Dipanjali R. Khant.
|
|
- Jennifer Oliver
- 5 years ago
- Views:
Transcription
1 Design of an Algorithm for Image Steganography using Fractal Mathematics Dr. Hetal N. Patel Electronics and Communication Department A. D. Patel Institute of Technology New V.V. Nagar, Anand, India Dipanjali R. Khant Electronics and Communication Department A. D. Patel Institute of Technology New V.V. Nagar, Anand, India Dr. Darshana Prajapati Mathematics Department M& B Patel Women's Institute of Engineering New V.V. Nagar, Anand, India djprajapati@mbict.ac.in Abstract In order to improve the security of steganography system, we use fractal s as it has tremendous properties, such as ease of generation, sensitive dependence on their initial conditions,self-similarity and details at every scale. Information is embedded during creating fractal s by secret information. The receiver can extract the secret information by comparing the difference between Stego-Images and Cover- Images recovered with the same initial parameters. The attackers can t recover the Cover-Images without the initial parameters.the simulation results shows the imperceptibility and undetectability of the proposed algorithm.the value of PSNReachedup to46, and the value of MSE is vary between the range 0.04 to 3, as well as the value of NCreached up to0.9974and the scale (RGB Histogram) shows very minor difference. Keywords steganography, fractal s,mandelbrot set,steganalysis, NC, MSE, PSNR I. INTRODUCTION The term steganography [7] originated from the Greek word steganos meaning covered or protected and graphein meaning to write. Nowadays, it often refers to the science of invisible communication. Steganography can be defined as the art and science for hiding information in a way to prevent any person from retrieving hiding information without authentication. Steganography means, it is not to alter the structure of the secret message, but hides it inside a coverobject. After embedding process, cover object and stegoobject (carrying hidden information object) looks alike. Due to invisibility or hidden factor it is difficult to recover information without known procedure of steganography. Steganalysis is the process of detecting procedure of steganography [12]. There are two kinds of steganography for data hiding: spatial-domain based and transform-domain based methods. Spatial-domain based methods embed messages in the intensity of pixels of s directly [6] [25]. Among them, the least significant bit (LSB) method is the most wellknown [4] [14] [24]. While transform-domain based methods first transform a cover into a new domain and then messages are embedded in the form of transform coefficients[13] [20]. According to cover file type, steganography is classified into four types which are text, audio,, and video steganography [19]. Each steganography communication system consists of an embedding algorithm and an extracting algorithm [23]. To accommodate a secret message in a digital cover, the original cover is modified by applying the embedding algorithm, the result is modified cover object that contains the secret message and it is called stego object. To extract a secret message from the stego object, the extracting algorithm works in reverse way than the embedding algorithm, the result is the secret information [23]. As in today s era, maximum amount of data are communicated through internet. For secure internet transaction, various kind of data hiding techniques have been developed by researcher. Steganography in fractal s can be considered much more secure [8].Fractal s are generated by iterative functions, which can be encoded and decoded using an initial value. So, using fractal s, the steganography operation becomes efficient and have less distortion. Using an initial value, the original secret data can also be recovered without any visual loss. Mei-Yi Wu et al [17]introduced a novel iterative method of palette-based steganography that minimizes the RMS error between an original and its stego-. The method is based on a palette modification scheme, which can iteratively embed one message bit into each pixel in a palette-based. Shoko Imaizumi et al. [10] discussed an efficient Steganographic scheme for palette-based s that improves the maximum length of the embedded message and does not seriously degrade the quality. Mohamed L. Barakat et al. [22] focused on a novel encryption system based on diffusion and confusion processes in which the information is hidden inside the complex details of fractal s. Huaxiong Zhang et al. [9] gave a method of steganography based on fractal s is presented in which, use of properties of creation of fractal s, information are embedded during creating fractal s by secret information and initial parameters. In this paper, we proposed an algorithm on steganography using fractal s.the rest of the paper is organized as follows. In Section II, we present the Steganography algorithm based on Mandelbrot set fractal s, while Section III describes simulation results and
2 Section IV describes performance analysis. Finally, conclusion has been drawn. II. STEGANOGRAPHY ALGORITHM BASED ON MANDELBROT SET FRACTAL IMAGES In the proposed Image steganography algorithm, the secret is embedded on the fractal cover. Fractal s are more secure because of its characteristics such as forms and colors that characterized its beauty and consistency. Fractal s have high capacity to embed data without any distortion and also its dependence on initial input (which is a secret key) so that no intruder can generate the same fractal without knowing the secret key. In generation process of the fractal s, the secret information are embedded into the fractal in order to obtain the stego-. A. Image generation In the process of generating the cover (Mandelbrot set), true colors are used, which is known as RGB plane and is represented as a matrix of 3D (M N 3). E very pixel is a combination of red, green, and blue colors. The RGB plane is best suited to hide secret information because it contains a large amount of information that provides space to hide such secret information. It also considered as a technique to store a large number of bits in each channel (R, G, B) of the pixel. The Mandelbrot set, named after Benoit Mandelbrot, is a fractal which lie on complex plane. Fractals are objects that display self-similarity at various scales. Magnifying a fractal reveals small-scale details similar to the large-scale characteristics. Although the Mandelbrot set is self-similar at magnified scales, the small scale details are not identical to the whole. In fact, the Mandelbrot set is infinitely complex. Yet, the process of generating it, is based on an extremely simple equation involving complex numbers. The iterated function systems(ifs) are commonly used to generate fractals. It's the set of all complex numbers z for which the sequence is defined by the equation, = +, = 1, 2, (1) Steps to generate Mandelbrot fractal: Step 1: The complex vector is generated by making the real component as x- values and imaginary component as y- value. Step 2: Iterate the function using the equation (1). Step 3: Compute and sum the magnitude of iteratively till the magnitude is lessthan threshold. Step 4: Generate the fractal of the resultant magnitude obtained in step 3, using color determined by the number of iterations. By changing the threshold values and iterating equation (1) for sufficient number of iterations (Table I), we get various fractal s as shown in Fig TABLE I. PARAMETER FOR FRACTAL IMAGE GENERATION Iteration Threshold A B C D E Fig. 2.1 Generation of fractal for the parameter A, B, C, D and E (as per table I). B. Information embedding Fig. 2.2 shows the embedding process to embed the secret into the stego-. The process of embedding is executed in each channel (Red, Green, and Blue) of the cover which is generated by fractal as discussed in section II (A). The fractal and the secret are separatedinto three channels (Red, Green, and Blue) separately. Now extract the bit-plane of secret in red, green and blue channel using bit plane slicing technique. The first bit-plane is the least significant one (LSB) and most of the time is hardly related to the main shapes of the picture. On the other hand, the last bitplane is the most significant one (MSB) and contains the main lines and edges of the picture. Secret Generate fractal Initial parameter Divide into Red, Green and Blue plane Fig. 2.2 embedding process/information embedding model Now, we put the significant message bit-planes of red plane of secret into the cover of red plane, green plane of secret into the cover of green plane and blue plane of secret into the cover of green plane. After embedding the bits into the cover, we reconstruct the cover. This modified is called as Stego- that contains the secret. C. Information extracting Divide into Red, Green and Blue plane Bit-planes extraction Stego - Fig. 2.3 shows the extraction process to extract the secret from the stego-. The initial parameter is used to determine the form of fractal, each value of
3 initial parameter gives its own sets of fractal, so the first step undertaken by the recipient for the purpose of extracting secret information is interested in creating a fractal same as the encoding process and then begin the process of extraction. Secret Generate fractal Divide into Red, Green and Blue plane Divide into Red, Green and Blue plane Extract the secret using bit-plane slicing technique Secret using proposed algorithm. Finally, after embedding process, the stego- will be generated. In the case of color each pixel is composed of RGB values and each of these colors requires 8-bit for its representation. [R (8 bits), G (8 bits), B (8 bi ts)]. In this case, the process of embedding secret is similar to the process of embedding in gray scale but the size of the cover is doubled to accommodate all the bits of the secret s for embedding. Now, we tested the algorithm for various gray scale and color s for embedding process and the results are as shown in the Fig (a) (b) (c) Initial parameter Fig 2.3 extraction process/information extracting model Extract Red, Green and Blue plane from fractal as well as Extract Red, Green and Blue plane from stego-, then subtract the stego- from the created fractal. After obtaining the subtracted, perform bit plane slicing technique to extract the bit of secret. Use the embedding sequence to extract the bit strings from each plane of the. Combine all these bit-planes into one to find the recovered secrete. III. SIMULATION RESULTS In this study, the experimental setup consists of Windows 7 professional operating system, Intel(R) Core(TM) i7-3770m CPU, 3.40 GHz Processor Laptop-PCs having 3.33 gigabytes of memory (RAM) and 32 -bit operating system. The optimization algorithm was implemented by the MATLAB, The Language of Technical Computing using version of (R2012a) licensed by The Math works Inc. The proposed algorithm is tested for both; the gray scale and the color s of size 384x512. The quality of the output stego- is measured through various parameters such as PSNR, MSE, Histogram, and NC etc. A. Encoding The proposed algorithm is implemented in MATLABversion of (R2012a) for computer simulations for various input s. The cover is generated by iterated function and its size is pixels. For experiment purpose the size of the cover and the secret would be same for gray scale s and that of doubled for the color s. The proposed algorithm is simulated for various s of size pixels. The cover which is generated by fractal is of size pixels, which is resized to the size of secret ( pixels) for embedding process for the gray scale. Now, secret is embedded into the cover of cameraman (Img1) Image of bus (Img2) Image of ADIT entrance (Img3) Image of berry (Img4) Image of leaf (Img5)
4 Image of fruits (Img6) Fig. 3.1 Output of embedding process ((a) cover (b) secret (c) stego-) B. Decoding During extraction process, each color plane will be used for bit plane decoding than decoded bits will be used for generate the secret. After extraction algorithm on stego-, the original secret and extracted secret were found similar. IV. PERFORMANCE ANALYSIS Image quality metrics that are used to measure Steganographic s work on a comparison between the original bits with the Steganographic bits, in order to test the difference between both s, The most appropriate metrics for this purpose are: Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE) and RGB Histogram. the proposed scheme is tested over different cover s and secret data and the results demonstrated its effectiveness and robustness, As the value of (PSNR) reached to (45), and the value of (MSE) approximately (0) and NC nearly equal to 1; as well as the scale of RGB Histogram did not show any difference, as shown in Fig A. Histogram analysis Fig. 4.1Histogram analysis Fig. 4.1clearly shows that the proposed steganography algorithm is suitable to use forsteganography purpose, because histogram analysis represents that the distribution of pixels in the secret and stego- is nearlysame. So, visually it is not possible to identify the existence of the embedded message in the cover. B. Peak Signal to Noise Ratio, MSE and NC Analysis The PSNR of a given color component is the ratio of the mean square difference of the component for the two s to the maximum mean square difference that can exist between any two s. It is expressed as a decibel value. = ( ) (2) The mean-squared error (MSE) between cover s and stego-s are defined by = 1 [ (, ) (, )] (3) Where, M=number of rows N=number of columns The NC is one of the best known methods that evaluate the degree of closeness between the cover and the stego. The NC can be calculated using the following equation = [ (, ) (, )] (, ) Where, M=number of rows of N=number of columns (4)
5 The PSNR value approaches to infinity as the MSE approaches to zero; this shows that a higher PSNR value provides a higher quality. Our proposed work also analyze Peak-Signal-to-Noise- Ratio (PSNR), MSE and NC between stego-s and original cover s (using equation (2), (3), and (4))f or various gray scale and color s as shown in Table II. TABLE II. PEAK SIGNAL TO NOISE RATIO AND MSE Sr no. Secret Image Proposed Technique Res: (384x512) PSNR MSE NC 1 Img Img Img Img Img Img Img Img Img Img Img Img Img Img Img From Table II, it can be seen that the PSNR values after steganography are very high, which indicates that the amount of noise introduced in the as a result of steganography is very less. The greater PSNR value (>30dB) shows the better quality recovered. V. CONCLUSION In the proposed algorithm, the fractal s are chosen as the carrier of information hiding due to its characteristics of the ease of generation,sensitive dependence on their initial conditions, self-similarity and details at every scale. The algorithm is tested for different cover s and secret s and it is observed thatthere is enhancement in results of the quality metrics. The simulation results shows imperceptibility and un-detectability in stego-, as the value of PSNR reached upto 45, and the value of MSE is vary between the range of 0.04 to 3, as well as the value of NC reached upto andthe scale (RGB Histogram ) showsvery minor difference. ACKNOWLEDGMENT This work is supported by GUJCOST minor research project grant. Authors thank to Dr. R K Jain (Principal) and Dr.V K Thakar (Head of EC Department) of A. D. Patel Institute of Technology, New V.V. Nagar for their constant motivation, support and encouragement. REFERENCES [1] A E Jacquin, Fractal coding: A review, Proc.IEEE, vol. 81, 1993, pp [2] Agaian S S, Susmilch J M, Fractal steganography using artificially generated s, Proc. IEEE Region 5 Conf., San Antonio, 2006, pp [3] B Wohlberg, Ganger, A Review of the Fractal Image Coding Literature, IEEE Trans. on IP, vol. 8, 1999, pp [4] C. C. Chang, C. Y. Lin, and Y. Z. Wang, "New steganographic methods using run-length approach," Information Sciences, vol. 176, pp , [5] Cox I J, Miller M L, Bloom J A, Fridrich J, Kalker T, Digital Watermarking and Steganography, Elsevier, [6] D C Wu and W H Tsai, A steganographic method for s by pixelvalue differencing, Elsevier,Pattern Recognition Letters, vol. 24, pp , [7] F A Petitcolas, R J Anderson and M G Kuhn, Information hiding a survey, Proc. of the IEEE, vol. 87, 1999, pp [8] Hui Lv, Huaxiong Zhang, Xiangjun Weng, A Steganography Scheme Based Fractal Images, Journal of Harbin Institute of Technology,vol. 38, pp , [9] Huaxiong Zhang, Jie Hu, Gang Wang Yu Zhang, A Steganography Scheme Based on Fractal Images, Second International Conference on Networking and Distributed Computing, 2011, pp [10] Imaizumi S, Ozawa K, Palette-Based Image Steganography for High- Capacity Embedding, Bull. Soc. Photogr. Imag. Japan, vol. 25, No. 1, 2015, pp [11] Jian Lu, Yuru Zou, Chaoying Yang, and LijingWang, A Robust Fractal Color Image Watermarking Algorithm, Hindawi Publishing Corporation Mathematical Problems in Engineering, vol. 10, 2014, pp [12] Kahn D, Goos G and Hartmanis J, The history of steganography, The First International Workshop on Information Hiding, LNCS, vol. 1174, 1996, pp [13] K. Munirajan, E. Cole, and S. Ring, Transform domainsteganography detection using fuzzy inference systems,ieee Sixth InternationalSymposium onmultimediasoftware Engineering Proceedings, 2004, pp [14] L. Shao-Hui, C. Tian-Hang, Y. Hong-Xun, and G. Wen, A variable depth LSB data hiding technique in s, IEEE Proceedings of International Conference onmachine Learning andcybernetics, vol.7, 2004, pp [15] M. Wu, E. Tang, B. Liu, Data Hiding in Digital Bianry Images, Proc. of the IEEE Int. Conf. On Multimedia and Expositions, 2000, pp [16] M. Niimi, H. Noda, E. Kawaguchi, High Capacity and Secure Digital Steganography to Palette-Based Images, Proc. of IEEE International Conference on Image Processing, 2002, pp [17] Mei-Yi Wu, Yu-Kun Ho, Jia-Hong Lee, An iterative method of palettebased steganography, Elsevier, Pattern Recognition Letters, vol. 25, 2004, pp [18] Ming Hong Pi, Chun Hung Li and Hua Li, A Novel Fractal Image Watermarking, IEEE Transactions On Multimedia, vol. 8, No. 3, 2006, pp [19] Neil F. Johnson, Sushil Jajodia, Steganograpy: Seeing the Unseen, IEEE Computer,pp , [20] N. Kafri and H. Y. Suleiman, Bit-4 of frequency domain-dct steganography technique, First International Conference onnetworked Digital Technologies,NDT, 2009, pp [21] Saraswat P K and Gupta R K, A Review of Digital Image Steganography, Journal of Pure and Applied Science & Technology, vol. 2, 2012, pp [22] S K Abd-El-Hafiz, A G Radwan, S H Abdel Haleem, M L Barakat, A fractal-based encryption system, IET Image Processing, vol. 8,2014, pp [23] S. Nanda Kishor, G. N. Kodanda Ramaiah and S. A. K. Jilani, A review on steganography through multimedia, IEEEInternational Conference on Research Advances in Integrated Navigation Systems (RAINS), 2016.
6 [24] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding,ibm Systems Journal, vol. 35, pp , [25] W Hong, T S Chen and C W Shiu, Lossless steganography for ambtccompressed s, Image and Signal Processing, CISP, 2008, pp [26] Zhu S, Chen J, Research on Fractal Image Coding Methods, IEEE International Conference on Computer Science and Information Processing (CSIP), 2012, pp
Digital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationMultibit Embedding Algorithm for Steganography of Palette-Based Images
Multibit Embedding Algorithm for Steganography of Palette-Based Images Shoko Imaizumi and Kei Ozawa Graduate School of Advanced Integration Science, Chiba University 1 33 Yayoicho, Inage-ku, Chiba-shi,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationSecured Double Layer Data Hiding Using Encryption and Decryption Techniques
Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet
More informationA Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution
Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationComparison of Wavelet Based Watermarking Techniques for Various Attacks
International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationChaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image
015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationOpen Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain
Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain
More informationEnhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack
2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of
More informationBit-Plane Decomposition Steganography Using Wavelet Compressed Video
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationImage Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels
International Journal of Computer Science & Communication Vol., No. 2, July-December 200, pp. 35-356 Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels Kirti Arora Jasuja & Baljit
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More informationCHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM
74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationA New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique
A New Approach to Authenticate Images in Different Datasets Using a Lossless Image Watermarking Technique 1 Arathi Chitla, 2 Dr. M. Chandra Mohan 1 Associate Professor, Department of Computer Science &
More informationQR-Code Image Steganography
M. Ramesh 1,,G.Prabakaran 2 and R. Bhavani 3 1 Department of CSE, Assistant Professor, AVS college of Engineering & Technology, Nellore 524 111, India. 2,3 Department of CSE, Faculty of Engineering & Technology,
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationDr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Arduino Based Text
More informationDIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING
DIGITAL IMAGE WATERMARKING TECHNIQUES FOR IMAGES USING TWO-DIMENSIONAL WALSH CODING Ajeet Pratap Singh 1, Sachin Kumar 2 1,2 Department of ECE, ASET, Amity University, Lucknow, U.P., (India) ABSTRACT The
More informationDIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS
DICTA22: Digital Image Computing Techniques and Applications, 2 22 January 22, Melbourne, Australia. DIGITAL WATERMARKING FOR GRAY-LEVEL WATERMARKS *Yuk Ying CHUNG, Man To WONG *Basser Department of Computer
More informationRGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata
RGB Digital Image Forgery Detection Using Singular Value Decomposition and One Dimensional Cellular Automata Ahmad Pahlavan Tafti Mohammad V. Malakooti Department of Computer Engineering IAU, UAE Branch
More informationGA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption
GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security
More informationMultilayer Data Embedding Using Reduced Difference Expansion
Multilayer Data Embedding Using Reduced Difference Expansion DINESH SATRE 1, DEVYANI BONDE 2, SUBHASH RATHOD 3 Department Of Computer Engineering Marathwada Mitra Mandal s Institute of Technology Savitribai
More informationLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography
Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,
More informationDATA hiding [1] and watermarking in digital images
14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationSCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT
SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT- Shaveta 1, Daljit Kaur 2 1 PG Scholar, 2 Assistant Professor, Dept of IT, Chandigarh Engineering College, Landran, Mohali,
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationOverview Of Techniques Of Stegnography On Various Media
Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationA Digital Video Watermarking Algorithm Based on LSB and DCT
A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In
More informationEMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS
EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,
More informationSpeech Modulation for Image Watermarking
Speech Modulation for Image Watermarking Mourad Talbi 1, Ben Fatima Sira 2 1 Center of Researches and Technologies of Energy, Tunisia 2 Engineering School of Tunis, Tunisia Abstract Embedding a hidden
More informationHyper Edge Detection with Clustering for Data Hiding
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 1, January 2016 Hyper Edge Detection with Clustering for Data Hiding Raniyah
More informationCOMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING
International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta
More informationImage Error Concealment Based on Watermarking
Image Error Concealment Based on Watermarking Shinfeng D. Lin, Shih-Chieh Shie and Jie-Wei Chen Department of Computer Science and Information Engineering,National Dong Hwa Universuty, Hualien, Taiwan,
More informationReversible Texture Synthesis for Data Security
Reversible Texture Synthesis for Data Security 1 Eshwari S. Mujgule, 2 N. G. Pardeshi 1 PG Student, 2 Assistant Professor 1 Computer Department, 1 Sanjivani College of Engineering, Kopargaon, Kopargaon,
More informationPiecewise Permutation Steganography for 3D Humanoid Mesh Models
Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationA Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing
A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing Jasvinder Singh 1, Mehak Aggarwal 2, Kulbhushan Singla 3 1Student M.Tech Dept. of Computer
More informationLearning based face hallucination techniques: A survey
Vol. 3 (2014-15) pp. 37-45. : A survey Premitha Premnath K Department of Computer Science & Engineering Vidya Academy of Science & Technology Thrissur - 680501, Kerala, India (email: premithakpnath@gmail.com)
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationFRAGILE WATERMARKING USING SUBBAND CODING
ICCVG 2002 Zakopane, 25-29 Sept. 2002 Roger ŚWIERCZYŃSKI Institute of Electronics and Telecommunication Poznań University of Technology roger@et.put.poznan.pl FRAGILE WATERMARKING USING SUBBAND CODING
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationInternational Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X
Robust and Protected Data Hiding in Natural Image Using Steganography Technique Abha Sharma 1, Prof Shreechandra Upadhyay 2, Prof Rajkumar Paul 3 1 (Research scholar, M.tech in Computer science, VIT Bhopal
More informationMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography
More informationIJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 03, 2016 ISSN (online):
IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 03, 2016 ISSN (online): 2321-0613 Image Watermarking using Fractal Based Neighborhood Search Method Gamit Tejal D P.G.
More informationSTEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES
STEGANOGRAPHY USING 2LSB PARITY CHECK AND BPCS TECHNIQUES Prof. Dipti Dighe 1, Swati Dubey 2, Prof. Shubhangi Takawane 3 1,2,3 Electronics and telecommunication Engineering Department, G.S. Moze College
More informationImage Authentication and Recovery Scheme Based on Watermarking Technique
Image Authentication and Recovery Scheme Based on Watermarking Technique KENJI SUMITOMO 1, MARIKO NAKANO 2, HECTOR PEREZ 2 1 Faculty of Information and Computer Engineering The University of Electro-Communications
More informationSELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras
SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN E. E. Varsaki, V. Fotopoulos and A. N. Skodras Digital Systems & Media Computing Laboratory School of Science and Technology, Hellenic
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationData Hiding in Color Images Using Modified Quantization Table
Data Hiding in Color Images Using Modified Quantization Table Neha Batra 1 Pooja Kaushik 2 1 Pursuing M.Tech, Dept., of ECE, MMU, Mullana, India 2 Assistant Professor, Dept., of ECE, MMU, Mullana, India
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationDesign and Performance Evaluation of Boolean based Secret Image Sharing Scheme
Design and Performance Evaluation of Boolean based Secret Image Sharing Scheme Javvaji V.K. Ratnam 1, T. Sreenivasulu Reddy 2 and P. Ramana Reddy 3 1 Research Scholar, Faculty of Electronics and Communication
More informationAn Enhanced Edge Adaptive Steganography Approach using Threshold Value for Region Selection
An Enhanced Edge Adaptive Steganography Approach using Value for Region Selection Abstract Sachin Mungmode 1, R. R. Sedamkar 2 and Niranjan Kulkarni 3 1 Department of Computer Engineering, Mumbai University,
More informationEfficient Image Steganography Using Integer Wavelet Transform
Efficient Image Steganography Using Integer Wavelet Transform DHIVYA DHARSHINI. K 1, Dr. K. ANUSDHA 2 1 M.Tech, Department of Electronics Engineering, Pondicherry University, Puducherry, India. 2 Assistant
More informationAuthentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
, 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
More informationAdaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationAn Improved Performance of Watermarking In DWT Domain Using SVD
An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,
More informationReversible Image Data Hiding with Local Adaptive Contrast Enhancement
Reversible Image Data Hiding with Local Adaptive Contrast Enhancement Ruiqi Jiang, Weiming Zhang, Jiajia Xu, Nenghai Yu and Xiaocheng Hu Abstract Recently, a novel reversible data hiding scheme is proposed
More informationA New DCT based Color Video Watermarking using Luminance Component
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XII (Mar-Apr. 2014), PP 83-90 A New DCT based Color Video Watermarking using Luminance Component
More informationMultipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning
Multipurpose Color Image Watermarking Algorithm Based on IWT and Halftoning C. SANTIAGO-AVILA, M. GONZALEZ LEE, M. NAKANO-MIYATAKE, H. PEREZ-MEANA Sección de Posgrado e Investigación, Esime Culhuacan Instituto
More informationACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images
ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw
More informationA DWT and DCT based Hybrid Approach for Audio Watermarking
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.
More informationApplication of Data Hiding in Audio-Video Using Advance Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationQuality based JPEG Steganography using balanced Embedding Technique
Second International Conference on Emerging Trends in Engineering and Technology, ICETET-09 Quality based JPEG Steganography using balanced Embedding Technique Mohammed Ishaque Department of Computer Science
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationA Image Steganography based on Non-uniform Rectangular Partition
120 A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala Y. Dasradh Ram Reddy G. Srinivasa Reddy BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P Abstract
More informationKnowledge Exploration in Image Text Data using Data Hiding Scheme
, March 15-17, 2017, Hong Kong Knowledge Exploration in Image Text Data using Data Hiding Scheme M. Thangamani, Member, IAENG, Jafar Ali Ibrahim. S, Member, IAENG Abstract: Reversible data hiding is a
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationAn Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function
An Adaptive Data Hiding Method Using Neighborhood Pixels Differencing Based On Modulus Function Najme Maleki, Mehrdad Jalali, Majid Vafaei Jahan Department of Computer Engineering, Mashhad Branch, Islamic
More informationData Embedding Method Using Adaptive Pixel Pair Matching Algorithm
Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Mr. K. Nandha Kumar 1, Mr. R. Anandan 2 1PG Scholar, Department of Electronics and Communication Engineering, Gojan School of Business
More informationWebpage: Volume 4, Issue V, May 2016 ISSN
EMBEDDING & EXTRACTION OF POWER DATA INTO A AUDIO FILE USING MODIFIED DIRECT SEQUENCE SPREAD SPECTRUM TECHNIQUE Vijeta Pandey 1, Vikas Verma 2, Gourav Sharma 3 1,M.Tech Student, Electrical Engineering
More informationarxiv: v1 [cs.cr] 31 Dec 2018
Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,
More information