Information Hiding is a task that face difficult challenges in current time. The reason for these challenges is the rapid development of methods of detection of hidden information. So, researchers have been interested in developing methods of concealment, making it difficult for attackers to access hidden information using new methods of concealment. Such as the introducing a complex algorithms, use a random methods and invent more complicated and difficult steps. This paper presents a new method of hiding information within the image. This method creates a new sequence of mysterious and difficult steps by dividing the secret text on all image and random distributing of bits to each row. Then using a special reverse method to hide the bits in that row. The LSB method has also been developed to make it more difficult to hide the pixel. The results presented illustrate the strength and security of the method and provide greater protection for hidden information. Also, the result illustrate the quality of the stego image compared with the original image using PSNR and SSIM quality measures.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
ABSTRACT. This research discussed about the data hiding information using steganography and cryptography. New method are discussed to secure data without change the quality of image as cover medium. Steganographic method is used by find the similarity bit of the message with bit of the MSB (Most Significant Bit) image cover. Finding of similarity process is done by divide and conquer method.The results are bit indexposition, thenthenencrypted using cryptographic. In this paper we using DES (Data Encryption Standard) algorithm. We use data information as message, images, and key as an input. Then, we use our method to secure message. The output is encrypted bit index which containt data hiding information and can be used to secure the messages. To reconstruct the contents, we require the same image and same key. Outcomes of our method can be used to secure the data. The advantages of this method are the capacity of stored data hiding of messages can be larger than the image. The image quality will not change and the capacity of stored messages can be larger than the image. Acoording to the research, both gray scale and colorful images can be used as image cover, except the image contains 100% black and 100% white. Bit matching process on image which have much variety of color takes less time. The damage of messages due to the addition of “salt and pepper” noise starts from 0.00049 of MSE.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
In this paper, a new technique that hides a secret text inside a speech signal without any apparent noise is presented. The technique for encoding the secret text is through first scrambling the text using Chaotic Map, then encoding the scraped text using the Zaslavsky map, and finally hiding the text by breaking the speech signal into blocks and using only half of each block with the LSB, K-means algorithms. The measures (SNR, PSNR, Correlation, SSIM, and MSE) are used on various speech files (“.WAV”), and various secret texts. We observed that the suggested technique offers high security (SNR, PSNR, Correlation, and SSIM) of an encrypted text with low error (MSE). This indicates that the noise level in the speech signal is very low and the speech purity is high, so the suggested method is effective for embedding encrypted text into speech files.
Handwriting identification using deep convolutional neural network methodTELKOMNIKA JOURNAL
Handwriting is a unique thing that produced differently for each person. Handwriting has a characteristic that remain the same with single writer, so a handwriting can be used as a variable in biometric systems. Each person have a different form of handwriting style but with a small possibility that same characters have something commons. We propose a handwriting identification method using sentence segmented handwriting forms. Sentence form is used to get more complete handwriting characteristics than using a single characters or words. Dataset used is divided into three categories of images, binary, grayscale, and inverted binary. All datasets have same image with different in color and consist of 100 class. Transfer learning used in this paper are pre-trained model VGG19. Training was conducted in 100 epochs. Highest result is grayscale images with genuince acceptance rate of 92.3% and equal error rate of 7.7%.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other essages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a iphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
Cloud computing is a powerful, flexible, cost
efficient platform for providing consumer IT services
over the Internet. However Cloud Computing has
various level of risk because most important
information is maintained and managed by third party
vendors, which means harder to maintain security for
user’s data .Steganography is one of the ways to provide
security for secret data by inserting in an image or
video. In this most of the algorithms are based on the
Least Significant Bit (LSB), but the hackers easily
detects it embeds directly. An Efficient and secure
method of embedding secret message-extracting
message into or from color image using Artificial
Neural Network will be proposed. The proposed
method will be tested, implemented and analyzed for
various color images of different sizes and different
sizes of secret messages. The performance of the
algorithm will be analyzed by calculating various
parameters like PSNR, MSE and the results are good
compared to existing algorithms.
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
ABSTRACT. This research discussed about the data hiding information using steganography and cryptography. New method are discussed to secure data without change the quality of image as cover medium. Steganographic method is used by find the similarity bit of the message with bit of the MSB (Most Significant Bit) image cover. Finding of similarity process is done by divide and conquer method.The results are bit indexposition, thenthenencrypted using cryptographic. In this paper we using DES (Data Encryption Standard) algorithm. We use data information as message, images, and key as an input. Then, we use our method to secure message. The output is encrypted bit index which containt data hiding information and can be used to secure the messages. To reconstruct the contents, we require the same image and same key. Outcomes of our method can be used to secure the data. The advantages of this method are the capacity of stored data hiding of messages can be larger than the image. The image quality will not change and the capacity of stored messages can be larger than the image. Acoording to the research, both gray scale and colorful images can be used as image cover, except the image contains 100% black and 100% white. Bit matching process on image which have much variety of color takes less time. The damage of messages due to the addition of “salt and pepper” noise starts from 0.00049 of MSE.
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
A number of techniques are there to converse securely. Encryption and cryptography are enabling us to have a secure conversation. To protect privacy and communicate in an undetectable way it is required to use some steganography technique. This is to hide messages in some other media generally called cover object. In todays digital world where images are a common means of information sharing, most of the steganography techniques use digital images as a carrier for hiding message. In this paper a LSB based technique is proposed for steganograpgy. This technique is different from standard LSB technique that along with message hidden in LSB bits a part of message also resides at other selective bits using a key. The method is developed to increase the payload capacity and make detection impossible.
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
In this paper, a new technique that hides a secret text inside a speech signal without any apparent noise is presented. The technique for encoding the secret text is through first scrambling the text using Chaotic Map, then encoding the scraped text using the Zaslavsky map, and finally hiding the text by breaking the speech signal into blocks and using only half of each block with the LSB, K-means algorithms. The measures (SNR, PSNR, Correlation, SSIM, and MSE) are used on various speech files (“.WAV”), and various secret texts. We observed that the suggested technique offers high security (SNR, PSNR, Correlation, and SSIM) of an encrypted text with low error (MSE). This indicates that the noise level in the speech signal is very low and the speech purity is high, so the suggested method is effective for embedding encrypted text into speech files.
Handwriting identification using deep convolutional neural network methodTELKOMNIKA JOURNAL
Handwriting is a unique thing that produced differently for each person. Handwriting has a characteristic that remain the same with single writer, so a handwriting can be used as a variable in biometric systems. Each person have a different form of handwriting style but with a small possibility that same characters have something commons. We propose a handwriting identification method using sentence segmented handwriting forms. Sentence form is used to get more complete handwriting characteristics than using a single characters or words. Dataset used is divided into three categories of images, binary, grayscale, and inverted binary. All datasets have same image with different in color and consist of 100 class. Transfer learning used in this paper are pre-trained model VGG19. Training was conducted in 100 epochs. Highest result is grayscale images with genuince acceptance rate of 92.3% and equal error rate of 7.7%.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
Steganography is the art of hiding a digital media with another digital media, it is very important to transmit a secret data from place to another because if any one intercept the data during the transmission he can't know if there is a data a data or not. This paper shows a new method to hide a secret data in an image without any bit change of the stego image that means the PSNR value between the original image and stego image equal to Infinity. The size of the secret message that can be hidden in the image is infinity or unlimited. This method based on generating a dynamic symmetric key between the sender and the receiver, it is used for encoding and decoding process and it is derived from the image and the secret message together.
Enhanced Secret Communication Using Multilevel Audio Steganographyijceronline
The paper presents multilevel audio Steganography, which describes a new model for hidden communication in secret communication technology. In multilevel Steganography, at least two embedding methods are used in such a way that the second method will use the first method as a carrier. This approach has several potential benefits in hidden communication. It can be used to increase the level of security while transmitting the confidential information over public channels or internet. It can also be used to provide two or more information hiding solutions simultaneously. Another important advantage is that the lower-level embedding / extracting method and upper-level embedding / extracting method are interrelated in terms of functionality and this makes the hidden communication harder to detect. If the cover object is decoded by any adversary, he/she only obtains a decoy message or a partial message. The performance of the proposed scheme in terms of imperceptibility, capacity & security is measured through different experiments and results are included in this paper
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Image to Image Encoder using Least Significant BitYogeshIJTSRD
The purpose of “Image to Image Encoder†is to hide an image inside another image. Using the LSB method, which facilitates data hiding in an image. It works with JPEG and PNG formats for the cover image and always creates tiff encoded image due to its compression. Least Significant Bit Embeddings LSB are the general steganographic procedure that might be utilized to install information into a variety of digital media, the most studied applications are utilizing LSB embedding to hide one picture inside another. The security to keep up secrecy of message is accomplished by making it infeasible for a third individual to distinguish and recover the secret message. This method can be used in various fields for data security like for secret communication and data transfer via networks, for storing and transferring sensitive data and information in the defense sector. As the normal viewers can not identify the slight difference in the encoded image without the reference of the original cover image, this method ensures more security than cryptographic methods. Samthomas Raphael | Dr. Ganesh D "Image to Image Encoder using Least Significant Bit" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41253.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41253/image-to-image-encoder-using-least-significant-bit/samthomas-raphael
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Data Hiding Using Green Channel as Pixel Value IndicatorCSCJournals
Steganography is an art of hiding the existence of data that is it hides the secret message in the digital cover medium. This paper introduces an improved algorithm that uses pixel value indicator technique for the concealment of the secret message in most significant bits (MSBs) of the cover image. Here, Green channel serves as a pixel value indicator for hiding the secret message in 5th and 6th bits of Blue channel or Red channel of RGB cover image. If Green channel has even number of 1's, Blue channel is used for embedding the secret message otherwise Red channel is used for the embedding process. The experimental results of the proposed method are obtained using MATLAB R2017a. The experimental results obtained show that the stego-image formed is of great quality having high PSNR value and it provides good security and in distinguishability.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show an improvement in the Mean squared error (MSE) and Peak Signal to Noise Ratio (PSNR) values of the proposed technique over the base technique of hash based 3-3-2 LSB insertion.
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
Steganography is the art of hiding a digital media with another digital media, it is very important to transmit a secret data from place to another because if any one intercept the data during the transmission he can't know if there is a data a data or not. This paper shows a new method to hide a secret data in an image without any bit change of the stego image that means the PSNR value between the original image and stego image equal to Infinity. The size of the secret message that can be hidden in the image is infinity or unlimited. This method based on generating a dynamic symmetric key between the sender and the receiver, it is used for encoding and decoding process and it is derived from the image and the secret message together.
Enhanced Secret Communication Using Multilevel Audio Steganographyijceronline
The paper presents multilevel audio Steganography, which describes a new model for hidden communication in secret communication technology. In multilevel Steganography, at least two embedding methods are used in such a way that the second method will use the first method as a carrier. This approach has several potential benefits in hidden communication. It can be used to increase the level of security while transmitting the confidential information over public channels or internet. It can also be used to provide two or more information hiding solutions simultaneously. Another important advantage is that the lower-level embedding / extracting method and upper-level embedding / extracting method are interrelated in terms of functionality and this makes the hidden communication harder to detect. If the cover object is decoded by any adversary, he/she only obtains a decoy message or a partial message. The performance of the proposed scheme in terms of imperceptibility, capacity & security is measured through different experiments and results are included in this paper
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
In today’s scenario security of data is a very big challenge in any communication. The Digital Image Steganography is the science of hiding sensitive information in another transmission medium to achieve secure and secret communication.
The main motive of steganography is to hide the existence of communication.
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
An LSB Method Of Image Steganographic TechniquesIJERA Editor
The art of information hiding has received much attention in the recent years as security of information has become a big concern in this internet era. As sharing of sensitive information via a common communication channel has become inevitable. Steganography means hiding a secret message (the embedded message) within a larger one (source cover) in such a way that an observer cannot detect the presence of contents of the hidden message [1]. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet [2]. This paper intends to give an overview of image Steganography, its uses and techniques. It also attempts to identify the requirements of a good Steganography algorithm and briefly reflects on which Steganography techniques are more suitable for which applications.
Implementation of image steganography using lab viewIJARIIT
Steganography is the one of the technique to hide secret messages within a larger one in such way that someone can
not know the presence or contents of the hidden message. The purpose of Steganography is to maintain secret communication
between two parties. This paper presents the implementation of a highly secured data hiding technique called Steganography.
This technique is applicable for image data type. The main aim of this technique is to encode the data image within the cover
image such that the data image's existence is concealed. Here we use the data as an image for Steganography. It deals with the
encoding data image information in a given image (called cover image) without making any visible changes to it. LabVIEW
graphical programming environment is a tool for realizing the image acquisition and processing. This software has several
advantages: simple implementation, modularity, flexibility, attractive user interface and the possibility to develop very easy new
features.
Image to Image Encoder using Least Significant BitYogeshIJTSRD
The purpose of “Image to Image Encoder†is to hide an image inside another image. Using the LSB method, which facilitates data hiding in an image. It works with JPEG and PNG formats for the cover image and always creates tiff encoded image due to its compression. Least Significant Bit Embeddings LSB are the general steganographic procedure that might be utilized to install information into a variety of digital media, the most studied applications are utilizing LSB embedding to hide one picture inside another. The security to keep up secrecy of message is accomplished by making it infeasible for a third individual to distinguish and recover the secret message. This method can be used in various fields for data security like for secret communication and data transfer via networks, for storing and transferring sensitive data and information in the defense sector. As the normal viewers can not identify the slight difference in the encoded image without the reference of the original cover image, this method ensures more security than cryptographic methods. Samthomas Raphael | Dr. Ganesh D "Image to Image Encoder using Least Significant Bit" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41253.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/41253/image-to-image-encoder-using-least-significant-bit/samthomas-raphael
This paper proposes an approach to implement public key algorithm in Steganography. Here, in this paper, Public key algorithm is used based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Data Hiding Using Green Channel as Pixel Value IndicatorCSCJournals
Steganography is an art of hiding the existence of data that is it hides the secret message in the digital cover medium. This paper introduces an improved algorithm that uses pixel value indicator technique for the concealment of the secret message in most significant bits (MSBs) of the cover image. Here, Green channel serves as a pixel value indicator for hiding the secret message in 5th and 6th bits of Blue channel or Red channel of RGB cover image. If Green channel has even number of 1's, Blue channel is used for embedding the secret message otherwise Red channel is used for the embedding process. The experimental results of the proposed method are obtained using MATLAB R2017a. The experimental results obtained show that the stego-image formed is of great quality having high PSNR value and it provides good security and in distinguishability.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
Recent research has demonstrated the effectiveness of utilizing neural networks for detect tampering in images. However, because accessing a database is complex, which is needed in the classification process to detect tampering, reference-free steganalysis attracted attention. In recent work, an approach for least significant bit (LSB) steganalysis has been presented based on analyzing the derivatives of the histogram correlation. In this paper, we further examine this strategy for other steganographic methods. Detecting image tampering in the spatial domain, such as image steganography. It is found that the above approach could be applied successfully to other kinds of steganography with different orders of histogram-correlation derivatives. Also, the limits of the ratio stego-image to cover are considered, where very small ratios can escape this detection method unless modified.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
Hide text depending on the three channels of pixels in color images using the...IJECEIAES
At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results.
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
Image steganography is an art of hiding images
secretly within another image. There are several ways of
performing image steganography; one among them is the
spatial approach. The most popular spatial domain approach
of image steganography is the Least Significant Bit (LSB)
method, which hides the secret image pixel information in the
LSB of the cover image pixel information. In this paper a
LSB based steganography approach is used to design
hardware architecture for the Image steganography. The
Discrete Wavelet Transform (DWT) is used here to transform
the cover image into higher and lower wavelet coefficients
and use these coefficients in hiding the secret image. the
design also includes encryption of secret image data, to
provide a higher level of security to the secret image. The
steganography system involving the stegno module and a
decode module is designed here. The design was simulated,
synthesized and implemented on Artix -7 FPGA. The
operation hiding and retrieving images was successfully
verified through simulations.
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. The proposed method uses cryptographic and steganographic techniques to encrypt the data as well as hide the encrypted data in another medium so the fact, that a message being sent is concealed. The image is concealed by converting it into a ciphertext using SDES algorithm with a secret key,which is also an image, and sent to the receiving end securely.
The Internet is the essential wellspring of data in the present life where it offers the trade of data to the
clients.The exchange of such data prompts an incredible security danger. Cryptography and steganography
are two issues in security systems.Cryptography jumbles the message to be incomprehensible While
Steganography shroud the message To be invisible. Therefore, Encryption any private data before
concealing in the cover object will provide twofold security. This paper presents a technique for disguise
message with four levels of security where the message first encrypt using modifying vernam cipher, in
which the initial key originate automatically from random pixel of camouflage cover and alter continuously
along message length then embedded cipher message in grayscale cover image, after that encrypt this
cover using modifying vernam cipher also then embedded it in RGB color cover image. The simulation
consequence illustrates that the scheme provides better protection.
Similar to Text in Image Hiding using Developed LSB and Random Method (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097
2092
Figure 1. Basic concepts and behavior of steganography
The steganography includes to main steps there are hiding and the extracting information. In the
hidding step, the secret text will be embedded in a selected location i nthe cover image based on a suitable
steganography method. Then, the resulting stego-image is sent to the receiver. In the extracting step, the
receiver applying the extraction function to recovery the secret text [12].
Steganography differs from cryptography in the sense that where cryptography concentrates on
keeping the substance of a message mystery, steganography concentrates on keeping the presence of a
message mystery [3], [4]. There are many techniques related to steganography is fingerprinting. In
fingerprinting unique marks are embedded in distinct copies of the carrier object that are supplied to different
customers [6].
The output image is called stego-image that is similar to the cover media. This stego-image is then
sent to the receiver where the receiver retrieves the hidden message by implementing a de-steganography
process. A stego-key is used for an embedding or encoding process to limit unraveling or extraction of the
embedded data in cover media [5].
The stego-key depending on random generation uses a specific kernel in order to send it to the
recipient to generate the same key in order to retrieve the hidden data and data is embedded in a cover image
using LSB method. Least-Significant-Bit (LSB) is one of the popular and frequently used steganography
techniques to conceal a mystery message in a digital medium [7].
The method recommended in this paper is used a random key generator method for improvement in
robust and security of steganography. The random number generator locates the hiding positions in the cover
image in each row separately and each row will hide the same number of bits of secret text. That’s by
dividing the secret text on all the rows of the cover image. specific method for hiding bits in each pixel will
be used.
2. RELATED WORKS
In a steganography field, there are many researchers using a random number generation method
combined with another technique for hiding information in image. Obaida M. and Awad A. introduced that
the secret text bits are inserted into the cover image pixels randomly. Whereas, inserting of secret text bits
into the cover image will be in any bit of the pixel randomly by comparing the message bit with the pixel bit
that chosen randomly from the second to the last bit. The least significant bit of the pixel will be 1 if the
comparison result is matched. And the least significant bit of the pixel will be 0 if the comparison result
is not [3].
Babita el al used a random key generating method to encrypt the secret message using XOR method
then embedding the cipher message into an image of RGB format in a special arrangement. The resulted
RGB image converted into the bitmap file format [9]. Balvinder el al. encrypted the secret text using XOR
encryption method using 8-bit random key. Then, applied XOR operation between one bit of 8-bit random
key and 2nd LSB of cover image pixel. If the XOR result of above operation is 1 then hide one bit of the
secret key into LSB of same pixel of cover image. Otherwise, there is no hiding in any bit in that pixel. The
Extracted secret
message
Secret
message
Cover Image
Steganography
schema
Extraction
message schema
decoder
Secret Key
Stego Image
Communication
channel
3. Int J Elec & Comp Eng ISSN: 2088-8708
Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood)
2093
substitution process will be continued depending on the length of encrypted message. The random key hidden
in the same first byte of cover image [10].
Noor K. hidden information by generate the secret key using LFSR method then encrypted the
secret message using AES method. The encrypted message distributed over the cover image pixels using
permutation technique. Then hide the bits of the encrypted message in cover image in the randomly selected
pixels [11]. Ashwini and komal provided sequential encoding and random encoding ways for embedding the
secret data inside cover image. Sequential encoding used one key entered by user and sequentially selected
the pixel for embedding cipher text obtained by XORing the secret message with key provided by user. In
random encoding two keys are provided by the user ,one is to lock the function on receiver side and other for
to carry out encryption. In this case pixels are selected randomly for embedding secret data i.e either text or
image using random number generator which automatically implements link list concept [1].
The technique that used by Rupali B. and Vaishali S. included three main steps. That's by found
complementing of the secret text. Then, hiding the complemented text in cover image pixels using pseudo
random number generator, finally, hide the bits of complemented text in each pixel using the inverted bit
LSB method [5]. Meenakshi S. and et al introduced an RGB image embedding method based on sixteen-
pixel differencing with n-bit Least Significant Bit (LSB) substitution. In their method, the image is divided
into 4×4 non intersecting blocks then and calculate the average difference value in each block. Based on the
resulted value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-
middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for
lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used [13]. In this
paper, a new method is proposed for hiding secret text in image depending on the generation of random
number and developed LSB method using a simple hash function.
3. THE PROPOSED METHOD
This paper introduces a new proposed method to hide a secret text in gray image using random
technique with a secret key and simple hash function. The allocation of the secret text into the image depends
on the length of secret text. Where, the secret text will be divided on all rows of image in equal manner
excepted the last row, that need to hide additional information. In each row, there is a fixed number of
columns that needs to hide a secret text bits, that’s chosen randomly. The hiding of bit in column depends on
a special schema. Flow chart in Figure 2 shows the sequence of the method.
Figure 2. Proposed method processed stages
The proposed method steps depicted in the following:
Step 1 (Convert the secret text to the one binary stream): The secret text is a string consisting of
letters, spaces and special characters. Each character in secret string converts to seven bits. When merge all
the characters, we will have one stream of binary bits. For example: If the secret text is "To", when
converting it to binary and combining the two letters, the resulting string will be "10101001101111".
Step 2 (Distribute the secret text on the cover image): The secret text is distributed on cover image
evenly across all rows except the last one. This is done by dividing the number of secret text bits on the
number of image rows. This is computed as in Equation (1).
no_col = no_textbits / (no_row-1) (1)
Convert the secret
text to the one binary
stream
Distribute the secret text
on the cover image using
a random schema
Hide secret text bits
in each row in
reverse manner
Hide secret text bits in
selected column using
simple hash function
Input secret
text
Input cover
image
Output stego
image
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097
2094
Where no_row represents the number of image's rows, no_col represents the number of columns that needed
to hide the secret stream in each row. And no_textbits denotes to the length of binary string of secret text.
Step 3 (Determine the random columns locations in each row): In each row, we used a pseudo
random number generator to determine the location of columns that need to hide the secret text in each row.
This is done by the following:
Step 3-1 Create a seed to generate a random numbers. And to more security, this seed is created
using shuffle function. This seed will represent part of the secret key that will hide in last row of the image
and sent to the receiver. Step 3-2 For each row, generate a no_col of columns randomly within a certain
range and without duplicating in that row:
Flag=false;
while~Flage
R=ceil(n*rand(no_col,1))
Flage=numel(unique(R))= =no_col
End
Where, R represents the resulted array that's contains the columns' indexes. ceil is a function rounds the
elements of A to the nearest integers greater than or equal to A, and n refer to the total number of columns in
cover image. rand refers to random generation function. numel represents a function returns the array
elements number. unique is a function that’s delete the duplicating in array.
Step 4 (Hide one bit in each pixels have location x,y) Where x represents the current row, and y
represents the column that is selected randomly. This hiding method will be in reverse manner for the current
row. For example, if the number of columns allocated for each row is 10 columns, then there are 10 bits of
secret text that would be hidden in each row. Where, the tenth bit will hide in the first column and the ninth
bit will hide in the second column and so on.
Step 5 Each pixel have 8 bits. To hide one bit in one pixel, we will use the updated LSB method
that’s including a simple hash function. This method includes hiding a bit in one of the less three significance
bits in the current pixel. The chosen among the three bits done using a simple hash function that used mod
operation for the index of the current random selected column. As depicted in Equation (2).
x = len_pxl – (col_indx mod 3) (2)
Where, x represent the location of hiding the bit in the pixel, len_pxl depicted to the length of pixel that will
be 8 bits, col_indx denoted to the index of the current random selected column. If the resulted x is equal to
0, 1 or 2, then the bit will hide in the eighth, seventh or sixth bit of the pixel, respectively. The following
example illustrates the above steps of our method in details.
Let's the secret text have 700 characters. When converting it to binary, each character will convert
to 7 bits. That means, the length of secret text in binary will be 7* 700=4900 bits. For the cover image with
size 512*512 pixel, each row will contain number of bits of secret text computed as following: no_col=floor
(4900/(512-1))+1=10 bits of the secret text hidden in each row of the cover image. Where floor(A) rounds
the elements of A to the nearest integers less than or equal to A.
Now, we use the random function to generate 10 columns' indexes in range (1-512). First, generate
the start random seed using shuffle function for example: seed=1897039246. This seed will be considered as
secret key that's sent to receiver by hiding it in the last row of cover image using LSB method. The receiver
will use this seed to generate the same sequences of random numbers to get the secret text. Then, generate 10
column indexes in range (1-512) for each row in cover image except the last one using step (3-2). When
n=512, no_col=10, the first 10 columns indexes generated in our example will be:
165 363 233 335 105 138 199 420 63 418
If the first 10 bits in secret text are: 1010100110, then the hiding of these bits in the first row and random
selected columns will be in reverse manner as:
That means the 10th secret bit will hide in the 166th column and the 9th bit will hide in 363th column,
and so on. Now, we determined the pixel(row, column) from cover image for each bit in secret text. To hide
the 10th bit (0) in the pixel(1,166), we use mod operation as a simple hash function as in step (3-4) to find the
index of hiding the secret bit in the pixel bits. If that index (x) is computed as:
x = len_pxl-(col_indx mod 3) x=8-(166 mod 3)=7
5. Int J Elec & Comp Eng ISSN: 2088-8708
Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood)
2095
Then, the 10th secret bit (0) will hide in the 7th bit of the pixel (1,166). If the gray color of the pixel
(1,166)= 0 1 0 1 0 0 1 1, then the 7th bit of the pixel (1) will be replaced by the 10th secret bit (0) of the
secret text. The result of the pixel (1,166)=0 1 0 1 0 0 0 1.
When the stego image arrives to the receiver, the receiver will be extracted the secret text by
applying the same hiding steps. In the following, the steps of extraction the secret text:
Step 1: Extraction of the seed random generation and length of the secret text. First the receiver must extract
the seed of generate the random sequence and also extract the length of secret text that hide in the last row
of the stego image using LSB traditional method.
Step 2: Find the number of columns that used to hide the secret text bits using Equation (1).
Step 3: Generate a random locations for the number of columns in each row. That’s done using a pseudo
random generation method started using the seed that extracted in step 1.
Step 4: Extraction of secret text bits. To extract the secret text bits, we use the same method to hide these bits
in image. Where, the first bit will be extracted from the last random column and the second bit will be
extracted from the second last random column and so on. To extract the bit from the pixel, we use the mod
operation using Equation (2).
Step 5: Convert the secret text bits to characters. The extracted secret text is one sequence of binary bits.
To covert the secret text from binary to characters, each seven bits will convert to one character.
4. RESULTS
The proposed method used an efficient and secure schema to hide secret text in image. This section
illustrates the results of applying the proposed method to hide different secret text size on different images
and measure the accuracy of the resulted images using PSNR and SSIM measurements that’s describes in
Equation (3) and Equation (4), respectively.
[
∑ ∑
] (3)
Where indicated to the strego image pixels and indicated to the cover image values. M and N is the
image size.
( ) ( ) (4)
Where µ denoted to the mean of the (m, n) window. are indicated to the standard deviation of (m, n)
window. Figure 3, Figure 4 and Figure 5 illustrated the effect of the proposed method on 512x512 Goldhill,
Boat and Lena images when hiding a secret text with size 4900, 14700 and 24500 bits, respectively.
(a) The original goldhill image (b) The stego image
Figure 3. Hiding a secret text with size 4900 bits in 512x512 Goldhill image
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2091 – 2097
2096
(a) The original boat image (b) The stego image
Figure 4. Hiding a secret text with size 14700 bits in 512x512 Boat image
(a) The original lina image (b) The stego image
Figure 5. Hiding a secret text with size 24500 bits in 512x512 Lina image
Table 1 shows the illustrated the results of PSNR and SSIM measurements when applying the proposed
method on different images and different size of secret text.
Table 1. Illustrated the results of PSNR and SSIM measurements when applying the proposed method on
different images and different size of secret text
Cover image
512x512
Secret text 4900 bits Secret text 14700 bits Secret text 24500 bits
PSNR SSIM PSNR SSIM PSNR SSIM
Goldhill 60.0489 0.99966 55.2512 0.99896 52.9806 0.998234
Boat 60.0056 0.999513 55.2738 0.998554 52.9859 0.997577
Lena 60.0299 0.999444 55.197 0.998328 52.9817 0.997242
5. COCLUSIONS
The main objective of developing methods of information concealment is to increase the security of
these roads and to protect information from detection by attackers. The more complex the method of
concealment and the more steps followed, the more cynical the method and harder for the attackers to break
it and access to hidden information. This search uses more than one technique to increase security of
concealment and to strengthen the protection of hidden information. Where the method of random generation
in the selection of pixels in each row of the image in which we hide the secret text. Reverse inversion of bits
of secret text was used in each row. It also used an improved LSB method which hid the bit of the secret text
in three less important bits. And selects the bit in which we will hide the random numbers generated earlier.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Text in Image Hiding using Developed LSB and Random Method (Elaf Ali Abbood)
2097
These steps increase the security of the method and give good results in terms of measuring the impact of the
image after the concealment compared to the original image.
REFERENCES
[1] Ashwini B. and Komal B., “Hybrid Approach for Embedding Text or Image in Cover Images”, International
Journal of Innovative Research in Science, Engineering and Technology, vol. 5, no. 5, 2016.
[2] Yang Ren-er and et al, “Image Steganography Combined with DES Encryption Pre-processing”, Sixth
International Conference on Measuring Technology and Mechatronics Automation, pp. 323-326, 2014.
[3] Obaida Mohammad Awad Al-Hazaimeh, “Hiding Data in Images Using New Random Technique”, International
Journal of Computer Science Issues, vol. 9, 2012.
[4] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, 2001.
[5] Rupali Bhardwaj and Vaishali Sharma,” Image Steganography Based on Complemented Message and Inverted bit
LSB Substitution”, 6th International Conference on Advances In Computing & Communications, 2016.
[6] M.A.Wakure and S.A.Wakure, “A Digital Image Steganography”, International Journal of Computer Science
Trends and Technology (IJCST), vol. 5, no. 2, 2017.
[7] Ebrahim Alrashed and Suood Suood Alroomi, “Hungarian-Puzzled Text with Dynamic Quadratic Embedding
Steganography”, vol. 7, no. 2, 2017.
[8] Reihane Saniei and Karim Faez, “The Security of Arithmetic Compression Based Text Steganography Method”,
International Journal of Electrical and Computer Engineering, vol. 3, no. 6, pp. 797-804, 2013.
[9] Babita1 and el al, “An Approach to Improve Image Steganography using Random Key Generation Method",
International Journal of Information and Computation Technology, vol. 3, no. 4 , pp. 235-240, 2013.
[10] Balvinder Singh and el al, “A Steganography Algorithm for Hiding Secret Message inside Image using Random
Key”, International Journal of Engineering Research & Technology, vol. 3, no. 12, 2014.
[11] Noor Kareem Jumaa, “Hiding of Random Permutated Encrypted Text using LSB Steganography with Random
Pixels Generator”, International Journal of Computer Applications, vol. 113, no. 13, 2015.
[12] Mojtaba B. and Karim F., “An Adaptive Steganography Scheme Based on Visual Quality and Embedding Capacity
Improvement”, International Journal of Electrical and Computer Engineering (IJECE), vol. 4, no. 4, pp. 573-584,
August 2014.
[13] Meenakshi S Arya, Meenu Rani, Charndeep Singh Bedi, “Improved Capacity Image Steganography Algorithm
using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images”, International Journal of Electrical and
Computer Engineering (IJECE), vol. 6, no. 6, pp. 2735-2741, December 2016.