Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with
cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are some of the security measures applied in the cloud to secure user data. The objective of steganography is to hide the existence of communication from the unintended users whereas cryptography does provide security to user data to be transferred in the cloud. Since users pay for
the services utilize in the cloud, the need to evaluate the performance of the algorithms used in the cloud to
secure user data in order to know the resource consumed by such algorithms such as storage memory, network bandwidth, computing power, encryption and decryption time becomes imperative. In this work, we implemented and evaluated the performance of Text steganography and RSA algorithm and Image steganography and RSA as Digital signature considering four test cases. The simulation results show that, image steganography with RSA as digital signature performs better than text steganography and RSA algorithm. The performance differences between the two algorithms are 10.76, 9.93, 10.53 and 10.53 seconds for encryption time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45 kwh for processing power used when hiding and extracting data respectively. Except in test case2 where Text steganography and RSA algorithm perform better than Image Steganography and RSA as Digital Signature in terms of memory used when extracting data with performance difference of -5.09 mb because of the bit size of the image data when extracted. This research work recommend the use of image steganography and RSA as digital signature to cloud service providers and users since it can secure major data types such as text, image, audio and video used in the cloud and consume less system resources.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
Over the past decades, research in security has concentrated on the development of algorithms and protocols for authentication, encryption and integrity of data. Despite tremendous advances, several security problems still afflict system’s. In this android app watermarking and encryption is being applied on images and data. Because of the human visual system’s low sensitivity to small changes and the high flexibility of digital media, anyone can easily make small changes in digital data with low perceptibility. Here watermarking and encryption are being performed in wavelet domain. Here in watermarking, the coefficients of watermarks are being embedded with the coefficients of the original image. Encryption is being done in wavelet domain so that the probability of an intruder trying to access the contents is very much minimized. Thus, this model provides a high level of security.
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with
cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are some of the security measures applied in the cloud to secure user data. The objective of steganography is to hide the existence of communication from the unintended users whereas cryptography does provide security to user data to be transferred in the cloud. Since users pay for
the services utilize in the cloud, the need to evaluate the performance of the algorithms used in the cloud to
secure user data in order to know the resource consumed by such algorithms such as storage memory, network bandwidth, computing power, encryption and decryption time becomes imperative. In this work, we implemented and evaluated the performance of Text steganography and RSA algorithm and Image steganography and RSA as Digital signature considering four test cases. The simulation results show that, image steganography with RSA as digital signature performs better than text steganography and RSA algorithm. The performance differences between the two algorithms are 10.76, 9.93, 10.53 and 10.53 seconds for encryption time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45 kwh for processing power used when hiding and extracting data respectively. Except in test case2 where Text steganography and RSA algorithm perform better than Image Steganography and RSA as Digital Signature in terms of memory used when extracting data with performance difference of -5.09 mb because of the bit size of the image data when extracted. This research work recommend the use of image steganography and RSA as digital signature to cloud service providers and users since it can secure major data types such as text, image, audio and video used in the cloud and consume less system resources.
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
Digital steganography is the art and science of hiding communications; a steganographic system thus embeds secret data in public cover media so as not to arouse an eavesdropper’s suspicion. A steganographic system has two main aspects: steganographic capacity and imperceptibility. However, these two characteristics are at odds with each other. Furthermore, it is quite difficult to increase the steganographic capacity and simultaneously maintain the imperceptibility of a steganographic system. Additionally, there are still very limited methods of Steganography to be used with communication protocols, which represent unconventional but promising Steganography mediums. Digital image Steganography, as a method of secret communication, aims to convey a large amount of secret data, relatively to the size of cover image, between communicating parties. Additionally, it aims to avoid the suspicion of non-communicating parties to this kind of communication. Thus, this research addresses and proposes some methods to improve these fundamental aspects of digital image Steganography. Hence, some characteristics and properties of digital images have been employed to increase the steganographic capacity and enhance the stego image quality (imperceptibility). Here, the research aim is identified based on the established definition of the research problem and motivations. Unlike encryption, Steganography hides the very existence of secret information rather than hiding its meaning only. Image based Steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. To get a high steganographic capacity, novel Steganography methods were proposed. The first method was based on using 8x8 non-overlapping blocks and quantization table for DCT with compression. Second method incorporates the DWT technique, with quality of any stego images as enhanced to get correct hidden image. And last LSB as to store images with Key type security built in.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
- Steganography is the art and science of invisible communication as it hides the information message
inside cover image In This paper the cover image is decomposed using multilevel wavelet transform and theses
wavelet coefficients are statistically weighted according to their perceptual importance (CSF weights) to identify
the regions of interest for the embedding. The hiding image is encrypted using secret key based on wavelet
coefficients on the last approximation level. Then the encrypted watermark is embedded using CSF weights in
the wavelet domain into the cover image. Experimental results denote the feasibility of the proposed method as
the stego images has high PSNR and subjective quality which declare that the algorithm gains a good
performance in transparency and robustness against noise attacks.
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
Data exchange and data publishing are becoming an important part of business and academic practices.
Data owners need to maintain the rights over the datasets they share. A right-protection mechanism can be
provided for the ownership of shared data, without revealing its usage under a wide range of machine
learning and mining. In the approach provide two algorithms: the Nearest-Neighbors (NN) and determiner
preserves the Minimum Spanning Tree (MST). The K-NN protocol guarantees that relations between object
remain unaltered. The algorithms preserve the both right protection and utility preservation. The rightprotection
scheme is based on watermarking. Watermarking methodology preserves the distance
relationships.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
Gowtham.T ,Pradeep Kumar.G " Security Based Data Transfer and Privacy Storage through Watermark Detection ", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net .published by Fast Track Publications
Abstract
Digital watermarking has been proposed as a technology to ensure copyright protection by embedding an imperceptible, yet detectable signal in visual multimedia content such as images or video. In every field key aspect is the security Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service. Several attempts has been made for increasing the security related works and avoidance of data loss. Existing system had attain its solution up to its level where it can be further able to attain the parameter refinement. In this paper improvising factor been made on the successive compressive sensing reconstruction part and Peak Signal-to-Noise Ratio (PSNR).Another consideration factor is to increase (CS) rate through de-emphasize the effect of predictive variables that become uncorrelated with the measurement data which eliminates the need of (CS) reconstruction.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography are combined to encrypt the data as well as to hide the encrypted data in another medium so the fact that a message being sent is concealed. One of the methods shows how to secure the image by converting it into cipher text by S-DES algorithm using a secret key and conceal this text in another image by steganographic method. Another method shows a new way of hiding an image in another image by encrypting the image directly by S-DES algorithm using a key image and the data obtained is concealed in another image. The proposed method prevents the possibilities of steganalysis also.
Image steganography using least significant bit and secret map techniques IJECEIAES
In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
- Steganography is the art and science of invisible communication as it hides the information message
inside cover image In This paper the cover image is decomposed using multilevel wavelet transform and theses
wavelet coefficients are statistically weighted according to their perceptual importance (CSF weights) to identify
the regions of interest for the embedding. The hiding image is encrypted using secret key based on wavelet
coefficients on the last approximation level. Then the encrypted watermark is embedded using CSF weights in
the wavelet domain into the cover image. Experimental results denote the feasibility of the proposed method as
the stego images has high PSNR and subjective quality which declare that the algorithm gains a good
performance in transparency and robustness against noise attacks.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
This paper proposes a technique on data hiding approaches using compressed MPEG video files.
This approach hides the message bits by modulating the quantization scale of constant bit rate MPEG
videos. Payload is calculated for each macroblock and proposes to achieve one message bit per
macroblock. Macroblock level feature variables are calculated.To find the association between
macroblock level feature variables and value of a hidden message bit, a Second Order Multivariate
regression model is used. To achieve the very high prediction accuracy, the regression model is used by
the decoder. To decode the message, a feature variable of MBs from the encoded bit stream are computed
by the decoder and expands them to the second order and uses the model weights to predict the message
bits. This solution provides very high precision accuracy in predicting the message bits . The proposed
technique is analyzed in term of quality distortion, excessive bit rate, message pay load and message
extraction accuracy. The proposed solution is better in terms of message payload while causing the less
distortion and reduced compression overheads compare to the previous works.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible solution to this challenge as it has already been used for copyright protection, source tracking and video authentication. It also provides integrity protection, which is useful for many types of documents (official documents, medical images). In this paper, we propose a new watermarking solution applicable to images and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
Modelling, Conception and Simulation of a Digital Watermarking System based o...sipij
The digital revolution has increased the production and exchange of high-value documents between
institutions, businesses and the general public. In order to secure these exchanges, it is essential to
guarantee the authenticity, integrity and ownership of these documents. Digital watermarking is a possible
solution to this challenge as it has already been used for copyright protection, source tracking and video
authentication. It also provides integrity protection, which is useful for many types of documents (official
documents, medical images). In this paper, we propose a new watermarking solution applicable to images
and based on the hyperbolic geometry. Our new solution is based on existing work in the field of digital
watermarking.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Hiding data in images using steganography techniques with compression algorithmsTELKOMNIKA JOURNAL
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed to improve
security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for
double protection during data transmission. The selected steganographic algorithm is the use of a
combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very
important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed
method of DCT transformation first, proceed with DWT transformation. From the experimental results
obtained better imperceptibility quality, compared with existing methods. To add OTP message security
applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments
conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and
NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all
images is 1.
Similar to Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. TELKOMNIKA ISSN: 1693-6930
Using SVD and DWT Based Steganography to Enhance the Security… (Mandy Douglas)
1369
have been broadly classified depending upon the domain as spatial domain steganography and
frequency domain steganography. In Spatial domain steganography, methods such as
correlation based techniques and LSB substitution, which will be explained later, have been
developed and tested. Frequency domain steganography methods consist of many different
domains, such as Discrete Cosine Transform (DCT) domain, Discrete Fourier Transform (DFT)
domain, Discrete Wavelet Transform (DWT) domain, Singular Value Decomposition (SVD), etc.
These techniques are discussed in detail in later sections. Frequency domain methods are
considered to be more robust than that of spatial domain methods [6]. Frequency domain
methods have been used in combination with other techniques, this approach is known as
hybrid steganography. Many of these hybrid techniques make use of a mathematical
decomposition called the Singular Value Decomposition. SVD is considered to be one of the
most valuable numerical analysis tools available, mainly because singular values obtain
inherent algebraic properties and provide stability that permits secret data to be hidden without
degrading the perceptual quality of an image [7]. In this study, a wavelet based watermarking
algorithm is proposed to enhance the security of fingerprint images. The algorithm embeds
secret data into a fingerprint image based on Discrete Wavelet Transform (DWT) and Singular
Value Decomposition (SVD). The fingerprint image is first converted to the frequency domain
and the SVD is applied on both the original fingerprint image and the watermark image. The
singular values (SV’s) of the fingerprint image are then modified with the singular values (SV’s)
of the secret image.
2. A secure Fingerprint Recognition System
Data hiding algorithms are generally based on either substitution or quantisation
procedure, and pixel bits or coefficients are manipulated in order to conceal data. Research
shows that many frequency domain algorithms exceed that of the spatial domain. However,
spatial domain techniques do possess some advantages over frequency domains, for instance,
its large capacity to hide data. Nonetheless, the negative points of embedding in the spatial
domain, such as its poor robustness to attacks, outweigh the positive ones. Even though, the
majority of methods mentioned in the literature review suggest that frequency domain methods
are deemed a more appropriate method, disadvantages also exist. In frequency domain
embedding the capacity for hiding data is much less than that of the spatial domain. For
instance, using DWT as an example, and a bitmap image size 512x512, which is decomposed
at first level (i.e. LL, LH, HL, HH), the maximum message or watermark size would be 256x256.
Moreover if decomposed further (i.e. LL1, LH1, HL1, HH1), the maximum message or
watermark size would be 128x128. Furthermore, depending on how and where the data is
hidden, applying compression on the image may cause the hidden message or watermark to be
badly distorted or unreadable. When an image is compressed most of the energy stored in the
high frequency sub-bands are removed, so if a message or watermark is hidden in these sub
bands it may be lost. [8] proposed a method to exploit the wavelet domain by hiding information
(watermark image) in the sub-band coefficients of the mid frequency band of an image to
produce a stego image. Image quality tests carried out showed positive results. However, after
testing the algorithms robustness against jpeg compression, results proved disappointing.
Although the results against compression in [9] were unsatisfactory, it is important to note that
many other proposed methods based on wavelet embedding have shown encouraging
outcomes against compression attacks [9]. It is also important to highlight that loss of hidden
data may greatly depend upon where data is concealed in the first place. For example, the low
frequency sub-bands (LL) contain the majority of image energy which makes up an image,
therefore when compression is applied; most of this information is kept intact. So, if data is
embedded in low frequency sub-band the probability of it surviving compression is high.
Nevertheless, embedding in low sub-bands can degrade image quality and thus lead to
unwanted attention from attacker. On the other hand, embedding data in the higher frequency
coefficients have a greater expectancy of data loss after compression is applied, as information
contained within higher sub-bands only hold small amounts of image information, most of which
is disregarding during compression. It is clear, that determining the correct hiding locations here
is critical, particularly if durability against compression is a requirement of the system. Recent
studies show that the use of singular value decomposition in combination with other frequency
3. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1368 – 1379
1370
domains for hiding data can further enhance an algorithm, with regard to image quality and
security [7].
2.1 The Algorithm
Our approach adopts a combination of two effective transform methods, namely, DWT
and SVD. DWT decomposes the image into four frequency bands: LL (low frequency), HL, LH
(mid-frequency), and HH (high-frequency). The HH band is selected to embed the secret data
as it holds only minor details, and its contribution is almost insignificant to the energy of the
image, thus data embedding will not disturb the perceptual fidelity of the cover image.
Furthermore, low frequency sub-bands (LL) can only be altered to a certain extent; otherwise it
would have a serious impact on image quality [10] observed that the Human Visual System
(HVS) fails to differentiate changes made to the HH band. This algorithm presents a procedure
which will replace the singular values of the HH sub-band with the singular values of the secret
image. The singular values of the HH band of 5 test images are presented in Table 1. Notice
that the singular values are somewhere between 92 and 177. If the singular values of the
chosen secret image lie within a similar range, then no significant degradation to the cover
image will occur, due to the SV’s of hidden image being similar to those of the HH band.
Table 1. Singular values of HH frequency band of different test images
All images used for the purposes of experimentation were taken from the Fingerprint
Verification Competition (FVC2004) database [11] and the Yale Face Database B [12]. The Yale
website contains many databases, however only the B database is authorized for research
purposes. The use of other databases first, requires permission. Prior to embedding, Adobe
Photoshop was used to alter all images to a specific size (512x512) and format (bitmap), the
size of the facial images is also made identical to the size of the HH sub-band, where data
embedding will take place. Preceeding data embedding, an important aspect concerning the
feature extraction of fingerprint data must be considered. Features extracted from a fingerprint,
namely minutiae, are used to determine a person’s identity. It is imperative that the locations of
these important regions are not altered during the embedding stage [13]. To ensure these
regions are not affected during the embedding stage, fingerprint minutia are identified and
extracted from images before, and again, after embedding [14].
2.2 Fingerprint Image Processing
Fingerprints from the FVC database [11] were used therefore, no acquisition step is
implemented. Image Binarization is applied to the fingerprint image. This process transforms the
8-bit fingerprint image to 1-bit image. In general, an object pixel is given a value of “1” whereas
a background pixel is given a value of “0.” Subsequently, a binary image is generated by
shading pixels, either black or white (i.e. black for 0, white for 1). Here, a locally adaptive
binarization method is performed using Matlab “im2bw” function. The approach used here
divides the image into (16x16) blocks and calculates the mean intensity value for each block.
Then, each pixel value is changed to “1” if its intensity value is greater than the mean intensity
value of the current block, to which the pixel belongs to. After the fingerprint image is converted
to binary form, a thinning algorithm is applied to reduce the ridge thickness to one pixel wide. In
order to preserve fingerprint minutia, it is important that the thinning operation be performed
without any modification being made to the original ridge. For this purpose, MATLAB’s built in
morphological thinning function “bwmorph" is used. The “bwmorph” operation is based on the
4. TELKOMNIKA ISSN: 1693-6930
Using SVD and DWT Based Steganography to Enhance the Security… (Mandy Douglas)
1371
following two principles, ridge end points are not removed and connected ridges are preserved.
The function is applied as follows: bwmorph(binaryImage,'thin',inf) takes a binary image as
input, applies the thinning procedure which in turn, outputs a skeletal binary image consisting of
only one pixel wide. Figure 1 presents a fingerprint image before and after thinning.
Figure 1. Before and after thinning
The aforementioned function uses an iterative, parallel thinning approach which scans
over a (3x3) pixel window, checking the neighbourhood of a pixel based on a number of
conditions [15]. Upon every scan of the fingerprint image, redundant pixels are marked down
within each image window (3x3). After several scans, all marked pixels are removed thus
providing a skeleton image.
Succeeding binarization and thinning, the process of extracting fingerprint features is
relatively straightforward. A concept known as crossing numbers (CN), originally proposed
by [16] is used. This is an important step in fingerprint recognition, as the bifurcation and
terminations will be determined. The crossing number concept is carried out based on a 3x3
window, if the central pixel in the window is 1 and has only one-value neighbour, then the
central pixel is an end-point (i.e. ridge ending/termination) presented in Figure 2(a). If the central
pixel is 1 and has exactly 3 one-value neighbours, then it is a bifurcation as shown in Figure
2(b). Finally, if the central is 1 and has 2 one-value as neighbours, then it is a non-minutia point
as illustrated in Figure 2(c).
Figure 2. Indication of minutia points
The pre-processed fingerprint image contains many false minutiae, such as breaks,
spurs, bridges etc. illustrated by circles in Figure 5. This can be due to insufficient amounts of
ink, which cause false ridge breaks, or over-inking in which ridges can cross-connect. It has also
been noticed that some of the pre-processing stages carried out have added to the problem of
false minutia. Spurious minutiae can have a significant impact on fingerprint recognition. For
instance, if fake minutia is regarded as genuine, system accuracy will be poor. Therefore, it is
an essential requirement that false minutiae are eliminated. For this purpose, the Euclidean
distance method is used [17]. The 3 step process to remove false minutia is: 1) If the distance
between a termination (end-points) and a bifurcation is smaller than D, this minutiae is removed;
2) If the distance between two bifurcations is smaller than D, remove minutiae and 3) If the
distance between two terminations is smaller than D, this minutia is also removed. Figure 3
presents fingerprint images before (a) and after (b) removal of false minutiae. Note: terminations
are circled in red, bifurcations in green.
5. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1368 – 1379
1372
(a) (b)
Figure 3. Fingerprint before (a) and after (b) removal of false minutiae
After the removal of spurious minutia, features of the fingerprint image can be
eliminated further. For example if we consider Figure 3(a), note that a lot of minutiae are
contained around the edges, this is known as background information, often generated when
the ridges are out of the sensor. To eliminate this area, a region of interest (ROI) is recognised
for each fingerprint. This procedure was carried out using Morphological ROI tools from
MATLAB [18].
The two operations used in ROI extraction are “OPEN” and “CLOSE”. The use of the
‘OPEN’ function will expand the images by a specified size and eliminate existing background
noise such as, peaks. The “CLOSE” function is then used to shrink the fingerprint images and
close up any tiny holes or gaps that may exist within the image. The bound region is determined
by the subtracting the closed area of the image from the opened area. Then the left, right, upper
and bottom blocks are discarded, leaving only the inner area of the image, known here as
region of interest which is illustrated in Figure 4.
Figure 4. Region of Interest Figure 5. Fingerprint image after Region of
Interest is applied
After the ROI is defined, all minutiae external to this region are suppressed, as the
important minutia lies only within the inner section of the image. Figure 5 presents a fingerprint
image showing external and internal minutia after ROI is applied. Finally, minutia contained in
the inner area of the image is saved to a text file.
2.3 Securing fingerprints biometrics
The next step of the algorithm is to secure the fingerprint biometric with the use of
steganography. For this purpose, another piece of biometric data (facial image) is used. It is
believed that embedding one biometric within another can further enhance the security of the
system, as two forms of authentication will then exist [19]. The fingerprint image will be referred
to as cover image, and the face image as secret image. When the secret image is embedded
into the cover image, this will be introduced as the stego image. Figure 6 shows the embedding
(a) and extraction (b) of secret data in the transform domain using the SVD technique.
6. TELKOMNIKA ISSN: 1693-6930
Using SVD and DWT Based Steganography to Enhance the Security… (Mandy Douglas)
1373
Figure 6. Embedding (a) and Extraction (b) Algorithm
After the embedding, the secret image was extracted and clearly recognizable.
Modifying only the singular values of an image allows for the data to be extracted without the
need for the original cover image. This has benefits in regards to security as the original image
does not need to be stored.
2.4 Image Attacks and Quality Measures
In order to prove the robustness of the data embedding technique proposed, a series of
attacks have been carried out on the stego fingerprint images. It is common to compare two
images using PSNR (peak signal to noise ratio) based on the MSE (mean-squared error).
However, if data is specifically embedded within the image edges or textured areas, PSNR is
then an inefficient method to compute the quality of an image [20]. In [21], a selection of
methods have been proposed to overcome PSNR disadvantages. An objective formula often
used for comparability purposes is the Normalized Cross-Correlation (NCC). This metric is used
to measure deflections between the extracted facial image (after attacks) with respect to the
original facial image (prior to attacks). If the NCC value is equal to 1, then the embedded data
and the extracted data are same. Typically, if the NCC value is greater than 0.7500, it is
accepted as a reasonable data extraction. All of the above are important steps in order to
enhance fingerprint security. The most decisive one being that minutia must still be extractable
from the fingerprints after the data embedding procedure, and image attacks have been carried
out. Even though the facial data extracted from the fingerprint is clear, it would be considered a
failure if minutia was severely altered during data embedding in such a way that user
authenticity would be affected. For this reason, all stego fingerprints (after embedding and
attacks) are put through the feature extraction process, and minutia extracted before and after
the steganography process is compared. There is no standard number of minutiae required in
order to make a positive identification. In some cases, the decision as to whether or not the
fingerprints match is left solely to the examiner. However, each individual department may hold
their own set of requirements in order to establish a positive identification. Ireland follows what
is known as an 8-point rule, meaning that 8 minutia points are required for a valid identification.
Many European countries require no less than 12 points of similarity [22]. The UK and Italy
7. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1368 – 1379
1374
require 16, while Brazil and Argentina require not less than 30 Nonetheless, it is obvious that
the more minutiae points exist, the more accurate the identification process will be.
3. Evaluation
The strengths and weaknesses of the proposed technique were investigated with
regards to invisibility, robustness against various image processing attacks and possible
detection using Steganalysis tools. Although, five test images were used for test purposes, this
section will only discuss, and display detailed results based on one fingerprint image (fingerprint
one). However, the results from the additional four fingerprint images will occasionally be
referred to, and compared with the results of fingerprint one.
3.1 Image Database
To allow for a fair comparison regarding results, it is important that any steganographic
software is tested on many different images. We used the FVC (Fingerprint Verification
Competition) dataset which includes four disjoint fingerprint databases (DB1, DB2, DB3, and
DB4). Five test images were used, each of size 512x512 pixels. They will be referred to as
fingerprint one, two, three, four and five as illustrated in Figure 7. A facial image from the Yale
Face Database B [12] will be embedded within each fingerprint image.
Figure 7. Fingerprint images and watermark face image
3.2 Minutia Extraction
Before the embedding process, five test images were loaded into our minutia extraction
GUI. As mentioned earlier, it is important that minutiae are not severely harmed whilst
embedding the facial watermark. Table 2 summarises the number of minutiae extracted from
each fingerprint image prior to embedding. The number of bifurcations and terminations are
given for each individual image.
Table 2. Minutiae extracted from five fingerprint images before embedding
8. TELKOMNIKA ISSN: 1693-6930
Using SVD and DWT Based Steganography to Enhance the Security… (Mandy Douglas)
1375
Considering the extracted minutia, it is observed that the amount of bifurcations and
terminations vary. Fingerprint one has only twelve bifurcation points whereas fingerprint three
has fifty. This is because each fingerprint has its own unique pattern hence no two fingerprints
can have identical minutiae.
3.3 Image Quality Analysis
After the embedding procedure, a visual examination of each image was completed in
order to determine variations between the original image and the stego image. As shown in
Figure 8 the original image is “Fingerprint1.bmp” and the stego image is “Stego Image.bmp”.
Figure 8. The original “fingerprint” and “fingerprint” images after the hybrid steganographic
technique is executed
A cohort of eight was used for testing. Each person was given one minute to study the
two images. Any evidence or indication that data was hidden, such as the file names below
each image were removed prior to viewing. After studying the images, each person was asked if
any differences were noticeable between the two images and if so to point them out. Six out of
the eight individuals thought that the two images were the same, whilst the other two persons
were uncertain and believed that the two images were different. However, when both were
asked to highlight the differences, they were unable to do so without hesitation. Succeeding the
above subjective test, the PSNR and SSIM were then calculated. Both tests were computed by
comparison between two images, the original image and the stego image. A PSNR value over
38 decibels means that there are no noticeable differences between the two images being
compared. If the SSIM test outputs a value of 1, this means the two compared images are
identical. Table 3 gives a summary of results of PSNR and SSIM value for images all containing
the watermark.
Table 3. PSNR and SSIM results for images all containing the watermark
There are only slight differences in each PSNR value, for each image. For example, the
highest PSNR value is 54.38 and the lowest is 51.48. The calculated PSNR for each image is
high which therefore indicates that all images are of good quality after embedding. The SSIM
9. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1368 – 1379
1376
values are all around 0.99, which indicates that there are no considerable differences between
the original image and the stego image, even though data was embedded. The comparison of
results, regardless of using different fingerprint images implies that the proposed hybrid
technique should stay invisible regardless of the type of fingerprint image used.
3.4 Robustness Analysis
This section will evaluate the survival of the embedded watermark after attacks are
carried out on the ‘fingerprint one’. The Normalized Cross Correlation (NCC) value is calculated
to assess the distortion of the embedded watermark after each attack. JPEG Compression is a
widely used technique for digital image compression therefore any steganography system
should have some degree of durability toward compression algorithms. JPEG Compression is
applied to the image ‘fingerprint one’ using different quality factors. For example, applying 5% of
compression means that the image has a quality factor of 95%, meaning the image has a data
loss of 5% and maintains 95% of its original detail. Table 4 gives a summary of results.
Table 4. Data survival after of the embedded watermark after JPEG compression is applied at
various quality levels
Compression
%
Normalized Cross
Correlation (NCC)Value
Extracted Data After JPEG Compression
5 0.87
50 0.49
100 0.42
The NCC value shows that the extracted watermark deteriorates after a higher level of
compression is applied. However, the watermark is still clearly recognisable even after 100% of
compression (0% JPEG quality factor). This test was also carried out on four other fingerprint
images. The results are similar to the above. Based on these results, the proposed method is
robust against all quality levels of JPEG compression.
JPEG2000 is another compression method that uses wavelets as opposed to DCT.
After applying different levels of compression the NCC value only changes slightly. Data
extracted after 10% of compression (90% JPEG 2000 quality factor) is almost identical to data
extracted after 95% of applied compression (5% JPEG 2000 quality factor).
Two types of noise (Salt and Pepper and Gaussian noise) were added to the stego
image. However, the NCC value confirms that the addition of noise has somewhat affected the
watermark quality. Although the image quality is slightly flawed, the facial image is still
identifiable. Results for the other fingerprint images were similar.
Rotating an image, even a tiny amount (0.1 degree), clockwise or anti-clockwise can be
enough to disrupt the whole bit map thus may cause embedded data to be lost. The facial
10. TELKOMNIKA ISSN: 1693-6930
Using SVD and DWT Based Steganography to Enhance the Security… (Mandy Douglas)
1377
watermark survives rotation degrees between -1 and 1. The image quality is partially distorted
however it is still very distinguishable after all attacks. Therefore it can be concluded that the
proposed method is resistant to above rotation attacks.
Image cropping is a lossy procedure often used in real life. Here, three different sizes of
cropping are applied to the stego image, respectively using MATLAB’s ‘imcrop’ function. This
function crops the fingerprint image by the size and position of the rectangle specified (i.e.
rectangle is a four-element position vector [xmin ymin width height]. The results show that the
proposed algorithm is resistant against some cropping attacks.
A common manipulation in digital images is median filtering. The median filter is a non-
linear spatial filter which is often used to eliminate noise spikes from an image. Here the facial
features of the watermark are still clearly recognizable after the above filtering attacks has been
applied. Therefore we can say that the proposed steganography algorithm is robust against
median filtering.
3.5 Minutiae Analysis
It is important that the data embedding process does not seriously alter the minutia
points in the fingerprint image. Table 5 shows results of fingerprint minutiae extracted based on
the five fingerprint images, pre and post data embedding. Bifurcation points is denoted as B and
termination points as T.
Table 5. Minutia extraction results for pre and post data embedding
Image Name Original Image
B T
Stego Image
B T
Fingerprint one 12 33 10 32
Fingerprint two 42 26 38 26
Fingerprint three 50 34 43 32
Fingerprint four 38 31 38 31
Fingerprint five 22 40 21 40
Note: Bifurcation points is denoted as B and termination points as T
Based on comparison of the minutiae results, before and after the data embedding, it
can be concluded that some minutiae points have been affected slightly. For example,
‘fingerprint one’ lost two bifurcation points and one termination point, minutiae in the remaining
images have also been somewhat modified, fingerprint four being the exception, with no minutia
loss. No standard number of minutia is required in order to make a positive identification.
However, the number of minutia points required vary from country to country, with Brazil and
Argentina requiring the highest amount (minimum of 30 points). Based on this knowledge, it is
reasonable to assume that the proposed data embedding algorithm did not corrupt the
fingerprint minutiae to an extent that it would interfere with the identification process.
In order to fully test the durability of minutiae, the extraction process is also carried out
on stego images that have been attacked by JPEG and JPEG2000 compression, noise addition,
filtering, and geometric attacks. Although, five test images have been used for experimentation,
only results based on ‘fingerprint one’ will be presented here. The attacked images will be
named based on the attack applied to them. So for example, an image attacked with JPEG
compression will be denoted as ‘JPEG5%, 5% signifying the image quality factor. Or, an image
attacked with salt and pepper noise will be listed as ‘salt & pepper20%, 20% meaning 20% of
image pixels were modified. Similar to above, bifurcation points are denoted as B and
termination points as T. Table 6 shows results for minutia extracted from attacked images,
minutia extracted from original image (i.e. fingerprint one) and minutia extracted after watermark
is embedded into the original image (i.e. stego image).
The results show that the fingerprint minutia is robust and can tolerate various level of
JPEG and JPEG2000 compression. After 10% compression (quality factor of 90%) results show
no change in minutiae. After applying a high compression rate (95%- quality factor 5%) minutia
loss is significant however, not an adequate amount of fingerprint minutiae has been disturbed
in the sense that it would prevent an accurate identification. As can be seen in Table 6, the
noise attacked images has altered minutia significantly. Both Salt & pepper and Gaussian noise
addition has resulted in additional bifurcation points being added to the image. This spurious
11. ISSN: 1693-6930
TELKOMNIKA Vol. 15, No. 3, September 2017 : 1368 – 1379
1378
minutia may cause problems such as, extraction of false minutiae. Filtering attacks have also
disturbed minutia features. The histogram attacked image shows a lot of additional minutiae.
However, no addition of minutiae exists in Gaussian and median attacked images. So, it is
reasonable to say that the two out of the three filtering attacks (Gaussian & median) would not
prevent an accurate identification process from taking place. Geometric attacks have
considerably modified minutia points. However, extracting valid minutia from the resized image
(200x200) may still be feasible based on the fact that only one termination point has been
added. This cannot be said for the rotated image, as the amount of termination points has
almost doubled. Lastly, the cropped image has lost all existing minutiae. This is no surprise, and
is most likely due to the region of interest being excluded as a result of cropping. These results
demonstrate that fingerprint minutia is resistant against the JPEG and JPEG2000 compression
and also proves robust against two of the tested filtering attacks.
Table 6. Fingerprint one minutiae survival results after attacks
Image Name B T
Extracted minutia from
attacked images
B T
Extracted minutia from original
image (fingerprint one)
B T
Extracted minutia from
stego image
JPEG5% 7 30 12 33 10 32
JPEG50% 9 30 12 33 10 32
JPEG90% 10 32 12 33 10 32
JPEG2000 9 32 12 33 10 32
Salt &
pepper20%
20 31 12 33 10 32
Gaussian20% 13 33 12 33 10 32
Histogram 37 26 12 33 10 32
Median3x3 7 25 12 33 10 32
Gaussian blur 6 32 12 33 10 32
Resize200x200 6 33 12 33 10 32
Rotation by 50 8 37 12 33 10 32
Crop300x300 0 0 12 33 10 32
4. Conclusion
The aim was to develop a watermarking algorithm, inspired by steganography
techniques, for digital images, to protect fingerprint biometric data in biometric security. As DWT
and SVD transforms are used simultaneously, the fundamental advantages of both the
transforms are obtained. General image processing techniques do not alter singular values of
digital images thus the use of SVD makes this method more robust than the use of DWT alone.
Noise attacks as well as image processing operations can be sustained, hence robustness is
achieved. In this work, a hybrid data hiding algorithm which combines the DWT and SVD
transforms has been used. After decomposing the original fingerprint image into four sub bands
(LL, HL, LH and HH), SVD is applied to the HH band and diagonal singular value coefficients
are modified with the singular value of the watermark itself. Subsequently, HH band coefficients
are reconstructed with the modified singular values and lastly, the inverse DWT is applied to
obtain the stego image. Our results show that the proposed scheme is undetectable using
visibility checks. Moreover, the steganalysis tools used also failed to detect it. This
demonstrates that the hybrid algorithm is undetected. Results clearly show the proposed
techniques robustness to a considerable number of attacks, such as image processing attacks
and many levels of geometric attacks, up to the point where any commercial value of the tested
images are lost. The proposed method also proved durable to various levels of
JPEG/JPEG2000 compression attacks, and according to research, the need to compress
biometric data is essential in order to limit storage space. However, after a resizing attack of
90% was applied the watermark deteriorated badly, and as a result did not survive this attack.
On the aspect of preserving fingerprint features after data embedding, the fingerprint minutiae
showed good resilience against the proposed embedding process and some attacks. Thus,
fingerprint images were watermarked with little or no change to the features associated with
them. Our system offers a good combination of imperceptibility and robustness for digital
fingerprint images watermarked with a facial image using a combined method of the SVD and
DWT transforms. In addition, the original image is not required to extract the hidden data, which
further enhances data security.
12. TELKOMNIKA ISSN: 1693-6930
Using SVD and DWT Based Steganography to Enhance the Security… (Mandy Douglas)
1379
References
[1] Yogarajah, Condell, J Curran, K Cheddad A, Mc Kevitt. A Dynamic Threshold Aproach for Skin
Segmentation in Color Images International Journal of Biometrics. 2012; 4(1): 38-55. ISSN: 1755-
8301, DOI: 10.1504/IJBM.2012.044291
[2] Nandakumar K, Jain AK. Biometric Template protection Schemesp Bridging the performance Ga:
Between Theory and practice, IEEE Signal processing Magazine. 2015; 32(5): 88-100.
[3] Galbally, J Fierrez, J Alonso–Fernandez, F Martinez–Diaz, M. Evaluation of Direct Attacks to
Fingerprint Verification Systems.Telecommunication Systems (Springer). 2011; 4-3(3-4): 243–254.
[4] Georghiades, A.S. The Yale Face Database B. 2011.
http://vision.ucsd.edu/~iskwak/ExtYaleDatabase/Yale%20Face%20Database.htm.
[5] Jain, A Uludag U. Hiding biometric data, IEEE Trans. Pattern Analysis and Machine Intelligence.
2003; 25: 1494-1498.
[6] Cox I Miller, M Bloom, J Fridrich, J Kalker T. Digital Watermarking and Steganography. 2nd ed. USA:
Kaufmann. 2008: 1-2.
[7] Saha, B Sharma S. Steganographic Techniques of Data Hiding using Digital Images. Defence
Science Journal. 2012; 62(1): 11-18.
[8] Subhedar, M Mankar VH. High Capacity Image Steganography based on Discrete Wavelet
Transform and Singular Value Decomposition. International Conference on Information and
Communication Technology for Competitive Strategies. 2015,
[9] Lusson F Bailey, K Leeney, M Curran K. A Novel Aproach to Digital Watermarking, Exploiting Colour
Spaces. Signal processing. 2012; 93(5): 1268-1294.
[10] Dhandapani, S Ammasai K. Robust Digital Image Watermarking for Color Images. European Journal
of Scientific Research. 2012; 76(1): 117-126.
[11] Gupta AK, Raval MS. A robust and secure watermarking scheme based on singular values
replacement. Indian Academy of Sciences. 2012; 37(4): 425-440.
[12] Maltoni, D Maio, D Jain A.K Prabhakar S. Handbook of Fingerprint Recognition. 2nd ed. London:
Spinger. 2009: 58-60.
[13] Li, Y Georghiade C, Huang G. Sequence estimation for space-time coded systems. IEEE Trans.
Commun. 2001; 49(6): 948-951.
[14] Bazen A, Gerez S. Extraction of singular points from directional fields of fingerprints. In Mobile
Communications in perspective. Proc. CTIT Worksho: on Mobile Communications. University of
Twente, Enschede, The Netherlands. 2001: 41–44
[15] Kussener F. 2007. Fingerprint Aplication. http://bit.ly/2jxIPW7
[16] Mahdi, AM Hanoon A. Fingerprint Recognition. Journal of Engineering and Development. IET. 2011;
2(1): 21-27.
[17] Arcelli, C Baja G. A width independent fast thinning algorithm. IEEE Transactions on Pattern Analysis
and Machine Intelligence. 1985; 4(7): 463-474.
[18] Deza, M Deza E. Encyclopedia of Distances. Springer. 2009: 94-96.
[19] Matlab. Image Processing Toolbox. 2015. Available: http://uk.mathworks.com/hel:/images/index.html.
[20] O'Gorman L. Fingerprint Verification. In: Jain, A Bolle, R Pankanti, S Biometrics: Personal
Identification in Networked Society. USA: Springer. 2006: 44-62.
[21] Wang, Z Bovik, AC Sheikh, HR Simoncelli EP. Image Quality Assessment: From Error Visibility to
Structural Similarity. IEEE Transactions on Image Processing. 2004; 13(4): 46-52.
[22] Cheddad, A Condell, J Curran, K McDevitt P. Digital Image Steganography: Survey and Analysis of
Current Methods. Signal Processing. 2010; 90(3).