The document provides an overview of steganography, discussing various techniques for hiding secret messages in digital files like images, audio, and video. It describes methods for embedding data in the frequency and spatial domains of digital files. The paper also compares steganography to encryption and digital watermarking, outlining the goals and measures of different steganography techniques.
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
A Study on Video Steganographic Techniquesijceronline
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of Steganography is used to share the data secretly and securely. It is the science of embedding secret information into the cover media with the modification to the cover image, which cannot be easily identified by human eyes. Steganography algorithms can be applied in audio, video and image file. Hiding secret information in video file is known as video steganography. Video Steganography means hiding a secret message that can be either a secret text message or an image within a larger one in such a way that just by looking at it, an unwanted person cannot detect the presence of any hidden message. For hiding secret information in the video, there are many Steganography techniques which are further explained in this paper along with some of the research works done in some fields under video steganography by some authors. The paper describes the progress in the field of video Steganography and intends to give the comparison between its different uses and techniques
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
WANT CODING just visit----------http://bit.ly/image_javaproject
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
A Study on Video Steganographic Techniquesijceronline
Data hiding techniques have taken important role with the rapid growth of intensive transfer of multimedia content and secret communications. The method of Steganography is used to share the data secretly and securely. It is the science of embedding secret information into the cover media with the modification to the cover image, which cannot be easily identified by human eyes. Steganography algorithms can be applied in audio, video and image file. Hiding secret information in video file is known as video steganography. Video Steganography means hiding a secret message that can be either a secret text message or an image within a larger one in such a way that just by looking at it, an unwanted person cannot detect the presence of any hidden message. For hiding secret information in the video, there are many Steganography techniques which are further explained in this paper along with some of the research works done in some fields under video steganography by some authors. The paper describes the progress in the field of video Steganography and intends to give the comparison between its different uses and techniques
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
The presentation gives a brief overview and history about steganography and discusses the various types and techniques of steganography.
The types of steganography included are:
Text
Image
Audio
WANT CODING just visit----------http://bit.ly/image_javaproject
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points.
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
Several developments in the transfer of data through the internet make it easier to transfer the data faster and accurately to the destination. But in this, anyone can misuse and modify the critical information through hacking. Video steganography is a technique which is used to hide the message and to transfer the message inside a video. Video is an application of many frames of audio, text, and images. The segmentation is known as the advanced technology that provides rich information of an image. The purpose of this paper is to propose a new technique to hide the data using video steganography with the help of artificial intelligence and DWT. This paper focuses on analyzing the various video steganography techniques which were proposed for securing the data transmission. In this paper, artificial intelligence is applied in order to improve the integrity and security of data transfer. The performance of the proposed method is evaluated on the basis of Bit error, mean square error, and PSNR metrics. Shivani Gupta | Gargi Kalia | Preeti Sondhi ""Video Steganography using Discrete Wavelet Transform and Artificial Intelligence"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25067.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/25067/video-steganography-using-discrete-wavelet-transform-and-artificial-intelligence/shivani-gupta
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Cryptography is where security engineering meets mathematics.The field of studyrelated to encoded
information comes from Greek word for ”secret writing” is cryptography.The art and science of hiding information
by embedding it in some otherdata is Steganography. The secret communication is carried through many
sourceslike image, audio and video files. This technique mainly proposes data hiding by embeddingthe message of
interest using geometric style of cryptographic algorithm,thus providing high security. Wavelet transform
algorithms are used to perform preprocessing of images.
Keywords —Cryptography, Steganography, Geometrical way of embedding, Wavelet transforms,DCT
Video steganography based on DCT psychovisual and object motionjournalBEEI
Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as videos are often compressed to reduce the storage for limited bandwidth. The video provides additional hidden-space in the object motion of image sequences. This research proposes a video steganography scheme based on object motion and DCT-psychovisual for concealing the message. The proposed hiding technique embeds a secret message along the object motion of the video frames. Motion analysis is used to determine the embedding regions. The proposed scheme selects six DCT coefficients in the middle frequency using DCT-psychovisual effects of hiding messages. A message is embedded by modifying middle DCT coefficients using the proposed algorithm. The middle frequencies have a large hiding capacity and it relatively does not give significant effect to the video reconstruction. The performance of the proposed video steganography is evaluated in terms of video quality and robustness against MPEG compression. The experimental results produce minimum distortion of the video quality. Our scheme produces a robust of hiding messages against MPEG-4 compression with average NC value of 0.94. The proposed video steganography achieves less perceptual distortion to human eyes and it's resistant against reducing video storage.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Drying of agricultural products using forced convection indirect solar dryerIRJESJOURNAL
Abstract:- Drying of three agricultural products namely potato slices, onion slices and whole grapes was done using an indigenously designed and fabricated forced convection indirect solar dryer and under open sunlight. The diurnal variation of temperature, relative humidity in the solar dryer was also compared with the ambient temperature and relative humidity during March and April 2017 for all the three products. The study showed increase of temperature and lower humidity inside the drying chamber at different time interval. Hourly moisture loss for all the three agricultural products in the drying chamber and open sun drying was also compared and the percentage of moisture loss in the drying chamber was found to be higher compared to open sun drying for all the products. The mass of water removed for all the three products in the drying chamber was also found to be higher than the open sun drying. Results of the study showed that forced convection indirect solar dryer is better than the open sun drying method for drying the agricultural products more efficiently.
The Problems of Constructing Optimal Onboard Colored RGB Depicting UAV SystemsIRJESJOURNAL
Abstract:-The problems of constructing optimal adaptive onboard color RGB depictingUAV systems have been analyzed. The problem of optimal formation of color signals of RGB color system has been formulated and solved by implementing the adaptive flight mode of UAVs containing an onboard imaging system. An adaptive UAV mode with an imaging system on board is proposed, which consists of adaptive changes in flight altitude depending on the wavelength of the received color signal. As a result of the optimization of the proposed operating mode of the UAV imaging system, an analytic formula for adaptive device control has been obtained. Recommendations have been given on the practical implementation of the proposed method.
Flexible Design Processes to Reduce the Early Obsolescence of BuildingsIRJESJOURNAL
Abstract:- This work intends to analyze the processes of flexibility to improve the adaptability to the users and to define some strategies to delay building obsolescence. Some approaches that address the architectural flexibility processes are studied to understand the rapid transformation of user lifestyles and changes in needs and performance building requirements. Obsolescence is often characterized by the lack of flexibility in the structure and walls, as well as services that change rapidly according to the different uses of buildings. This poses a threat to the built environment, since a large number of buildings are demolished having still years of useful life. In this way, different types of obsolescence are analyzed, focusing on some structural, economic, functional and social aspects of the construction and the use of buildings, seeking the capacity to design and produce adaptive buildings that are more resilient to obsolescence. Thus, some concepts of flexibility and flexible process are presented to promote adaptability in buildings. However, flexibility is a complex process, a long way to achieve adaptability to the built environment and the changing needs of users. The method used in this analysis takes into account the diversity of the design process, making some considerations about the interrelation of the social, functional and technical aspects. Finally, some conclusions about the design methods faced by a flexible approach process can lead to more useful and adaptable spaces for future transformations in order to extend the life cycle and prevent early obsolescence of buildings.
Study on Performance Enhancement of Solar Ejector Cooling SystemIRJESJOURNAL
Abstract: Cooling sector is dominating by vapor compression cooling sector which uses refrigerant which are harmful to environment. The solar ejector cooling system is alternative for vapor compression cycle which uses solar energy to give heat to the generator, which is a viable method for heat generation. The solar ejector cooling system not only fulfills cooling requirement but also helps in energy conservation and protection of environment. It reduces the generator work and decrease the throttling losses. Maintenance requirement and cost is low for ejector cooling system .In this paper, theoretically study is done on enhancement of the performance of solar ejector cooling system. Various system configuration are presented with detailed design. This system still needed a lot of research work to make it alternative for vapor compression cycle based cooling system completely.
Flight Safety Case Study: Adi Sucipto Airport Jogjakarta - IndonesiaIRJESJOURNAL
Abstract: Adi Sucipto Airport-Jogyakarta is an airport with enclave civil status or as TNI-AU airbase (civilian airport within the military area) has limited infrastructure with Azimuth Runway 09-27, has no RESA (Runway End Safety Area). The calculation results using Acceptable Safety Level (ASL) standard 1 x 10-7 shows that the probability of accident risk at wet runway condition is greater than in dry condition. Runway Excursion occurs at the airport, especially when the runway is wet and overrun due to hydroplaning and the plane deviates from the center of runway as well as the aircraft wheels are in contact with ground or obstacle surface outside the runway. It means the thicker layer of water above the runway will cause increased risk of accidents on the runway. This is why standing water should be immediately removed from the runway as quickly as possible. Mitigation efforts need to be done simultaneously with recovery by adding RESA and other preventive efforts in order to water patch and standing water does not exceed 2 mm and apply the mandatory of SOP consistently at the airport.
A Review of Severe Plastic DeformationIRJESJOURNAL
ABSTRACT: This article reviews about Ultrafine grained (UFG) materials processed by Severe Plastic
Deformation. From the period of 1950’s, the researchers made a fountain stone for this technique. Over the last
decades, this SPD technique experienced an enormous growth among the research field. There was a
development of different methods of SPD, production of various materials by SPD with improved and
interesting results based on our requirement. Moreover, different post processing techniques will also help to
enhance the property of the SPD processed material. This paper reviews the overall development of this
technique, various methods of SPD, discussed about the enhancement of the properties and finally concluded
with some specific challenges and issues faced by the modern researchers. It may be helpful to those who wants
specialise in bulk nanomaterials produced by SPD.
Annealing Response of Aluminum Alloy AA6014 Processed By Severe Plastic Defor...IRJESJOURNAL
Abstract: In this paper the study of micro structural stability during annealing with respect to time of conventionally grains (CG) and ultrafine-grained (UFG) of Aluminum AA6014 i s carried out. It has been observed that, the effect of the second phase magnesium-silicon particles in the CG and UFG AA6014 samples leads to a rapid hardness which increases from 40HV10 to 70HV10 within 7 days. Artificial aging shows that the material hardness even increased after 20 hours of annealing at 180°C. In total 30 hours of annealing, the hardness arrives at its maximum and then reduces due to the formation of Mg2Si precipitates, which rise in size and change their coherency. The precipitates cannot efficiently pin the dislocations and act as barriers to the dislocation motion which indicate an overall decrease in the hardness. It also has been found that the ultrafinegrained AA6014 alloy loses its thermal stability at approximately 200°C and recrystallized at 300°C. Thermal stability is strongly dependent on the material purity, second phase particles and/or oxide particles which may break up during rolling and lead to some dispersion strengthening.
Evaluation of Thresholding Based Noncontact Respiration Rate Monitoring using...IRJESJOURNAL
Abstract: - A noncontact method for respiration rate monitoring using thermal imaging was developed and evaluated. Algorithms to capture images, detect the location of the face, locate the corners of the eyes from the detected face and thereafter locate the tip of the nose in each image were developed. The amount of emitted infrared radiation was then determined from the detected tip of the nose. Signal processing techniques were then utilised to obtain the respiration rate in real-time. The method was evaluated on 6 enrolled subjects after obtaining all ethical approvals. The evaluations were conducted against two existing contact based methods; thoracic and abdominal bands. Results showed a correlation coefficient of 0.9974 to 0.9999 depending on the location of the ROI relative to the detected tip of the nose. The main contributions of the work was the successful development and evaluation of the facial features tracking algorithms in thermal imagining, the evaluation of thermal imaging as a technology for respiration monitoring in a hospital environment against existing respiration monitoring systems as well as the real time nature of the method where the frame processing time was 40 ms from capture to respiration feature plotting.
Correlation of True Boiling Point of Crude OilIRJESJOURNAL
Abstract :- The knowledge of the crude boiling point is very important for the refining process design and optimization. In this project the aim is to find the correlation of true boiling points. The study will be very useful in crude transportation and downstream operations. Correlation is tried to obtain by testing a number of crude oil samples from heavy to light. The comparisons of boiling point of different crude samples obtained is tried to compare with already existing correlations. Framol, Destmol and Riazi’s, these three correlation models have taken. The result showed that comparison of three correlation models and which is more accurate.
Combined Geophysical And Geotechnical Techniques For Assessment Of Foundation...IRJESJOURNAL
Abstract: This study was carried out to assess the subsurface conditions around the school of technology complex in Lagos State Polytechnic, Ikorodu, using integrated geophysical and geotechnical techniques. The site lies within the Sedimentary terrain of southwestern Nigeria. Allied Ohmega Resistivity meter was used for data collection of 1-D and 2-D resistivitymeasurement while WinResist software and Dipro software were used for the processing respectively.The results of the vertical electrical sounding indicate that the depth to basement values ranges between 27.6 and 39.5m. The 2D resistivitysurvey has provided valuable information on the lateral and vertical variation of the layer competent for erecting foundation of engineering structures. The CPT probed an average depth of 4.8m and has identified material of very high shear strength associated with dense sand materials. The correlation of the three techniques used revealed similar soil layering consisting of topsoilsandy clay, coarse sand and sand.A mechanically stable coarse sand material was discovered as weathered layer which indicates high load bearing capacity suitable for foundation in the area and can support massive structures.
Abstract:- research stands out because it is provided by the model of Al-Mobaideen (2009) critics to analyze for the governance of information and communications technology (ICT) at the National University of Chimborazo factors which raises the factors such as: strategies and policies, infrastructure and networks, financing and sustainability, and institutional culture that should be taken into account if desired govern the successful integration of ICT in the school. The study is exploratory, the almost total lack of previous studies on Governance of ICT integration at the University. It is concluded that there is a set of organizations with addresses IT markedly different roles in their duties with regard to its orientation to administrative, academic and research. The University has failed to define the strategic role of ICT in their academic, because there is no objective referred to IT academia in 2013-2016 pedi, but also because there is not a pedi-oriented IT the formation. The limited effectiveness of IT organizations in academic activities is provided by the low rate of use of educationalplatformsb_learning.
Gobernanzade las TIC en la Educacion SuperiorIRJESJOURNAL
Abstract:-Se destaca la investigación debido a que se da a conocer mediante el modelo de Al-Mobaideen (2009) los factores críticos a analizar para la gobernanza de las Tecnologías de la información y la Comunicación (TIC) en la Universidad Nacional de Chimborazo donde plantea los factores como:estrategias y políticas, infraestructura y redes, financiación y sostenibilidad, y cultura institucional, que se debe tomar en cuenta si se desea gobernar la integración exitosa de las TIC en la institución educativa. El estudio es exploratoria, por la poca presencia de estudios previos sobre Gobernanza de la integración de las TIC en la Universidad. Se concluye que existe un conjunto de organismos con direcciones de TI con roles notoriamente diferenciados en sus funciones con respecto a su orientación a procesos administrativos, académicos y de investigación. La Universidad no ha logrado definir el rol estratégico de las TIC en su desarrollo académico, porque no existe ningún objetivo referido a TI para el ámbito académico en el PEDI 2013-2016, sino porque además, no se cuenta con un PEDI de TI orientado a la formación. La poca eficacia de los organismos de TI en actividades académicas se da a conocer por la baja tasa de uso de plataformas educativas b_learning.
The Analysis and Perspective on Development of Chinese Automotive Heavy-duty ...IRJESJOURNAL
Abstract: In recent years, under the influence of both China's domestic market demand and emissions standard improvement, Chinese manufacturers put great effort on the research and design of automotive heavy-duty diesel engine. This paper analyzes the technical parameters of heavy duty diesel engine in 11 / 13L displacement section and introduces its performance. At the same time, combined with the development of foreign heavy-duty diesel engine, the future development direction of Chinese heavy-duty diesel engine is forecasted.
Research on The Bottom Software of Electronic Control System In Automobile El...IRJESJOURNAL
Abstract: With the development of science and technology, car replacement faster and faster. The development of the automotive industry has a contradiction, on the one hand, the speed of upgrading the car technology can not keep up with the speed of the performance requirements of the car, on the other hand, the country's automobile exhaust emission standards become more stringent. In addition, the depletion of oil resources led to the rise in gasoline prices, the traditional car is facing a crisis. Considering the situation of gas fuel resource structure and supply situation in China, it is feasible to promote gas fuel engine[1].However, the pollution caused by the car has become one of the major pollution sources in the urban environment and the atmospheric environment, and this trend continues to deteriorate[2].Therefore, alternative energy vehicles and hybrid cars is the main direction of development, and any improvement in the car will be car electronics and software replacement for the premise. On the one hand, natural gas as an alternative to gasoline, with its low prices, excellent combustion emissions, the relative sustainable development and other characteristics of more and more car manufacturers favor;On the other hand, the mainstream of the automotive electronic control unit ECU software development to AUTOSAR structure, low power consumption, functional safety for the development direction. Based on the actual development of natural gas engine control unit, the structure and function of ECU software are studied with reference to AUTOSAR software design standard. This paper studies the structure of the application of the software layer of the electronic control system and the main control strategy under the various conditions of the structure, and puts forward the underlying software resources needed by the application layer software. This paper analyzes the internal and peripheral resources of Infineon XC2785x microcontroller and designs hardware abstraction layer software and ECU abstraction layer software. The current characteristics of the jet valve driven by the natural gas multi-point injection engine were investigated. Automotive electronics technology has been widely used in modern vehicles which, and gradually become the development of new models, improve the performance of the key technical factors[3] .
Evaluation of Specialized Virtual Health Libraries in Scholar Education Evalu...IRJESJOURNAL
Abstract:- The aim is to evaluate the impact on academic training with specialized virtual health libraries (databases and catalogs) available in Institutions of Scholar Education, because there is uncertainty about the appropriate use of these libraries. The research was conducted on the databases available on 2 universities during the academic period August 2015 - February 2016. Using criteria and indicators for evaluating virtual libraries, model quality of university libraries based on fuzzy techniques, Bibliometric and criteria for virtual libraries in health. The study had the participation of 188 students from two universities or groups. The research reveals that for the first group and the second group almost always (60.45%) find the information, the (57.2%) have relevance to the topic, access (45.8%) once a month, and Elseiver and BiblioMedica are the most commonly used, however, mostly ie (78.55%) use traditional libraries versus (58.2%) which are virtual. Descriptive analysis was performed using the software SPSSv20. This experience allows us to confirm that the use of libraries contributes discreetly in academic education, therefore, it requires training plans, reference guides, strengthen the socialization of this resource, free access from anywhere.
Linking Ab Initio-Calphad for the Assessment of the AluminiumLutetium SystemIRJESJOURNAL
Abstract: First-principles calculations within density functional theory (DFT) were used to investigate intermetallics in the Al-Lu system at 0 K. The five compounds of the system were investigated in their observed experimental structures. Thermodynamic modelling of the Au–Lu system was carried out by means of the CALPHAD (calculation of phase diagrams) method. The liquid phase and the intermetallic compounds Al3Lu, Al2Lu, AlLu, Al2Lu3 and AlLu2 are taken into consideration in this optimization. The substitutional solution model was used to describe the liquid phase. The five compounds are treated as stoichiometric phases. The enthalpies of formation of the compounds were found by the ab initio calculations and used in the optimization of the phase diagram.
Thermodynamic Assessment (Suggestions) Of the Gold-Rubidium SystemIRJESJOURNAL
Abstract: Thermodynamic modellings of the Au–Rb system was carried out by means of the CALPHAD (calculation of phase diagrams) method. The liquid phase and the intermetallic compounds Au5Rb, Au2Rb, AuRb and Au7Rb3 and Au3Rb2 (new compounds) in addition to the compound AuRb2 (suspected compound) are taken into consideration in this optimization. The substitutional solution model was used to describe the liquid phase. The six compounds are treated as stoichiometric phases. The enthalpies of formation used in these optimizations were calculated within ab-initio method in precedent work
Elisa Test for Determination of Grapevine Viral Infection in Rahovec, KosovoIRJESJOURNAL
Abstract: Vineyard in Kosovo is estimated to have a great economic potential. There are thousands of hectares of vineyards that contribute to the economic potential of Rahovec by expanding the cultivation area year by year. The vines are affected by a number of viral diseases or pathologies similar to them, which significantly have an impact against the plant life and their production. Therefore, this study was conducted in several farms in Rahovec to determine whether there is a presence of viral infection in the vines. Application of Das-Elisa, Protein A-DAS and Antigen Direct Binding - DASI verified the final identification of viral infection in the collected material. The yellow colour reaction shown on the plate showed the positive result of the Elisa assay for viruses GFLV, ArMV, GLRaV-1, GLRaV-2, GLRaV-3, GVA and GVB in varieties Vranac, Smederevka, Prokup, Afuzali, Grocaka, Demir Kapi, Plovdina, Melika, Zhillavka. The use of specific antibodies will enable the examination of viral diseases in plant materials collected from vineyards and will be oriented to their phytosanitary status.
Abstract. Ensuring of permanent and continuous working process of oil-gas and field equipment alongside with the other factors, depends also on reliability of sealing units. A problem of deterioration modeling of a sealing element of a packer including into an oil field equipment complex is considered in this paper.
Determining Loss of Liquid from Different Types of Mud by Various Addictives ...IRJESJOURNAL
Abstract :- Filtration is used in many industries to separate water from the solid. It is important to find fluid loss in drilling, cementing, fracturing, and almost every other type of downhole treatment design. The filter cake characterization is very essential for well selection of drilling fluid problems and formation damage. Therefore this study is taken up to experimentally investigate the effect of different concentrations of CMC, Starch, Wood fibers, Soda ash, Caustic soda, Bentonite and Barite on filtration loss and formation damages. Three different samples are used in this study at different concentration and a comparison is made. Although the discussion presented here is confined to fluid loss during drilling. Water-based drilling mud’s including Bentonite is wellknown and is being widely used in the petroleum industry. Among the important functions of water-based drilling fluid were to form filter cake on the wall of the well bore, prevent water leakage, and maintain the stability of the well wall. The properties of the water-based drilling fluid, such as the rheology and filtration loss, are affected by the fluid loss additive. Polymers, which are nontoxic, degradable, and environment friendly, are the best choice to be used as drilling fluids additives.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Fundamentals of Electric Drives and its applications.pptx
Survey Paper on Steganography
1. International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 6, Issue 1 (January 2017), PP.68-71
www.irjes.com 68 | Page
Survey Paper on Steganography
Namrata Singh
Computer Science and Engineering ABES Engineering College, Ghaziabad A.K.T.U
Abstract: Steganography is an art for hiding the secret information inside other information which are digitally
cover. The definition of steganography can also be given as study of unseen communication that usually deals
with existence of communicated message. The hidden message can be text, audio, image or video accordingly to
that it can be cover from either image or video. In steganography, hiding information achieved to insert a
message into cover image which generates a stego image. In this paper, we have analyze various steganography
methods and also covered classification and applications.
Keywords: Steganography, Data Hiding, Encryption, Stego-File, Video, Image
I. INTRODUCTION
In today’s world, the communication is the basic necessity of every growing area. Everyone wants the
secrecy and safety of their communicating data. In our daily life, we use many secure pathways like internet or
telephone for transferring and sharing information, but it's not safe at a certain level. In order to share the
information in a concealed manner two techniques could be used. These mechanisms are cryptography and
steganography. . In cryptography, the message is modified in an encrypted form with the help of encryption key
which is known to sender and receiver only. The message cannot be accessed by anyone without using the
encryption key. However, the transmission of encrypted message may easily arouse attacker’s suspicion, and the
encrypted message may thus be intercepted, attacked or decrypted violently. In order to overcome the
shortcomings of cryptographic techniques, steganography techniques have been developed. Steganography is
the art and science of communicating in such a way that it hides the existence of the communication. Thus,
steganography hides the existence of data so that no one can detect its presence. In steganography the process of
hiding information content inside any multimedia content like image, audio, video is referred as a ―Embedding‖.
For increasing the confidentiality of communicating data both the techniques may be combined. The remaining
paper consist of following section: II. Steganography III. Conclusion and Future Work.
II. STEGANOGRAPHY
Steganography is the practice of concealing a file, message, image, or video within another file,
message, image, or video. The word steganography combines the Greek words steganos, meaning "covered,
concealed, or protected", and graphein meaning "writing".
The advantage of steganography over cryptography alone is that the intended secret message does not
attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how
unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.
Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is
concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the
message. Steganography includes the concealment of information within computer files. In digital
steganography, electronic communications may include steganographic coding inside of a transport layer, such
as a document file, image file, program or protocol. Media files are ideal for steganographic transmission
because of their large size. For example, a sender might start with an innocuous image file and adjust the color
of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically
looking for it is unlikely to notice it.
The Steganography Method Used should have:
a) Imperceptibility: The video with data and original data source should be perceptually identical.
b) Robustness: The embedded data should survive any processing operation the host signal goes through and
preserve its fidelity.
c) Capacity: Maximum data embedding rate.
d) Secrecy: Extraction of hidden information from the video must not happen without prior permission of
intended user having password.
e) Accuracy: The extraction of the hidden data from the medium should be accurate and reliable.
2. Survey Paper On Steganography Namrata Singh
www.irjes.com 69 | Page
III. TERMINOLOGIES STEGANOGRAPHY
● Message: The Secret message which is meant to be sent/transmitted safely is known as Message.[3]
● Cover-object: Cover Object is basically the object in which the data is to be hidden. It may be image,
video and Audio.
● Stego-object: The object carrying the secret message is known as stego object.
● Stego-key: Key used for encrypting and decrypting the secret message..
● Embedding algorithm: Algorithm used to hide the message In the cover.
● Extracting algorithm: An algorithm used to unhide/uncover the message from the stego object.
IV. TYPES OF STEGANOGRAPHY
Depending on the type of the cover object there are many suita)e stenographic techniques which are in order to
obtain security.[1][4]
a) Image Steganography: The process of concealing the secret message in an image file is known as image
steganography. It has certain limitations like you cannot embed a large amount of data in an image because
it may distort which may arise suspicion that the image might contain any information.
b) Video Steganography: The process of concealing the secret message in an Video file is known as Video
steganography. Video Steganography is far more safe and efficient as compared to that of the image
steganography as you can embed large amount of data in audio and frames of the video.
c) Network Steganography: Network Steganography method uses modification of a single network protocol.
The protocol modification may be applied to the PDU (Protocol Data Unit), time relations between
exchanged PDUs, or both (hybrid methods). It is Highly secure and robust.
d) Audio Steganography: In Audio Steganography audio is used as the cover to hide the secret information it
is also very robust in nature but with limitation of the amount of data one can hide.
e) Text Steganography: Secret Data is hided in a text file. This method lacks robustness and is not that much
efficient in hiding the data. It can be easily detected by the eyes of intruders.
IV. STEGANOGRAPHY MEASURES
a) Imperceptibility: A steganographic process is imperceptible when human eye cannot distinguish between
the cover image and the stego image.
b) Payload: It indicates the amount of secret information that can be embedded in the cover image. The
embedding rate is given in absolute measurement such as the length of the secret message.
c) Statistical Attacks: The process of extracting the secret information from the stego object is known as
statistical attack. The algo used for steganography must be robust to statistical attacks.
d) Security: Security of a steganographic system is defined in terms of undetectability, which is assured when
the statistical tests cannot distinguish between the cover and the stego-image.
e) Computational Cost: Data hiding and Data retrieval are the two parameters used to figure computational
cost of any steganography approach. Information concealing time alludes to the time required to implant
information inside a cover video edge and information recovery alludes to extraction time of mystery message
from the stego outline.
f) Perceptual Quality: Increasing the payload degrade the quality of the video so approach should be used such
that the quality should remain intact to avoid it from getting in sight.
V. STEGANOGRAPHY TECHNIQUES
Steganography techniques can be divided into following domains : [2]
a) Frequency Domain Technique:
This is a more complex way of hiding information in an image various algorithms and transformations
are used on the image to hide information in it frequency domain embedding can be termed as a domain of
embedding techniques for which a number of algorithms have been suggested frequency domain are broadly
classified into :
● Discrete Fourier transformation technique: The Discrete Fourier Transform to get frequency component for
each pixel value. The Discrete Fourier Transform (DFT) of spatial value f(x, y) for the image of size M x N
is defined in equation for frequency domain transformation.
● Discrete cosine transformation technique: The discrete cosine transform (DCT) is a technique for
converting a signal into elementary frequency components. It is widely used in image compression.
● Discrete Wavelet transformation technique: A discrete wavelet transform (DWT) is any wavelet transform
for which the wavelets are discretely sampled.
3. Survey Paper On Steganography Namrata Singh
www.irjes.com 70 | Page
b) Spatial Domain Methods:
There are many versions of spatial steganography' a directly change some bits in the image pixel values
in hiding data A directly change some bits in the image pixel values in hiding data. Spatial domain techniques
are broadly classified into:
● Least significant Bit : The least significant bit is the lowest bit in a series of numbers in binary the LSB is
located at the far right of a string. For example, in the binary number: 10111001, the least significant bit is
the far right 1. Here the secret information is stored in the LSB of the image.
● Pixel value differencing : The pixel-value differencing (PVD) scheme provides high imperceptibility to
the stego image by selecting two consecutive pixels and designs a quantization range table to determine the
payload by the difference value between the consecutive pixels.
● Edge based data embedding method: In ELSB, we use all the edge pixels in an image. Here, we first
calculate the masked image by masking the two LSB bits in the cover image. Then we identify the edge
pixels by using the Canny Edge detection method. After obtaining the edge pixels we hide the data in the
LSB bits of the edge pixels only and send the stego object to the receiver.
● Random pixel embedding method: random pixels are used to embed and send the stego object to the
receiver.
VI. COMPARISON TABLE
Criterion/Meth
od
SteganographyWatermarkingEncryption
Carrierany digital
media
mostly
image/audio
files
usually text
based, with
some
extensions to
image files
Secret datapayloadwatermarkplain text
Keyoptionaloptionalnecessary
Input filesat least two
unless in self-
embedding
at least two
unless in self-
embedding
one
Detectionblindusually
informative
(i.e., original
cover or
watermark is
needed for
recovery)
blind
Authenticationfull retrieval of
data
usually
achieved by
cross
correlation
full retrieval of
data
Objectivesecrete
communication
copyright
preserving
data protection
Resultstego-filewatermarked-
file
cipher-text
Concerndelectability/
capacity
robustnessrobustness
Type of attackssteganalysisimage
processing
cryptanalysis
Visibilityneversometimesalways
Fails whenit is detectedit is
removed/replac
ed
de-ciphered
Relation to
cover
not necessarily
related to the
cover. The
message is
more important
than the cover.
usually
becomes an
attribute of the
cover image.
The cover is
more important
than the
message.
N/A
Flexibilityfree to choose
any suitable
cover
cover choice is
restricted
N/A
Historyvery ancient
except its
digital version
modern eramodern era
4. Survey Paper On Steganography Namrata Singh
www.irjes.com 71 | Page
VII. CONCLUSION
This paper gave an overview of different steganographic techniques its major types and classification
of steganography which have been proposed in the literature during past few years.
ACKNOWLEDGMENT
This Paper is completed by referring various research papers on steganography techniques and their
overview and I really appreciate the hard work and dedication done by the authors of the papers
REFERENCES
[1]. Volume-2, Issue-5, May-2015 ISSN: 2349-7637 (Online) RESEARCH HUB – International
Multidisciplinary Research Journal (RHIMRJ) Research Paper Available online at: www.rhimrj.com
2015, RHIMRJ, All Rights Reserved Page 1 of 5 ISSN: 2349-7637 (Online) A Survey Paper on
Steganography and Cryptography Z. V. Patel1st Student, M.Tech. C. U. Shah College of Engineering
and Technology, Surendranagar, Gujarat (India) S. A. Gadhiya2nd Head, B.E.(IT) C. U. Shah College
of Engineering and Technology, Surendranagar, Gujarat (India)
[2]. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in
Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com
An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques
Mukesh Garg* A.P. Gurudev Jangra M.Tech. Scholar H.O.D in CSE Department Jind Institute of
Engineering & Technology Jind Institute of Engineering & Technol
[3]. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in
Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com
An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques
Mukesh Garg* A.P. Gurudev Jangra M.Tech. Scholar H.O.D in CSE Department Jind Institute of
Engineering & Technology Jind Institute of Engineering & Technology Jind, Haryana 126102, India
Jind, Haryana 126102, India
[4]. International Journal of Innovative Research in Computer and Communication Engineering (A High
Impact Factor, Monthly, Peer Reviewed Journal) Vol. 4, Issue 1, January 2016 Copyright to IJIRCCE
DOI: 10.15680/IJIRCCE.2016. 0401158 721 A Survey Paper on Steganography Techniques Dr.
Rajkumar L Biradar1 , Ambika Umashetty2 Associate Professor, Dept. of Electronics and Telematics,
G. Narayanamma Institute of Technology & Science, Hyderabad, India1 Dept. of Computer Science &
Engineering, Appa Institute of Engineering & Technology, Kalaburagi, India2