Steganography is being utilized in various applications effectively, but it often can be
very dangerous so it could be used by attackers for sending trojans and viruses in order to manipulate sensitive
2. Int J Elec & Comp Eng ISSN: 2088-8708
Security and imperceptibility improving of image steganography … (Noor Alhuda F. Abbas)
695
systems. More so, with the use of this information-hiding technology, criminals or terrorists may be enabled to
exchange secrete information [3]. The payload is described as the size of secret data which can be hidden within
the cover object successfully without creating visible artifacts in stego images. In order to measure payload,
bits per pixel (bpp) is used. If each pixel is used in hiding 1 bit of data, then the payload of a steganography
algorithm will be 1 bpp or 12.5%.
The word robustness refers to the steganography algorithm's durability against different forms of
statistical and basic attacks in steganography. If it is not possible to easily alter or retrieve the data that is
concealed in a cover image using image processing operations, the steganography algorithm used is considered
robust. Scaling, cropping, image rotation, and noise are some of the image processing activities that can be
used in the alteration or retrieval of concealed messages. The issue of robustness is crucial in when
watermarking techniques are used because of copyright protection [4]. The notion of imperceptibility is
synonymous with undectability, which can be calculated using various image quality measurement metrics,
such as peak-signal-to-noise-ratio (PSNR) [5], [6].
The correlation between hiding payload capacity (PC) and quality of stego media (SM) is purely
described via a balance which authors attempt to achieve. Most often, the quality of stego medium is reduced
by concealment of huge amounts of data within a cover medium. Consequently, hiding capacities have
continued to remain comparatively low because of this negative effect on the quality of stego [7]. With respect
to mechanism for embedding, the techniques of steganography are partitioned to two important classes, which
are spatial-domain (SD) and transform-domain (TD). Regardless of the advantages provided by current
methods, problems such as: i) the use of inadequate embedding algorithms may generate visually distorted
stego images (SI), which in turn increases the likelihood of human visual system detection, and
ii) imbalance between image quality, computational complexity, capacity for payload and security; thus,
making them inappropriate. This study, the use of our mechanism alongside with chaotic method is employed
in developing an efficient scheme in spatial domain, with the aim of addressing the aforementioned problems.
This paper makes the following key contributions: i) introduce an effective digital image steganography with
achieving a good quality of image, payload and security; ii) identify the random pixel used to embed hidden
information, while the random function is used to boost the system's resilience against trackers' attempts to
discover which pixel to embed; iii) the embedding of the secret information is done in a random region within
an image through the use of the spatial-domain (SD) of the cover-image (CI) using the odd/even pixel
allocation. This way, the quality of the stego-images is boosted while an extraction of the secret data is made
difficult
2. PRELIMINARIES
2.1. Least-significant-bit LSB substitution
The representation of least-significant-bit (LSB) considers easy and conventional process applied for
inserting secret data enclosed by covered image [8]. Though this process continues, it is thinkable to overwrite
the depiction of binary secret data. Concerning to the grayscale images that pixels have values just single
ranging (0 to 255) with an 8 bits depth, these secret information bits do not convert into binary bits due to their
directly using to substitute the cover image of the objects. With referring to color images which hold 3 routes
red, green, and blue (RGB) besides 24 bits depth, then a cover object (image) can be originally partitioning
into 3 channels just a secret data is embedded early in each channel. Then, these three paths will be merged in
order to create the SI. The LSB bits modification may not be allowed the human visual system (HVS) for
detecting the stego-image. Owing to the fact of LSB substitution method as discrete kind is employed in the
suggested system, the mathematical expression for this method can be prepared with acceptable details. A
mathematical expression aims for providing deeper perception on the focal thought of the scheme in the next
section. The assorted LSB embedding percentage (EP) contains 6.25%, 12.5%, 18.75% in addition to 25%,
that intends 0.5, 1.0, 1.5, and 2 bpp respectively may be utilized depend on the embedded. By using a simple
instance, an inclusive description of the fundamental concept of the LSB steganography basis can be providing.
If a 12.5% EP example is considered, that is mean 1 bpp in each LSB, and can be extended to another EP. With
such implementation, a stego image imperceptibility is decreased, thus making it simple for the HVS for
noticing the stego-image. At this time, image quality will be compromising for data capacity. When data with
larger amount is covered, an image quality degradation is arising. By using LSB methods, the capacity with
high data can be achieved. Figure 1 shows various stego images of Lena in different embedding percentages
[9]-[11].
Through the random addition of 1 to the gray levels on the CI, the pixels of the image are slightly
modified using the LSB-matching. This is done if there is no correspondence between the secret bit and the
LSB of a given pixel, with the values of the pixels maintained within the range of 0-255. There is no difference
between the process of extraction in LSB and LSB-M, this means to use a shared secret key to obtain a
traversing route, as well as to extract the LSB of each pixel for obtaining real embedded bits. A pair of pixels
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 694-705
696
(𝑃𝑖, 𝑃𝑖 + 1) is used by least significant bit matching revisited (LSB-MR) [12] as an embedding unit that is
manipulated to (𝑃′
𝑖, 𝑃′
𝑖 + 1) in a way to make criteria is satisfied.
{ 𝐿𝑆𝐵 (𝑃′
𝑖) = S𝑖 𝐿𝑆𝐵 (|
𝑃′
𝑖
2
| + 𝑃′
𝑖+1) = S𝑖+1 }
(1)
Where 𝑃𝑖 and 𝑃𝑖 + 1 denotes the embedding unit while the two secret bits are represented by 𝑆𝑖 and S𝑖+1.
With this correlation, the LSB and LSB-M such as irregular artifacts art does not formed in stego images. More
so, with the use of LSB-MR, the rate at which the pixels are modified in can be minimized in variance method
with LSB and LSB-M. The procedure of extraction involves the generation of a traversing path utilizing a
secret key (SK) as well as a quasi-random-number-generator, and afterwards the extraction of two bits from
each of the units of embedding is performed.
12.5% EP=1.5 bpp 25% EP=2 bpp
50% EP=4 bpp 62.5% EP=5 bpp
Figure 1. The imperceptibility of Lena stego-image (SI) using different EP [12]
In a study carried out by Bhardwaj and Sharmab [13], attempts were made to improve the security
and distribute the message within the entire host image. To achieve this, these researchers investigated the
simulation of images through the use of text, and they used LSB to hide information. According to them, the
aim of their study is to provide three level security in which the secret message is complemented, the
complemented secret message is hidden within a cover image pixel that are selected randomly through the use
of a pseudo random number of generator and inverted bit LSB method. Based on the results of their study, their
proposed approach outperforms the conventional LSB as well as the inverse LSB with lower mean square error
(MSE) and higher PSNR.
Hashim et al. [14] in their study, proposed a secure image steganography created by Huffman coding,
distribution of odd/even, and Henon map. The implementation of the proposed framework has been found to
be less complex in contrast to other current methods. Using the Henon map algorithm, the imperceptibility of
the stego-image is increased by using pixel distribution in order to get a better protection method. Prior to the
process of embedding, the secret message is embedded using Huffman coding. Two main reasons that this
method has always been seen efficient: the first is that during the embedding process it is able to check the
correspondence between secret bits with LSB in order to determine 1 and 0, and the second is the segmentation
of the secret message in order to track and map every bit within the stego image. The performance of their
suggested protocol is better than comparing to [15], [16] in terms of PSNR, based on the findings.
Singh and Datar [17] presented an image steganography created with wavelet transformation and RC4
algorithms. A proposed method with cover image is apportioned into 64 blocks of (8×8) with useful wavelet
transform. The secret message here encrypted earlier by embedding with RC4 algorithm is used for enhancing
the security levels. The Stego image now is difficult for detect by HVS attack. Patel and Cheeran [18] had
employed and investigated the steganography technique and advanced encryption standard (AES) algorithm in
order to produce an assessment and comparison into various images format and allows most appropriate
information with this procedure. LSB substitution algorithms were used for implementing this Steganography
4. Int J Elec & Comp Eng ISSN: 2088-8708
Security and imperceptibility improving of image steganography … (Noor Alhuda F. Abbas)
697
method. An investigation and evaluation were completed with different parameters like delay, PSNR, MSE, in
addition to absolute mean square error (AMSE).
A new reversible method of data hiding utilizing pixel-value-difference (PVD) with differential
expansion (DE) were presented by Jana et al. (2016). The secret message initially separated into sub-stream
with n bits size in projected method. PVD can be applied for embedding n-1 bits in addition to embed 1 bit by
applying difference-expansion (DE). Lastly, based on the sharing secret key bit stream, a pair of two-stego
pixels will be distributed among dual image. An extracting technique considers a same embed technique to that
of reverse sensing [19].
The securing color image steganography based on LSB was recommended by Al-Tamimi et al. [20].
They used asymmetric key in the image steganography for LSB scheme which contains 32 integers array.
Inserting of data hiding is random in related to hiding message and pixel selection generator, the applying of
transposition is done for each 24-bits block. A security has been improved with LSB substitution technique.
According to the literature review, the majority of current steganography technologies are incapable of
generating high-quality stego-images, leaving the subject vulnerable to identification by human vision systems.
Consequently, the hidden secret can be easily accessed by the attackers, and therefore, cannot be used as an
authentic information in top-secret security systems.
2.2. Random map function
One of the major reasons' steganography is developed is to afford an environment which is secured,
where data can be transmitted over the network by secret messages in stego-images type. The increasing
concern about the security of data is one of the main motivations of this research. Many studies were executed
in the steganography field with a purpose of developed novel approaches through which by steganography a
message can be secured [21]. With respect to enhance data particularity, various studies deal with random
technique due to their higher efficiency and simple using. Advantages of randomizing algorithms can be
summarized as: i) quick and comfort, or may be both in assorted problems, ii) easy employment, and iii) fast
and likely.
Many authors were found in the literature have leveraged random map function compensations, with
each bosses its limitations and strengths. Depending on behavior, various kinds of random maps are existing,
such as, nubasi [22], Arnold scrambles [23], in addition to knight tour [24]. Concerning normal random maps,
the selection numbers can be completed by one parameter at original conditions [25]. Two random maps can
be utilized for the pixels allocations with the aiming of preserving the proposed method. Also, an overlap
between these two ways that guarantee for data which is introduced can be entirely concealed and discovered
the pixels’ path is so hard or almost impossible [23], [24], so that, our method security is guaranteed.
2.3. Huffman coding
The main objective of the Huffman coding algorithm is to reduce the size of text before embedding to
the image. As shown in Figure 2 the Huffman algorithm depends on reducing the frequent letters and gives
them priority code or short path in the Huffman tree. The capacity is an important concept in steganography
method to make the method more robust, such as better method that can hold high amounts of data inside
hosting image while maintaining the quality of the image represented by PSNR. For the concept of data
management and transfer protocol compression of data transferred from sender to receiver is very useful beside
other techniques used in this research. Figure 3 shows a simple flowchart of Huffman coding applied in this
research. High frequency in this case will get less path of visiting to reduce going deep every time and let less
frequency in the deep of the tree, then will gain many clocks in digital word as 0,1.
Figure 2. Reduce text frequency in Huffman coding
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 694-705
698
Figure 3. Flowchart of Huffman coding
3. THE PROPOSED METHOD
This section provides a graphic description of the proposed method which is proposed in this study
alongside its key modules. The invention of the methodology is further clarified by this graphic representation
of the framework, as then readers can get a better image and a greater understanding of our process. The
suggested method-based steganography varies from other steganography approaches in that it can have high
protection while retaining image quality at a low cost and with a fair payload. The presented work is ideal for
secured transmission application of various secret bits, like electronic-patient-records (EPR) transmission to
the health care centers, and private communication that requests privacy. Figure 4 shows a graphic explanation
for the planned outline.
Figure 4. Overall flow of the proposed scheme
6. Int J Elec & Comp Eng ISSN: 2088-8708
Security and imperceptibility improving of image steganography … (Noor Alhuda F. Abbas)
699
This method is made up of four major sub-section which consist: i) image preparation, involving two
parts, first part responsible for partitioning of an image and the second part, responsible for pixel selection, ii)
preparation of secret data, involving the compression (Huffman coding) of secret data prior to the embedding
stage, iii) stage three includes the adaptive hiding of hidden data inside cover images using a data embedding
algorithm, which allows the stego-image to be generated, iv) finally, the secret-data is retrieved from the stego-
image that has been distributed at the receiving terminal using the extraction algorithm. The data could also be
used as appropriate. All of four major stages are summarizing description as follows.
3.1. Image preparation
Image preparation consists of two parts, first part responsible for partitioning of an image and the
second part, responsible for pixel selection. These two parts at image preparation stage are executed
simultaneously before introducing or can hiding text into an image. The cover image consists of
512×512 pixels come from standard dataset and the pixels arranged as a matrix of two dimensions (2D),
grouping these pixels into the blocks for easy management. Selecting one block or group of pixels for
embedding, then selecting pixels inside the block that normally occur in this stage. Steganography system
normally used one parameter random function or other algorithm like knight tour for a random process. Two
control parameters used in random process to achieve the objective of security. Two phases of image division
will perform; first, partitioning the cover image to 64 sub-small images called a block. Select the pixels inside
this block this selection is the most important process to keep the stego image same original as possible.
3.2. Huffman coding
The objective of the Huffman coding algorithm is to decrease the size of text before embedding to the
image. The Huffman algorithm depends on reducing the frequent letters and gives them priority code or short
path in the Huffman tree. High frequency in this case will get less path of visiting to reduce going deep every
time and let less frequency in deep of the tree, then will gain many clocks in digital word as 0,1. Simply can
summarize the procedures of compression text in Huffman coding used with proposed system as Algorithm 1.
Algorithm 1. Huffman coding
Input: array f [1…n] of numerical frequencies or probabilities
Output: binary coding tree with n leaves that has minimum expected code length for f.
Huffman (f[1….n])
T=empty binary tree
Q=priority queue of pairs (i, f[i], i=1….n, with f as comparison key
For each k=1…n-1
i=extract Min(Q)
j=extract Min(Q)
f [n+k]=f[i]+f[j]
insert Node (T, n+k) with children I, j
insert Rear (Q, (n+k), f [n+k]))
Return T
3.3. Embedding algorithm (EA)
The EA is the responsibility for hiding the secrete message within a CI. By supporting of the secret-
key, the embedding algorithm can be able for concealing the encrypted message adaptively inside the LSB
layer. In Algorithm 1, the key steps involved in the presented embedding operation are illustrated. Here,
marking every pixel into block map is the most crucial procedure. This procedure is referred to as embedding
block. The mechanism shown in Figures 5 provides a better view of the core concept of the suggested
embedding algorithm.
Algorithm 2. Embedding algorithm
Input: Cover image (𝐼𝐶
), Stego Key (𝐾𝑆
), Secret data (𝑆𝐷).
initialize 𝐼𝐶
=cover image, 𝑆𝐷=secret data , 𝐾𝑆
=stego key
Apply Huffman using Algorithm 1 coding on on 𝐷𝑆 to get the compression bit stream 𝑀𝐶𝐵𝑆
)
Segment the 𝑀𝐶𝐵𝑆
into groups, each with 16 or 32 bits
Select an appropriate cover image 𝐼𝐶
from dataset of cover images (𝐷𝑆𝐶𝐼
)
Generate random number 1 and arrange it according to HMF-a vector
Select one block of (8x8) blocks via HMF-a vector
Generate random number 2 and arrange it according to HMF-b vector
Select the destination pixel via HMF-b vector
Generate EM vector and arrange it related to Odd/Even
Mark each pixel with LSB and 𝑀𝐶𝐵𝑆
group
If Bit matched>Bit mismatched so that Embedded directly to pixel from secret by step 15
Otherwise, an Inverting secret message will be embedded with step 15
Iteration (Loop) I=1:N
Fetch 𝑀𝐶𝐵𝑆
bits (0 , 1)
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 694-705
700
a. If MCBS
=0 and Pixel is even, Do no change in 1-LSB layers.
b. If MCBS
=0 and pixel is odd, Do Changes in 2-LSB layer via replace 0 to LSB layer
Else if the 2-LSB layer is full, Do Changes in 1-LSB layers.
c. If MCBS
=1 and pixel is odd, Do no change in 1-LSB layers.
d. If MCBS
=1 and pixel is even, Do changes in 2-LSB layer via replace 1 to LSB layer
Else if the 2-LSB layer is full, Do Changes in 1-LSB layer
I=I+1
Iterate procedure 16 till all the secret-bits are hidden, and a stego-image (SI) is acquired
Output: Stego-Image (IS
)
Figure 5. Examples of embedding for the proposed scheme
The second objective which this study seeks to achieve through the proposed scheme, is to hide the
secret data within an LSB-layer. This implies that in the LSB, if pixels end with 1, they are odd value pixels,
and otherwise, they are even valued pixel. In this case, embedding will involve substituting secret bits based
on pixel (the second layer, a secret bit is replaced by odd pixel, while in the first-layer, the even pixel is used
to replace the secret bit).
3.4. Retrieving algorithm
The retrieving of the concealed secret information about the stego-image is carried out utilize the
retrieving algorithm. For the secret data to be retrieved successfully, different parameters are utilized. Some of
these parameters include Huffman coding, Henon map function (HMF), and stego-keys of data embedded
scheme. The security feature of a proposing framework is complemented by these parameters, thereby making
it difficult for attackers extract secret data. The key steps involved in the proposed mechanism of extraction
are presented in Algorithm 3.
Algorithm 3. Retrieving algorithm
Input: stego image (𝐼𝑆
), stego key (𝐾𝑆
)
Begin 𝐼𝑆
=Stego-Image, 𝐾𝑆
=Secret-Key
Apply random number 1 using HMF-a vector
Select one block of 64 blocks HMF-a vector
Apply random number 2 using HMF-b vector
Select the stego pixel from HMF-b vector
Apply EM vector and arrange it based on odd/even
Mark the LSB of all pixels
Loop start from I=1:N
Reverse the step 15 of embedding process from algorithm 1
Repeat step 9 until extract all secret bits from stego image
Decompression from the resulting bits of step 10 using algorithm1
Re-construct the inventive data from the realized bits
Output: secret message (𝑀)
8. Int J Elec & Comp Eng ISSN: 2088-8708
Security and imperceptibility improving of image steganography … (Noor Alhuda F. Abbas)
701
4. EXPERIMENTAL RESULTS AND DISCUSSION
For performing the experiments at this paper, a MATLAB tool together with eight standard grayscale
images which are shown in Figure 6 was utilized for images with (512x512) size were obtained. The different
stego-images of our scheme at EP=2 shown in Figure 6. Many parameters were used in the proposed scheme
using such as PSNR, bpp, embedding capacity (EC) been evaluated.
Lena Lighthouse Pepper Baboon
Zelda House Couple Boat
Figure 6. Cover images used in the proposed scheme
4.1. Benchmarking created on EC, PSNR, and bpp
The embedding capacity EC can be considered as the ratio of message bits number to cover pixels
number [26], [27], and be directly associated with the pixels number utilized in the suggested scheme here as
a various numbers of message bits that can embed by one pixel.
𝐸𝐶 =
𝑇ℎ𝑒 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑚𝑒𝑠𝑠𝑎𝑔𝑒 𝑏𝑖𝑡𝑠
𝑇ℎ𝑒 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑜𝑣𝑒𝑟 𝑖𝑚𝑎𝑔𝑒𝑠′𝑠 𝑝𝑖𝑥𝑒𝑙𝑠 (2)
The diverse payload capacities have been used in this calculation, and offered like percentage with the intention
of being in agreement with a most recent study now. Intended for more explanation, some information is given
for an image 512x512:
a) At 6.25%, 16384 bytes equal, which means every two pixels=16 bits, thus 1/16=6.25% when 1 bit of two
pixels is embedded
b) At 12.5%, 32768 bytes equal, which means every two pixels=8 bits, thus 1/8=12.5% when 1 bit of one
pixel is embedded
c) At 18.75%, 49152 bytes equal, which means every two pixels=16 bits, thus 3/16=18.75% when 1.5 bits of
one pixel is embedded
d) At 25%, 65536 bytes equal, which means every pixel=8 bits, thus 2/8=25% when 2s bit of one pixel is
embedded.
The explanation for using these figures in this analysis is that previous research used different
payloads, so a requirement for having uniform tools to get equal results. In Figure 7, the embedding percentages
utilized in the proposed scheme are presented. The evaluation of image quality can be specified by PSNR that
is evaluated after the embedding process to comparison between original and stego images. A hiding data
process can be considered as an unnoticeable to HVS, PSNR calculation result may be equal or may be greater
than 30 dB [14]. PSNR are measured with applying these equations:
𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10 (
255
𝑀𝑆𝑅
) (3)
where mean square error is MSE, and can be calculated with:
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 694-705
702
𝑀𝑆𝐸 =
1
𝑚𝑛
∑ ∑(𝑥𝑖𝑗 − 𝑦𝑖𝑗)
𝑛
𝑗=1
𝑚
𝑖=1 (4)
Here, m and n are the images’ sizes, while the cover and stego images are represented with x and y respectively.
During the implementation of the proposed scheme two important stages were carried out on this study, namely
the training and testing stages [27]. In conventional processing of images, the imperceptibility of a SI is
measured by PSNR measures [28]. The consistency of the stego-image has been assessed against the existing
carrier image using the PSNR measures described above. The results of our scheme, and others methods of Wu
and Tsai [29], Wu and Hwang [30], Kumar and Chand [31], Sahu et al. [32], Sahu and Swain's [33] and Qui
et al. [34], are presented in Tables 1-5. More so, Aljuaid and Parah [35] give more results and these schemes
and techniques have been compared with term of EC graphically presented in Figure 8.
Figure 7. Different embedding percentages (EP)
Table 1. Results of the projected scheme at 6.25% and 12.5% of EP
Image (512x512)
Proposed Scheme (6.25%) Proposed Scheme (12.5%)
PSNR EC BPP PSNR EC BPP
Lena 72.01 131.072 0.5 66.44 265.144 10
Lighthouse 72.03 131.072 0.5 66.42 265.144 10
Zelda 72.01 131.072 0.5 66.46 265.144 10
Pepper 72.02 131.072 0.5 66.43 265.144 10
Baboon 72.03 131.072 0.5 66.49 265.144 10
Boat 72.01 131.072 0.5 66.48 265.144 10
House 72.02 131.072 0.5 66.44 265.144 10
Couple 72.02 131.072 0.5 66.43 265.144 10
Average 72.02 131.072 0.5 66.44 265.144 10
Table 2. Results of the scheme at 18.75% and 25%
Image (512x512)
Proposed Scheme (18.75%) Proposed Scheme (25%)
PSNR EC BPP PSNR EC BPP
Lena 61.05 393.215 1.5 54.80 542.288 2.0
Lighthouse 61.06 393.215 1.5 54.80 542.288 2.0
Zelda 61.08 393.215 1.5 54.82 542.288 2.0
Pepper 61.18 393.215 1.5 54.10 542.288 2.0
Baboon 61.04 393.215 1.5 54.82 542.288 2.0
Boat 61.05 393.215 1.5 54.80 542.288 2.0
House 61.05 393.215 1.5 54.81 542.288 2.0
Couple 61.09 393.215 1.5 54.82 542.288 2.0
Average 61.07 393.215 1.5 54.85 542.288 2.0
10. Int J Elec & Comp Eng ISSN: 2088-8708
Security and imperceptibility improving of image steganography … (Noor Alhuda F. Abbas)
703
Table 3 Results for [30] and [29] techniques
Image (512x512)
Wu [30] (12.5%) Wu and Tsai [28]
PSNR EC BPP PSNR EC BPP
Lena 51.05 256.144 1.0 41.45 400.104 1.53
Lighthouse 51.06 256.144 1.0 40.11 411.903 1.57
Zelda 51.08 256.144 1.0 40.01 399.029 1.52
Pepper 51.18 256.144 1.0 40.11 399.140 1.53
Baboon 51.04 256.144 1.0 40.02 419.209 1.60
Boat 51.05 256.144 1.0 39.03 411.674 1.57
House 51.05 256.144 1.0 39.23 401.249 1.53
Couple 51.09 256.144 1.0 39.49 400.670 1.53
Average 51.07 256.144 1.0 39.78 405.238 1.54
Table 4. Results for [31] and [32] techniques
Image (512x512)
Kumar and Chand’s (12.5%) [30] Sahu (18.75%) [32]
PSNR EC BPP PSNR EC BPP
Lena 51.27 256.144 1.0 47.83 393.126 1.5
Pepper 51.28 256.144 1.0 47.93 393.126 1.5
Baboon 51.27 256.144 1.0 47.73 393.126 1.5
Boat 51.27 256.144 1.0 47.23 393.126 1.5
House 51.28 256.144 1.0 47.73 393.126 1.5
Average 51.27 256.144 1.0 47.43 393.126 1.5
Table 5. Results for [32] and [33] techniques
Image (512x512)
Sahu (18.75%) [32] Sahu and Swain’s (25%) [32]
PSNR EC BPP PSNR EC BPP
Lena 47.32 542.288 2.0 44.08 542.288 2.0
Pepper 47.33 542.288 2.0 44.07 542.288 2.0
Baboon 47.32 542.288 2.0 44.08 542.288 2.0
Boat 47.18 542.288 2.0 44.07 542.288 2.0
House 47.30 542.288 2.0 44.08 542.288 2.0
Average 47.28 542.288 2.0 44.08 542.288 2.0
Lena Lighthouse Pepper Baboon
Zelda House Couple Boat
Figure 8. Different stego-images with EP=5%
The suggested methodology has PSNR for embedding percentage as: EP=6.25% is 72.80 dB, for
EP=12.5% it is 66.60 dB, for EP=18.75 it is 61.20 dB, and for EP=25% it is 54.95 dB. The EC of the proposed
scheme is 131, 072, 265, 144, 393, 216, and 524, 288 bits for EP=6.25%, 12.5%, 18.75 and 25% respectively.
In the studies carried out by Wu and Hwang [30], and Kumar and Chand [31], PSNR of their techniques were
51.08 dB and 51.27 dB, respectively. As seen from the table of comparison, the proposed technique
outperforms that of Wu and Kumar and Chand in terms of PSNR when EP=12.5% with equal EC. The scores
11. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 1, February 2022: 694-705
704
of the PSNR of the proposed scheme when EP=6.25% and 12.5% is presented in Table 3. Based on the results,
the marked images of the proposed scheme are of better quality, thereby confirming its effectiveness. Likewise,
the PSNR and EC of our scheme for EP=18.75% and 25% is better than that of Sahu et al. [32], Sahu and
Swain's [33] respectively.
5. CONCLUSION
This study offers an improving image steganography technique related to odd/even pixel allocation
and with modified the security of secret-data prior hiding. This developed scheme may be established for
enhancing the security level as well as payload capacity for determination the existing complications. A
technique of Huffman coding is utilized for compressing the secret data preceding the embedding. Modified
secret data before hiding that will support to enhance the security and as will capacity. Different payload
capacity has been used with current study and reflected as a percentage to correspond with the researches in
recent studies. The goal of the scheme is to increase imperceptibility by utilizing PSNR measurement so it can
stand against the attack. A good PSNR value in the results shown and these findings confirmed the eligibility
of the proposed scheme. Pixel allocation with high complexities and bits standing by will certify better security
as well as robust imperceptibility associated for the existing scheme.
REFERENCES
[1] M. Al-Mualla and H. Al-Ahmad, “Information hiding: steganography and watermarking,” Multimedia Communication and Signal
Processing (MCSI), 2009.
[2] D. K. Nayak and C. Bhagvati, “A threshold-LSB based information hiding scheme using digital images,” 2013 4th International
Conference on Computer and Communication Technology (ICCCT), 2013, pp. 269-272, doi: 10.1109/ICCCT.2013.6749639.
[3] W. A. Shukur and K. K. Jabbar, “Information hiding using LSB technique based on developed PSO algorithm,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 2, pp. 1156-1168, Apr. 2018, doi: 10.11591/ijece.v8i2.pp1156-
1168.
[4] M. M. Kareem, M. Ismail, M. A. Altahrawi, N. Arsad, M. F. Mansor, and A. H. Ali, “Grid based clustering technique in wireless
sensor network using hierarchical routing protocol,” 2018 IEEE 4th International Symposium on Telecommunication Technologies
(ISTT), 2018, pp. 1-5, doi: 10.1109/ISTT.2018.8701720.
[5] A. H. Ali, M. R. Mokhtar, and L. E. George, “Enhancing the hiding capacity of audio steganography based on block mapping,”
Journal of Theoretical and Applied Information Technology, vol. 95, no. 7, pp. 1441-1448, 2017.
[6] B. Wu, M. P. Chang, B. J. Shastri, P. Y. Ma, and P. R. Prucnal, “Dispersion deployment and compensation for optical steganography
based on noise,” in IEEE Photonics Technology Letters, vol. 28, no. 4, pp. 421-424, Feb. 2016, doi: 10.1109/LPT.2015.2496957.
[7] V. Sedighi, R. Cogranne, and J. Fridrich, “Content-adaptive steganography by minimizing statistical detectability,” in IEEE
Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 221-234, Feb. 2016, doi: 10.1109/TIFS.2015.2486744.
[8] A. Alabaichi, M. A. A. K. Al-Dabbas, and A. Salih, “Image steganography using least significant bit and secret map techniques,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 935-946, 2020, doi:
10.11591/ijece.v10i1.pp935-946.
[9] O. Evsutin, A. Kokurina, R. Meshcheryakov, and O. Shumskaya, “The adaptive algorithm of information unmistakable embedding
into digital images based on the discrete Fourier transformation,” Multimedia Tools and Applications, vol. 77, no. 21,
pp. 28567-28599, 2018, doi: 10.1007/s11042-018-6055-9.
[10] A. H. Ali and A. D. Farhood, “Design and performance analysis of the WDM schemes for radio over fiber system with different
fiber propagation losses,” Fibers, vol. 7, no. 3, pp. 19, 2019, doi: 10.3390/fib7030019.
[11] S. Dhargupta, A. Chakraborty, S. K. Ghosal, S. Saha, and R. Sarkar, “Fuzzy edge detection-based steganography using modified
Gaussian distribution,” Multimedia Tools and Applications, vol 78, 2019, doi: 10.1007/s11042-018-7123-x.
[12] J. M. Lopes, P. Marrone, S. L. Pereira, and E.M. Dias, “Health 4.0: Challenges for an Orderly and Inclusive Innovation,” IEEE
Technol. Soc. Mag., vol. 38, no. 3, pp. 17–19, 2019, doi: 10.1109/MTS.2019.2930265
[13] R. Bhardwaja and V. Sharmab, “Image steganography based on complemented message and inverted bit LSB substitution,”
Procedia Computer Science, vol. 93, pp. 832–838, 2016, doi: 10.1016/j.procs.2016.07.245.
[14] M. M. Hashim and M. S. M. Rahim, “Image steganography based on odd/even pixels distribution scheme and two parameters
random function,” Journal of Theoretical & Applied Information Technology, vol. 95, no. 22, pp. 5977-5986, 2017.
[15] A. Farhood, M. K. Naji, S. H. Rhaif, and A. H. Ali, “Design and analysis of dual band integrated hexagonal haped microstrip UWB
antenna,” Indonesian Journal Electrical Engineering and Computer Science (IJEECS), vol. 15, no. 1, pp. 294-299, 2019, doi:
10.11591/ijeecs.v15.i1.pp294-299.
[16] M. M. S. A. Al-Momin, I. A. Abed, and H. A. Leftah, “A new approach for enhancing LSB steganography using bidirectional
coding scheme," International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 6, pp. 5286-5294, 2019, doi:
10.11591/ijece.v9i6.pp5286-5294.
[17] S. Singh and A. Datar, “Improved hash-based approach for secure color image steganography using canny edge detection method,”
International Journal of Computer Science and Network Security (IJCSNS), vol. 14, no. 7, pp. 82-89, 2014.
[18] F. R. Patel and A. N. Cheeran, “Performance evaluation of steganography and AES encryption based on different formats of the
image,” International Journal of Advanced Research in Computer and Communications Engineering, vol. 4, no. 5, 2015, doi:
10.17148/ijarcce.2015.45140.
[19] H. M. Noman, A. A. Abdulrazzaq, M. M. Kareem, and A. H. Ali, “Improvement Investigation of the TCP algorithms with avoiding
network congestion based on OPNET,” IOP Conference Series: Materials Science and Engineering, vol. 518, no. 5, 2019,
Art. no. 052025, doi:10.1088/1757-899X/518/5/052025.
[20] P. Thakur, S. Kushwaha, and Y. Rai, “Enhance steganography techniques: A solution for image security,” International Journal of
Computer Applications, vol. 115, no. 3, 2015, doi: 10.5120/20133-2220.
12. Int J Elec & Comp Eng ISSN: 2088-8708
Security and imperceptibility improving of image steganography … (Noor Alhuda F. Abbas)
705
[21] A. A. Hussein and A. H. Ali, “Comprehensive investigation of coherent optical OFDM-RoF employing 16QAM external
modulation for long-haul optical communication system,” International Journal Electrical and Computer Engineering (IJECE),
vol. 10, no. 3, pp. 2607-2616, 2020, doi: 10.11591/ijece.v10i3.pp2607-2616.
[22] M. Kamath and R. S. Kunte, “Framework for reversible data hiding using cost-effective encoding system for video steganography,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, pp. 5487-5496, 2020, doi:
10.11591/ijece.v10i5.pp5487-5496.
[23] S. Roy and A. K. Pal, “A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram
modification,” International Journal of Information and Computer Security, vol. 10, no. 2-3, pp. 216-236, doi:
10.1504/IJICS.2018.091469.
[24] A. Banharnsakun, “Artificial bee colony algorithm for solving the Knight’s tour problem,” In International Conference on
Intelligent Computing and Optimization, vol. 866, pp. 129-138, 2018, doi: 10.1007/978-3-030-00979-3_13.
[25] D. Bhattacharyya, T. Kim, and P. Dutta, “A method of data hiding in audio signal,” Journal of the Chinese Institute of Engineers,
vol. 35, no. 5, pp. 523-528, 2010, doi: 10.1080/02533839.2012.679054.
[26] M. Khari, A. K. Garg, A. H. Gandomi, R. Gupta, R. Patan, B. Balusamy, “Securing data in the internet of things (IoT) using
cryptography and steganography techniques,” in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, no. 1, pp.
73-80, Jan. 2020, doi: 10.1109/TSMC.2019.2903785.
[27] M. J. Mnati, R. F. Chisab, A. M. Al-Rawi, A. H. Ali, and A. V. D. Bossche, “An open-source non-contact thermometer using low-
cost electronic components,” HardwareX, vol. 9, 2021, doi: 10.1016/j.ohx.2021.e00183.
[28] S. A. Lafta, A. H. Ali, M. M. Kareem, Y. A. Hussein, A. H. Ali, “Performance simulation of broadband multimedia wireless
networks simulation based on OPNET,” Indonesian Journal Electrical Engineering and Computer Science (IJEECS), vol. 17,
no. 1, pp. 1-9, 2020, doi: 10.11591/ijeecs.v17.i1.pp1-9.
[29] D. Wu and W. Tsai, "A steganographic method for images by pixel-value differencing,” Pattern Recognition Letters, vol. 24,
no. 9-10, pp. 1613-1626, 2003, doi: 10.1016/S0167-8655(02)00402-6.
[30] N. Wu and M. Hwang, “A novel LSB data hiding scheme with the lowest distortion,” The Imaging Science Journal, vol. 65, no. 6,
pp. 371-378, 2017, doi: 10.1080/13682199.2017.1355089.
[31] R. Kumar and S. Chand, “A reversible data hiding scheme using bit flipping strategy,” Journal of Discrete Mathematical Sciences
and Cryptography, vol. 19, no. 2, pp. 331-345, 2016, doi: 10.1080/09720529.2015.1085743.
[32] A. K. Sahu, G. Swain and E. S. Babu, “Digital image steganography using bit flipping,” Cybernetics and Information Technologies,
vol. 18, no. 1, pp. 69-80, 2018, doi: 10.2478/cait-2018-0006.
[33] A. K. Sahu and G. Swain, “A novel n-Rightmost bit replacement image steganography technique,” 3D Research 10, no. 1, 2019,
Art. no. 2, doi: 10.1007/s13319-018-0211-x.
[34] H. Qiu, M. Qiu, M. Liu and G. Memmi, “Secure health data sharing for medical cyber-physical systems for the healthcare 4.0,” in
IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 9, pp. 2499-2505, Sept. 2020, doi: 10.1109/JBHI.2020.2973467.
[35] H. Aljuaid and S. A. Parah, “Secure patient data transfer using information embedding and hyperchaos,” Sensors, vol. 21, no. 1,
2021, Art. no. 282, doi: 10.3390/s21010282.