This document discusses using Vernam cipher conjugation to increase security in Bit-Plane Complexity Segmentation (BPCS) steganography. BPCS divides an image into segments and bit-planes to hide data, but the standard pattern is not secure. The author proposes using Vernam cipher to encrypt each bit-plane before insertion. This would modify the bit-plane pattern randomly, increasing security by obscuring the stored data. An example demonstrates the BPCS process of dividing an image segment into bit-planes and calculating their complexity values. Combining Vernam cipher encryption of the bit-planes with BPCS storage in the image is described as a way to securely enhance the steganographic technique.
Substitution-diffusion based Image CipherIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the algorithm, image is partitioned into several key based dynamic blocks and further, each block passes through the eight rounds of diffusion as well as substitution process. In diffusion process, sequences of block pixels are rearranged within the block by a zigzag approach whereas block pixels are replaced with another by using difference calculation of row and column in substitution process. Due to high order of substitution and diffusion, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed technique is efficient and has high security features.
MIMUscope is a PC based tool for oblu's data acquisition, analysis, realtime viewing, logging etc. It is also used for modify some of the settings of oblu.
MIMUscope is coded in Python which is freely available for installation.
Oblu is an opensource development board for wearable motion sensing. It is based on opensource OpenShoe platform.
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...IJECEIAES
In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
Substitution-diffusion based Image CipherIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 128-bit size is proposed. In the algorithm, image is partitioned into several key based dynamic blocks and further, each block passes through the eight rounds of diffusion as well as substitution process. In diffusion process, sequences of block pixels are rearranged within the block by a zigzag approach whereas block pixels are replaced with another by using difference calculation of row and column in substitution process. Due to high order of substitution and diffusion, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed technique is efficient and has high security features.
MIMUscope is a PC based tool for oblu's data acquisition, analysis, realtime viewing, logging etc. It is also used for modify some of the settings of oblu.
MIMUscope is coded in Python which is freely available for installation.
Oblu is an opensource development board for wearable motion sensing. It is based on opensource OpenShoe platform.
New Watermarking/Encryption Method for Medical ImagesFull Protection in m-Hea...IJECEIAES
In this paper, we present a new method for medical images security dedicated to m-Health based on a combination between a novel semi reversible watermarking approach robust to JPEG compression, a new proposed fragile watermarking and a new proposed encryption algorithm. The purpose of the combination of these three proposed algorithms (encryption, robust and fragile watermarking) is to ensure the full protection of medical image, its information and its report in terms of confidentiality and reliability (authentication and integrity). A hardware implementation to evaluate our system is done using the Texas instrument C6416 DSK card by converting m-files to C/C++ using MATLAB coder. Our m-health security system is then run on the android platform. Experimental results show that the proposed algorithm can achieve high security with good performance.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...ijistjournal
In this paper, we have proposed an extended version of Absolute Moment Block Truncation Coding (AMBTC) to compress images. Generally the elements of a bitplane used in the variants of Block Truncation Coding (BTC) are of size 1 bit. But it has been extended to two bits in the proposed method. Number of statistical moments preserved to reconstruct the compressed has also been raised from 2 to 4. Hence, the quality of the reconstructed images has been improved significantly from 33.62 to 38.12 with the increase in bpp by 1. The increased bpp (3) is further reduced to 1.75in multiple levels: in one level, by dropping 4 elements of the bitplane in such a away that the pixel values of the dropped elements can easily be interpolated with out much of loss in the quality, in level two, eight elements are dropped and reconstructed later and in level three, the size of the statistical moments is reduced. The experiments were carried over standard images of varying intensities. In all the cases, the proposed method outperforms the existing AMBTC technique in terms of both PSNR and bpp.
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...ijistjournal
In this paper, we have proposed an extended version of Absolute Moment Block Truncation Coding (AMBTC) to compress images. Generally the elements of a bitplane used in the variants of Block Truncation Coding (BTC) are of size 1 bit. But it has been extended to two bits in the proposed method. Number of statistical moments preserved to reconstruct the compressed has also been raised from 2 to 4. Hence, the quality of the reconstructed images has been improved significantly from 33.62 to 38.12 with the increase in bpp by 1. The increased bpp (3) is further reduced to 1.75in multiple levels: in one level, by dropping 4 elements of the bitplane in such a away that the pixel values of the dropped elements can easily be interpolated with out much of loss in the quality, in level two, eight elements are dropped and reconstructed later and in level three, the size of the statistical moments is reduced. The experiments were carried over standard images of varying intensities. In all the cases, the proposed method outperforms the existing AMBTC technique in terms of both PSNR and bpp.
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
An odd even block cipher based cryptosystem through modulo arithmatic techniq...eSAT Journals
Abstract In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Odd Even Modulo Arithmetic Technique (OEMAT). The original message is considered as a stream of bits, which is then divided into a number of blocks, each containing n bits, where n is any one of 2, 4, 8, 16, 32, 64, 128, 256. The first and the penultimate blocks are then added where the modulus of addition is 2n. The result replaces the penultimate block (say (N-1th) block), first block remaining unchanged. In the next attempt the second and the ultimate blocks (say Nth block) are added and the result replaces the Nth block. This process continues until all the blocks are executed. The modulo addition has been implemented in a very simple manner where the carry out of the MSB is discarded to get the result. The technique is applied in a cascaded manner by varying the block size from 2 to 256. The whole technique has been implemented by using a modulo subtraction technique for decryption. Keywords: MFBOMAT, FBOMAT, Symmetric block cipher, Cryptosystem
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Pipelined Vedic multiplier with manifold adder complexity levels IJECEIAES
Recently, the increased use of portable devices, has driven the research world to design systems with low power-consumption and high throughput. Vedic multiplier provides least delay even in complex multiplications when compared to other conventional multipliers. In this paper, a 64-bit multiplier is created using the Urdhava Tiryakbhyam sutra in Vedic mathematics. The design of this 64-bit multiplier is implemented in five different ways with the pipelining concept applied at different stages of adder complexities. The different architectures show different delay and power consumption. It is noticed that as complexity of adders in the multipliers reduce, the systems show improved speed and least hardware utilization. The architecture designed using 2x2-bit pipelined Vedic multiplier is then compared with existing Vedic multipliers and conventional multipliers and shows least delay.
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcscpconf
Most watermark methods use pixel values or coefficients as the judgment condition to embed or
extract a watermark image. The variation of these values may lead to the inaccurate condition
such that an incorrect judgment has been laid out. To avoid this problem, we design a stable
judgment mechanism, in which the outcome will not be seriously influenced by the variation.
The principle of judgment depends on the scale relationship of two pixels. From the observation
of common signal processing operations, we can find that the pixel value of processed image
usually keeps stable unless an image has been manipulated by cropping attack or halftone
transformation. This can greatly help reduce the modification strength from image processing
operations. Experiment results show that the proposed method can resist various attacks and
keep the image quality friendly.
A new hybrid steganographic method for histogram preservation IJEEE
This paper presents a histogram preserving data embedding method for grey-scale images which is based on pixel value differencing (PVD) and least-significant-bit (LSB) substitution methods. Various PVD based steganographic methods achieve high data embedding capacity with minimum distortions in stego image at the cost of change in histogram characteristics which is can be detected by histogram based steganalysers. This persistent problem can been taken care off by proposed method of data hiding. The improved performance of the proposed method is verified through extensive simulations.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
More Related Content
Similar to Vernam Conjugated Manipulation of Bit-Plane Complexity Segmentation
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...ijistjournal
In this paper, we have proposed an extended version of Absolute Moment Block Truncation Coding (AMBTC) to compress images. Generally the elements of a bitplane used in the variants of Block Truncation Coding (BTC) are of size 1 bit. But it has been extended to two bits in the proposed method. Number of statistical moments preserved to reconstruct the compressed has also been raised from 2 to 4. Hence, the quality of the reconstructed images has been improved significantly from 33.62 to 38.12 with the increase in bpp by 1. The increased bpp (3) is further reduced to 1.75in multiple levels: in one level, by dropping 4 elements of the bitplane in such a away that the pixel values of the dropped elements can easily be interpolated with out much of loss in the quality, in level two, eight elements are dropped and reconstructed later and in level three, the size of the statistical moments is reduced. The experiments were carried over standard images of varying intensities. In all the cases, the proposed method outperforms the existing AMBTC technique in terms of both PSNR and bpp.
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...ijistjournal
In this paper, we have proposed an extended version of Absolute Moment Block Truncation Coding (AMBTC) to compress images. Generally the elements of a bitplane used in the variants of Block Truncation Coding (BTC) are of size 1 bit. But it has been extended to two bits in the proposed method. Number of statistical moments preserved to reconstruct the compressed has also been raised from 2 to 4. Hence, the quality of the reconstructed images has been improved significantly from 33.62 to 38.12 with the increase in bpp by 1. The increased bpp (3) is further reduced to 1.75in multiple levels: in one level, by dropping 4 elements of the bitplane in such a away that the pixel values of the dropped elements can easily be interpolated with out much of loss in the quality, in level two, eight elements are dropped and reconstructed later and in level three, the size of the statistical moments is reduced. The experiments were carried over standard images of varying intensities. In all the cases, the proposed method outperforms the existing AMBTC technique in terms of both PSNR and bpp.
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
Combinational lossless data hiding in the spatial and frequency domains is proposed. In the spatial domain, a secret message is embedded in a host medium using the min-max algorithm to generate a stego-image. Subsequently, the stego-image is decomposed into the frequency domain via the integer wavelet transform (IWT). Then, a watermark is hidden in the low-high (LH) and high-low (HL) subbands of the IWT domain using the coefficient-bias approach. Simulations show that the perceptual quality of the image generated by the proposed method and the method¡¦s hiding capability are good. Moreover, the mixed images produced by the proposed method are robust against attacks such as JPEG2000, JPEG, brightness adjustment, and inversion.
An odd even block cipher based cryptosystem through modulo arithmatic techniq...eSAT Journals
Abstract In this paper, a new Cryptosystem based on block cipher has been proposed where the encryption is done through Odd Even Modulo Arithmetic Technique (OEMAT). The original message is considered as a stream of bits, which is then divided into a number of blocks, each containing n bits, where n is any one of 2, 4, 8, 16, 32, 64, 128, 256. The first and the penultimate blocks are then added where the modulus of addition is 2n. The result replaces the penultimate block (say (N-1th) block), first block remaining unchanged. In the next attempt the second and the ultimate blocks (say Nth block) are added and the result replaces the Nth block. This process continues until all the blocks are executed. The modulo addition has been implemented in a very simple manner where the carry out of the MSB is discarded to get the result. The technique is applied in a cascaded manner by varying the block size from 2 to 256. The whole technique has been implemented by using a modulo subtraction technique for decryption. Keywords: MFBOMAT, FBOMAT, Symmetric block cipher, Cryptosystem
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Pipelined Vedic multiplier with manifold adder complexity levels IJECEIAES
Recently, the increased use of portable devices, has driven the research world to design systems with low power-consumption and high throughput. Vedic multiplier provides least delay even in complex multiplications when compared to other conventional multipliers. In this paper, a 64-bit multiplier is created using the Urdhava Tiryakbhyam sutra in Vedic mathematics. The design of this 64-bit multiplier is implemented in five different ways with the pipelining concept applied at different stages of adder complexities. The different architectures show different delay and power consumption. It is noticed that as complexity of adders in the multipliers reduce, the systems show improved speed and least hardware utilization. The architecture designed using 2x2-bit pipelined Vedic multiplier is then compared with existing Vedic multipliers and conventional multipliers and shows least delay.
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcscpconf
Most watermark methods use pixel values or coefficients as the judgment condition to embed or
extract a watermark image. The variation of these values may lead to the inaccurate condition
such that an incorrect judgment has been laid out. To avoid this problem, we design a stable
judgment mechanism, in which the outcome will not be seriously influenced by the variation.
The principle of judgment depends on the scale relationship of two pixels. From the observation
of common signal processing operations, we can find that the pixel value of processed image
usually keeps stable unless an image has been manipulated by cropping attack or halftone
transformation. This can greatly help reduce the modification strength from image processing
operations. Experiment results show that the proposed method can resist various attacks and
keep the image quality friendly.
A new hybrid steganographic method for histogram preservation IJEEE
This paper presents a histogram preserving data embedding method for grey-scale images which is based on pixel value differencing (PVD) and least-significant-bit (LSB) substitution methods. Various PVD based steganographic methods achieve high data embedding capacity with minimum distortions in stego image at the cost of change in histogram characteristics which is can be detected by histogram based steganalysers. This persistent problem can been taken care off by proposed method of data hiding. The improved performance of the proposed method is verified through extensive simulations.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
Post-Segmentation Approach for Lossless Region of Interest Codingsipij
This paper presents a lossless region of interest coding technique that is suitable for interactive telemedicine over networks. The new encoding scheme allows a server to transmit only a part of a compressed image data progressively as a client requests it. This technique is different from region scalable coding in JPEG2000 since it does not define region of interest (ROI) when encoding occurs. In the proposed method, the image is fully encoded and stored in the server. It also allows a user to select a ROI after the compression is done. This feature is the main contribution of research. The proposed coding method achieves the region scalable coding by using the integer wavelet lifting, successive quantization, and partitioning that rearranges the wavelet coefficients into subsets. Each subset that represents a local area in an image is then separately coded using run-length and entropy coding. In this paper, we will show the benefits of using the proposed technique with examples and simulation results.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
Cybercrime is a digital crime committed to reaping profits through the Internet as a medium. Any criminal activity that occurs in the digital world or through the internet network is referred to as internet crime. Cybercrime also refers to criminal activity on computers and computer networks. This activity can be done in a certain location or even done between countries. These crimes include credit card forgery, confidence fraud, the dissemination of personal information, pornography, and so on. In ancient times there was no strong law to combat cybercrime. Since there are electronic information laws and transactions, legal jurisdiction of computer crime has been applied. Computer networks are not only installed in one particular local area but can be applied to a worldwide network. It is what makes cybercrime can occur between countries freely. This issue requires universal jurisdiction. A country has the authority to combat crimes that threaten the international community. This jurisdiction is applied without determining where the crime was committed and the citizen who committed the cybercrime. This jurisdiction is created in the absence of an international judicial body specifically to try individual crimes. Cybercrime cannot be totally eradicated. Implementing international jurisdiction at least reduces the number of cybercrimes in the world.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
Compression is an activity performed to reduce its size into smaller than earlier. Compression is created since lack of adequate storage capacity. Data compression is also needed to speed up data transmission activity between computer networks. Compression has the different rule between speed and density. Compressed compression will take longer than compression that relies on speed. Elias Delta is one of the lossless compression techniques that can compress the characters. This compression is created based on the frequency of the character of a character on a document to be compressed. It works based on bit deductions on seven or eight bits. The most common characters will have the least number of bits, while the fewest characters will have the longest number of bits. The formation of character sets serves to eliminate double characters in the calculation of the number of each character as well as for the compression table storage. It has a good level of comparison between before and after compression. The speed of compression and decompression process possessed by this method is outstanding and fast.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Vernam Conjugated Manipulation of Bit-Plane Complexity Segmentation
1. Vernam Conjugated Manipulation of Bit-Plane
Complexity Segmentation
Andysah Putera Utama Siahaan
Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
andiesiahaan@gmail.com
ABSTRACT
Bit-Plane Complexity Segmentation is one of the steganographic technique is often performed to conceal data. But in BPCS
method, a pattern that is used is not a classified anymore. Conjugation at the informative bit-plane is to change the bit-plane to
chiper-form bit-plane that can keep secret message. Modifying bit-plane pattern for each bit-plane is a technique for increasing
the security of the vessel image. Vernam can be used to modify the bit-plane with the predetermined blocks conjugation. Data
security would be increased by applying this method.
Keywords – Steganography, BPCS, Vernam, Cryptography
I. INTRODUCTION
Steganography is often done to send a file with a high
comfort, thereby reducing suspicion of files that are sent or
vessel image. BPCS (Bit-Plane Complexity Segmentation) is
one technique that is used to store information in an image,
which is called the image of the vessel image. This technique
uses imagery division into segments which are then each
segment will be divided into several bit-plane. However, the
possibility that data can be solved or attack so that data can be
retrieved by the irresponsible. The pattern used in BPCS is to
store data by grouping bit corresponds to the index with a 8x8
pattern forming where each sequence of eight characters will
be compiled into a binary message blocks and form each bit-
plane.
BPCS weaknesses can be seen from the preparation of the
information in 8x8 pattern. If complexity used is determined, it
is not impossible vessel information stored in the image can be
easily retrieved. Typically used complexity revolves around the
value of 0.3, and this value has become a commonly used
method of this BPCS. To anticipate unwanted things, the binary
value inserted into the vessel should be further enhanced image
security. If we know value and the data is retrieved from the
vessel image, the Vernam Cipher will play a role in protecting
the arrangement of bits of data on the bit-plane BPCS.
Vernam Cipher will make changes to the data bits to be
inserted in the vessel image. These bits will be given the
exclusive or procedure, so that the data stored in the image file
has been encrypted beforehand. This method is very
lightweight and faster to use than other methods that have to
use a lot of math calculations.
II. THEORIES
Eiji Kawaguchi and R. O. Eason introduce the BPCS
technique to be used in uncompressed color images documents.
The image of the document is divided into several segments
with a size of 8x8 pixels of each segment. In the 8-bit image of
the document, each segment has eight bit-planes representing
the pixels of each of these bits. The process of division of
segment 8x8 pixels into eight bits is called the bit slicing plane.
Representation of bit plane is PBC system (Pure Binary Code).
In BPCS, the insertion process is performed on a bit plane
system with CGC (Canonical Gray Code) because the process
of slicing bits at CGC is better than in PBC. Bit plane with PBC
representation is converted into bit-plane with CGC
representation.
The process of inserting a message is carried on the segments
that have high complexity. This is called noise-like region. In
these segments, the insertion is not only performed on the least
significant bit, but on the whole noise-like bit-planes.
Therefore, the BPCS technique, data capacity can optimumly
reach 50% of vessel image size.
For further explanation, we can see the process from original
image to bit-plane slicing on Figure 1. The image at the top-left
is the original image which has converted to 8 bits graycolor.
Each segment is divided into 8x8 pixel, where each pixel is
converted to 8 bit binary system. Every index on bit is
concatenated in a new single piece of bit-plane. So we have
eight bit-planes which are saving the information of every bit.
2. Figure 1 : The Process of Bit-Plane
Conjugation is a technique to maintain bit-plane in noise-like
form. Suppose a black and white image sized 8x8 pixel P has a
white background color and foreground color black. W is a
pattern with all pixels white. Suppose a black and white image
sized 8x8 pixel P has a white background color and foreground
color black. W is a pattern with all pixels white and B is the
pattern with all black pixels. Wc and Bc is a chessboard pattern,
with a pixel on the top left of the white on black on the wc and
Bc. P * is the conjugate of the image P shown in Figure 2.
Figure 2 : Conjugation Block
The Vernam Cipher is a crypto technique by combine each
character of plaintext with repeated key characters from a key
stream. The key can be from random key or regular key by
inserting decided characters. If a truely random key stream is
used, the ciphertext will be random too. By combining Vernam
and BPCS will make the concealment powerful. Attacker will
be fooled by a set of bits obtained at the time of interception.
This make the combination of two methods work together.
Basic Vernam formula is shown by this following equation.
𝐶𝑇 𝐵𝑖𝑡𝑃𝑙𝑎𝑛𝑒 = 𝑃𝑇 𝐵𝑖𝑡𝑃𝑙𝑎𝑛𝑒 𝑥𝑜𝑟 𝐾𝑒𝑦 BitPlane (1)
Where:
CT BitPlane : Set of bits of aftercode message
PT BItPlane : Set of bits of original message
Key BitPlane : Set of bits of password
III. IMPLEMENTATION
Let's look at the next example. The following table shows
the value of light intensity which converted to pure decimal
binary code.
PBC Pixel Segmen 1
0 1 2 3 4 5 6 7
0 127 27 29 39 49 65 67 69
1 31 52 12 1 7 0 1 10
2 23 29 24 28 37 44 41 21
3 9 14 20 35 32 44 34 1
4 54 44 63 47 59 85 60 74
5 117 91 121 169 186 185 203 190
6 170 181 193 209 208 213 216 235
7 200 198 179 184 198 187 199 247
Table 1 : 8x8 pixel of Image Light Intensity
The data above is cut from image light intensity. We can see
each segment contains 64 pixels. The light intensity is
measured from 0-255 as a binary system. The PBC form must
converted to CGC to remap the subpixels in order to perfom the
message insertion. Tabel 2 and 3 show the comparison of both
form.
PBC (Pure Binary Code)
0 1 2 3 4 5 6 7
0 01111111 00011011 00011101 00100111 00110001 01000001 01000011 01000101
1 00011111 00110100 00001100 00000001 00000111 00000000 00000001 00001010
2 00010111 00011101 00011000 00011100 00100101 00101100 00101001 00010101
3 00001001 00001110 00010100 00100011 00100000 00101100 00100010 00000001
4 00110110 00101100 00111111 00101111 00111011 01010101 00111100 01001010
5 01110101 01011011 01111001 10101001 10111010 10111001 11001011 10111110
6 10101010 10110101 11000001 11010001 11010000 11010101 11011000 11101011
7 11001000 11000110 10110011 10111000 11000110 10111011 11000111 11110111
Table 2 : Pure Binary Code Segment
CGC (Canonical Gray Code)
0 1 2 3 4 5 6 7
0 01000000 00010110 00010011 00110100 00101001 01100001 01100010 01100111
1 00010000 00101110 00001010 00000001 00000100 00000000 00000001 00001111
2 00011100 00010011 00010100 00010010 00110111 00111010 00111101 00011111
3 00001101 00001001 00011110 00110010 00110000 00111010 00110011 00000001
4 00101101 00111010 00100000 00111000 00100110 01111111 00100010 01101111
5 01001111 01110110 01000101 11111101 11100111 11100101 10101110 11100001
6 11111111 11101111 10100001 10111001 10111000 10111111 10110100 10011110
7 10101100 10100101 11101010 11100100 10100101 11100110 10100100 10001100
Table 3 : Canonical Gray Code Segment
4. Each bit-plane is calculated to obtain the value of
complexity. The complexity is counted from how many times
the bit change from 0 to 1 and from 1 to 0. The maximal bit
change value of 8x8 block is 112. The formula to calculate the
complexity is shown on equation 2.
𝛼 =
𝑘
𝑛
Where:
𝛼 : Complexity
k : Total bit change
n : Maximum change of 8x8 bit-plane
Table 5 shows the complexity of all bit-planes. We have to set
the limitation between informative and noise-like region. The
limit is called treshold. Basically, the standard value of treshold
is 0.3 but we can modify as needed. The modification is often
performed to avoid the informative area or to add the noise-like
area. The n value is set to maximum that is 112.
Bit-Plane Bit Change Complexity
1 9 0,080357142857
2 33 0,294642857143
3 34 0,303571428571
4 48 0,428571428571
5 61 0,544642857143
6 52 0,464285714286
7 57 0,508928571429
8 56 0,500000000000
Table 5 : The Complexity of Bit-Planes
From table 5, bit-plane number 1 and 2 are informative regions.
These bit-planes cannot be inserted by message because the
value of complexity is below the treshold. So the insertion is
skipped to the next bit-plane.
Assume we want to hide word “ANDYSAH!”. The word
consists of eight characters. It has eight bit-planes. Tabel 6 and
7 shows the original message and the bit-plane.
Char Dec. Biner
A 65 1000001
N 78 1001110
D 68 1000100
Y 89 1011001
S 83 1010011
A 65 1000001
H 72 1001000
! 33 100001
Table 6 : The Original Message
Bit Plane Message
0 1 2 3 4 5 6 7
0 0 1 0 0 0 0 0 1
1 0 1 0 0 1 1 1 0
2 0 1 0 0 0 1 0 0
3 0 1 0 1 1 0 0 1
4 0 1 0 1 0 0 1 1
5 0 1 0 0 0 0 0 1
6 0 1 0 0 1 0 0 0
7 0 0 1 0 0 0 0 1
Table 7 : The Bit-Plane of Message
The Vernam algorithm needs repeated key to make the cipher
text. Now we can see an example for the key. The key is
“SDM21”. The word is repeated until the length of bit-plane is
covered.
Char Dec. Biner
S 83 01010011
D 68 01000100
M 77 01001101
2 50 00110010
1 49 00110001
S 83 01010011
D 68 01000100
M 77 01001101
Table 8 : The Repeated Key
The key itself is converted to bit-plane model as shown on table
9. The bit-plane of key is called conjugation block. BPCS uses
conjugation block to converted informative region to noise-like
region. But now we replace the conjugation block with our own
block which can be set as we wish.
Bit Plane Message
0 1 2 3 4 5 6 7
0 0 1 0 1 0 0 1 1
1 0 1 0 0 0 1 0 0
2 0 1 0 0 1 1 0 1
3 0 0 1 1 0 0 1 0
4 0 0 1 1 0 0 0 1
5 0 1 0 1 0 0 1 1
6 0 1 0 0 0 1 0 0
7 0 1 0 0 1 1 0 1
Table 9 : The Bit-Plane of Key
The bit-plane of message and key must be transformed by
performing the exclusive or (xor). The result from both bit-
planes will be the cipher bit-plane. After all the bit-planes is
encrypted, the bit-planes are restored to its original position and
reconverted to pure binary code before finally rewritten to the
new image.
(2)
5. Cipher Bit-Plane
0 1 2 3 4 5 6 7
0 0 0 0 1 0 0 1 0
1 0 0 0 0 1 0 1 0
2 0 0 0 0 1 0 0 1
3 0 1 1 0 1 0 1 1
4 0 1 1 0 0 0 1 0
5 0 0 0 1 0 0 1 0
6 0 0 0 0 1 1 0 0
7 0 1 1 0 1 1 0 0
Table 10 : The Bit-Plane of Cipher
Table 10 shows the bit-plane after encrypted and table 11 shows
the bit-plane after conversion. We can see that the message is
turned to encrypted message.
Char Dec. Biner
18 00010010
10 00001010
9 00001001
k 107 01101011
b 98 01100010
18 00010010
12
00001100
l 108 01101100
Table 11 : The Cipher Message
V. CONCLUSION
From the calculations above, we can see BPCS can be
combined with encryption. But this encryption method is very
light but powerful. The calculation does not have to use
difficult mathematical operation. The way is just only to remap
the bit-plane by doing the exclusive or with the conjugation. All
we have to do is to find the correct key to produce the
informativeless region.
REFERENCES
Cachin, C. (2005). Digital Steganography. Switzerland: IBM
Research.
Kawaguchi, E., & Eason, R. (1998). Principle and applications
of BPCS. Kitakyushu: Kyushu Institute of
Technology.
Lahane, P., Kumbhar, Y., Patil, S., More, S., & Barse, M.
(2014). Data Security Using Visual Cryptography and
Bit Plane Complexity Segmentation. International
Journal of Emerging Engineering Research and
Technology, 2(8), 40-44.
Niimi, M., Noda, H., & Kawaguchi, E. (1998). A
Steganography Based on Region Segmentation by
Using Complexity Measure. Trans. of IEICE, 81(6),
1132-1140.
Pradnya , R. R., & Madki, M. R. (2012). High Capacity Data
Embedding Technique Using. International Journal
of Scientific and Research Publications.
Sarita, Lakhwani, K., & Choudhary, S. (2012). An Improved
BPCS Image Steganography In Integer Wavelet
Transform Domain Using 4x4 Block Size.
International Journal of Engineering Research &
Technology.
Spaulding, J., Noda, H., Shirazi, M. N., Niimi, M., &
Kawaguchi, E. (2002). BPCS Steganography Using
EZW Encoded Images. Digital Image Computing
Techniques and Applications.
Srinivasan, Y. (2003). High Capacity Data Hiding System
Using BPCS Steganography. Texas: Texas Tech
University.
Toosizadeh, S., & Farshchi, S. M. (n.d.). A Hybrid
Steganography Algorithm based on Chaos & BPCS.
Wang, S., Yang, B., & Niu, X. (2010). A Secure Steganography
Method based on Genetic Algorithm. Journal of
Information Hiding and Multimedia Signal Processing,
1, 29-34.