MP3 Steganalysis Based on Neural Networks

Size: px
Start display at page:

Download "MP3 Steganalysis Based on Neural Networks"

Transcription

1 International Journal of Engineering & Technology IJET-IJENS Vol:15 No:04 74 MP3 Steganalysis Based on Neural Networks Ala Alarood, Azizh Abdulmanaf, Subariah Ibrahim, Mohammed J. Alhaddad. Abstract Information secrecy is one of the largest concerns of the researchers these days. Steganography technique used to hide a massage into an object (Text file, Audio file Wave, MP3 or Video). Steganography was improved and developed using computer systems because of multimedia rising in the modern world. In this paper we developed a technique to reveal the MP3 Steganography message using Artificial Neural Network ANN. This technique is used an MP3 file that already has hide a message using LSB. The result was promising. Index Term Steganography, MP3, ANN, LSB, stego file. I. INTRODUCTION Information secrecy is a big concerns hence the ancient world. Different techniques to hide the actual content of the message were raised up depending on the age of human culture and the technical aspects. With computer era the message transfer becomes easier and faster with very high complexity to hide the actual content of the message. The message contents could be hidden using cryptography or either the message itself could be hidden using steganography techniques. Steganography was improved and developed using computer systems because of multimedia rising in the modern word. Image steganography improvement started many years ago with little efficiency. Nowadays, MP3 and audio steganography becomes more and more usable in multimedia transfer over storage media, internet, and social media. The security of MP3 steganography is much larger than it for image steganography, while the same concepts could be implemented for both, such as least significant bit(s) insertion. Mr. Alaa alarood He still continues his Ph.D. in Universiti Teknologi Malaysia (UTM) Faculty of computing. He is Lecturer of king abed alaziz university, Department of Computing and Information Technology.His research interests are Artificial Intelligence ANN, Information Security, and Computer Graphics. (aaarood@kau.edu.sa) Prof. Azizah Abdul Manaf, Professor of Computer Science, Deputy Dean Academic Advanced Informatics School (UTM AIS) Universiti Teknologi Malaysia (UTM) His research interests are Image Processing, Multimedia Security, Computer Forensics, azizaham.kl@utm.my Subariah Ibrahim Associate Professor in Faculty of computing at Universiti Teknologi Malaysia (UTM) His research interests are cryptography, steganography, security of data, pixels, authentication. subariah@utm.my Mohammed J. Alhaddad Associate Professor in Faculty of Information Technology at King Abdul-Aziz University. Honorary Lecturer at Essex University, UK, School of Computer Science and Electronic Engineer and Visiting Associate Professor at University Teknologi Malaysia, His research interests are: network Security, Artificial Intelligence, Robots, Brain Computer Interface BCI (malhaddad@kau.edu.sa). Thus, attacker of MP3 steganography should be designed in more intelligent and deterministic way in comparison with image steganography in order to attack the MP3 stego file. Since the rabidly rise of computer technology and artificial intelligence theorems, strategies, and researches, information and messages handling become a hot area that could be adapted for different fields of applications. In fact the protection and privacy of the information transfer is a major field that the modern technology should solve, lead to continuous developments and researches in both, cryptography and steganography [1]. The secret messaging in ancient world and modern technologies is falling in one of two fields; cryptography and steganography. Cryptography is to hide the message content where the message itself is obvious, but no one can understand its contents unless the specialized personnel. In contrast, the steganography is the art of hiding the message itself, while in such, no one can see the massage, and the media that transfer it should be seen as normal media with no any additions, such as text message. An example of cryptography is the ancient word is the Fibonacci series coding. Where the series should be associated with a specific book. Then, the series will point to specific words in that book in such a way that the word number in the book is pointed by the number in the series. Collecting those numbers will generate the secret message. An example of hybrid cryptography-steganography coding is the cryptex, which is a marble box that contains different block of marble representing a beautiful piece. Arranging the marble blocks represents a secret message that couldn t be seen for the normal people. In addition, if the person knows that, the piece is a cryptex, then, he couldn t understand what message this box includes. In modern years, the computer technology added more complexity and flexibility in data communication. The messages become very easy to be transported. The cryptography were adapted and improved in terms of data encryption and compression, whereas the steganography becomes more common in pictures. The weakness and problems of image based steganography induced the researched in sound files steganography, and may be video files steganography. While in such, the message is being hidden inside image, sound file, or video file respectively [2]. Attack of MP3 stego messages is not an easy task in comparison with the image steganography. This paper implements a complex artificially intelligent way to attack the MP3 file and determine if it contains a stego message or not. II. PROBLEM AND OBJECTIVES The presence of hidden information in the digital word is concerns of protecting the data from attack while transfer over internet or any other digital media (i.e. CD, HDD, DVD, USB-stick... etc.). Steganography is commonly

2 International Journal of Engineering & Technology IJET-IJENS Vol:15 No:04 75 known as intelligent data transfer security. Hiding the information in a picture and using the digital image for many reasons like their frequently use on the internet for hiding secret information, is a good and cheap way for transfer, it costs no running cost. And also, for secret communications, no direct transfer channel is being used, just, the sender can upload the photo to the internet and the receiver can download it safely. Modern researchers were focusing on developing different techniques of steganography in order to implement and met the requirements of different aspects that could handle the secret message transfer. MP3 steganography was introduces as a higher level secure steganography than the image steganography. In addition, audio file can hold much higher data size than the image steganography. The attack of those steganography methods becomes not easy. The real reliable steganography techniques cooperate very high security level, immunity due to noise, and different transfer media. In fact, hence the MP3 or audio signals has common structure, then, hiding information within it should make a change on that structure. So, there are some methodology in some design can attach that inconsistency of the MP3 stego file. The inconsistency should be generated from the change that must be made on the basic structure of the audio file. So, researches should study that point, analyze different stego files, and get the high impact points that will carry the stego message characteristics with different stego designs and architecture. Those points will be used to attack the MP3 stego files. This paper proposes a modern and efficient technique to achieve security attack of MP3 steganography files based on intelligent artificial neural network design. The developed algorithm should handle MP3 stego files with high security and low distortion. The low distortion MP3 stego files is more robust against attack, because of that, the higher distortion media file is the higher questions marks about its contents, and the ability to process the message contents through the distortion. Neural network implementation will be based upon extracted features from the input MP3 file. Such parameters are studied almost in trails with the neural network design. The extracted features contain the dominant information or features, where those are possible to hold the enough information about steganography processing occlusion within the file. Actually, the structure inconsistency of the stego file is almost non-linear, and sometimes it is time variant structure. So, it s not easy to attach it in one common methodology. The adaptation and design of neural network enable to handle both, time variant and non-linear systems. Thus, the objective of this paper is to detect if an-arbitrary MP3 file contains a steganography message inserted within its structure contents or not. It should be able to distinguish the audio files with very low distortion contents. III. RELATED WORK MP3 steganography was adopted and get rise in the researches when the images becomes weak cover of the stego data. Several methods exist to utilize the concept of Steganography as well as plenty algorithms have been proposed in this regard, especial when working in images. To gather knowledge in this particular research field, we have concentrated on some techniques and methods which are described below. S.K.Bandyopadhyay, Debnath Bhattacharyya proposed introduced the most common techniques in steganography, least significant bit (LSB) insertion. This is a common approach and simple [3]. That approach embeds information in a carrier data. For images as a covering media, the LSB of a pixel is replaced with an M s bit. When working with 24-bit images as carrier, 3-bits can be stored in each pixel by modifying the LSBs of R, G and B array. The resulting image looks identical to the original image. The LSB insertion also adopted to be done in audio cover of the stego data. This method is the oldest computerized steganography method and the most common. It depends only on replacing one or more bits from least significant part of the digital media data contents. In contrast, it s the simpler method and has many weak points on it. For example, it s direct method that enables any one to search within the least significant bits of any multimedia file with simple methodology. Accumulative computer programs can easily to such tasks. Nameer N. EL-Emam Proposed an algorithm to get more level of security on LSB insertion steganography approach. That modification improves higher level of security [4]. This makes the original LSB insertion more difficult to attach. But it becomes weaker these days during the diffusion and common use of LSB insertion method. The conventional LSB method depending on inserting the message bits directly to the cover multimedia file. This research improves the security of LSB by encrypting the message before inserting it. This make the effort that is needed to attach the stego file multiplied by 3 at least Illustrated many concepts and basics related to the steganography and how to hide data messages. A method for hiding data inside a billboard was presented and described. An online data hiding steganography was presented to hide data in output display of an instrument [5]. The improvement of least significant bits insertion was done here. The insertion of message bits becomes not sequential and non-uniform. This means that, inserting the message will be based on predefined series of locations within the multimedia file. In fact, even though this methodology makes an improvement of security rather than LSB, but it still very weak and limited in size of embedded message. Waffaa S. Ahmed at el. presented audio steganography based on amplitude modulation. It transforms the audio signal to wavelet domain and the secret data are being embedded inside the wavelet coefficients. The amplitude modulation process was used to embed the data within the wavelet coefficients [6]. This process has many drawbacks. The first is that, the secret message is not encoded. So, its security level is not rigid. The second is that, the amplitude modulation causes large distortion to the original signal. This makes the original signal very bad in addition to make it weak for the attacks. The hiding rate is relatively low with respect to the high distortion that is resulted. In addition to that, the processing power that is needed in amplitude modulation is very large and it comprises approximations because of that, the amplitude modulation is analogue modulation process.

3 International Journal of Engineering & Technology IJET-IJENS Vol:15 No:04 76 B. Geetha vani at el., is a hybrid technique that incorporates the steganography and the cryptography together [7]. The encrypted message is directly inserted within the audio signal that is being transformed to discrete wavelet transformation. In fact, the security that was gotten in this literature paper is resulted from the cryptography and encryption algorithm that has been used. So, there is no real effect for the basic steganography technique that was implemented[8]. The work that is presented in this paper is unique; it used the concepts that was presented in the above literatures, and solve the problem that those were faced. In MP3 steganography, the presented paper shows how to attack the different MP3 stego files by implementation of well-structured neural network and analytical attack system. IV. METHODOLOGY The aim of this paper is to process the MP3 file and determine if it s a steganography file or not. The steganography methodology that was aimed as illustrated in section 1 is a complex formulation that makes the data consistent, thus, there is no simple way to attack it. A statistical analysis could be done to find the inconsistency of the audio file when external heterogeneous data exists. In fact, huge statistical analysis is needed to find a way to attack the file. On the other hand, intelligent computational technique could be used instead of pure mathematical analysis, like neural network. Neural network combines many benefits as intelligent detectors or recognizers. It s non-linear, multi-input and multi-output, can handle time variant and invariant systems, in addition to its simpler mathematical structure, with intelligent machine adaptive machine learning techniques. The Neural network, that we designed is comprises many trail and Erro Process as it shown in figure 1 and consists of two things; the first is the structure of network while the second is the input vector of the network. It works in two modes, training mode, and simulation mode. Training comprises that, historical input samples are entered to the network together with the target outputs. The target output is a historical output that is associated to each historical input. While the historical inputs and target outputs are being entered to the network. The training process builds the internal weight and bias vectors of the network, in general, the design of neural network structure comprises that, the selection of the network structure, including the network type, the number of layers, number of neurons in each layer, training function or algorithm, and the activation function for each layer. Our proposed system start by reading the input file, then exam it, if it is an audio file then the process will carry on, otherwise the system will be halt. All the necessary parameters such as file size, bit-rate, frequency and encoding etc. will be used to calculate the essential statistic information as it can be seen in table 1 and it will be used in the proposed system,. Afterward, the audio file will be converted into binary system to process the neural network processes, as shown in figure 2. TABLE I PARAMETERS OF THE MP3 FILE AS THE INPUT VECTOR OF DEVELOPED THE NEURAL NETWORK Parameter Size The variance of the total MP3 audio file 1 The variance of 2000 samples at start of the MP3 file 1 The variance of 2000 samples at end of the MP3 file 1 The variance of 2000 samples at the middle of the MP3 file 1 The standard deviation of the total MP3 file 1 The standard deviation of 2000 samples at start of the MP3 file 1 The standard deviation of 2000 samples at end of the MP3 file 1 The standard deviation of 2000 samples at middle of the MP3 1 The average of the total of MP3 file samples 1 The average of 2000 samples at start of MP3 file 1 The average of 2000 samples at end of MP3 file 1 The average of 2000 samples at middle of MP3 file 1 The correlation between the 1 and 2 channel of the audio MP3 1 The peak signal to noise ration of the MP3 file 1 The mean square error of the MP3 file 1 The sum square error of the MP3 file 1 Sampling frequency 1 Number of bits 1 Fig. 1. Research methodology that was followed in this paper Table 1 has a vector of 18 elements that will be entered to the proposed system which has three layers; input layer, output layer, and one hidden layer as shown in figure 2. The input layer consists of 50 neurons, and the hidden layer consists of 25 neurons, while the output layer is a single neuron layer. Fig. 2. The implemented neural network

4 International Journal of Engineering & Technology IJET-IJENS Vol:15 No:04 77 The proposed system were used 100 different MP3 file where used to train our model. The training samples where various and contains the different possibilities proprieties; some of the files where used to be 320Kbit encoding, 96Kbit, moreover, the size of the MP3 file and the hidden text are differ. In addition, the model were capable to exam a different LSB steganography technique, such as 1 bit insertion,2 bit insertion, 3 bit insertion and 4 bit insertion. V. RESULTS & CONCLUSION Different results were obtained from different scenario (different size of MP3 file, different encoding, different size of the text message that to be embedded into MP3 file). After using LSB (1, 2, 3, or 4 bit) Steganography to hide the message into MP3 file, the file will be send by the system or download it from a public site or transferee it by using CD or USB. The proposed model will detect if this file has a hidden message or not. Table II shown the total of empirical result of these scenarios which comprises two categories of testing files. The first are files contain stego messages and the second pure files without any message inserted within it. Thus, the implemented algorithm accuracy is being tested using non stego files and the results of false files rejection are illustrated in the second column in table II. This result is competitive and achieved high accuracy. On the other hand, the stego MP3 files are tested separately. TABLE II RESULTS OF APPLYING A DETECTION PROGRAM ON TEST PATTERN OF THE STEGO MP3 FILES MP3 Encoding Not stego file detection Stego file detection 8K 98% 98% 24K 97% 98% 48K 99% 97% 96K 97% 97% 128K 97% 98% 192K 98% 99% 320K 98% 98% Fig. 3. Block diagram of the presented system The statistical information from table 1 is concatenated to shape the input vector, and then, it entered to the neural network system. The neural network will start to propagate the input through the network layers and calculate the output value. The output value is 1 if the file is a stego MP3 file and 0 otherwise. Figure 3 shown the diagram of the proposed system Figure 3 illustrates the block diagram of the proposed system. The system initially read the target MP3 file and gets its parameters, to form the input vector. The input vector should be propagated proposed model which will processes and encode to determine if the input MP3 file as stego file or not. The output will be a fraction between 0 and 1 according to the activation function of the output layer (i.e. linear function from 0 to 1). Approximation of the output will be used where the output will be considered to be 0 if it s less than 0.2. In contrast, the output will be considered to be 1 if it s higher than 0.8. This approximation (in other words, digital encoding) will activate the final result. The output 1 indicates that, the input file is detected as a steganography MP3 file, while the output 0 indicates that, the input file is detected as normal MP3 file and no steganography data is assumed to be embedding within it. Some time by transferring the Stego file via social media, such as , messenger, memory storage, or any other image transfer technology; the most important criterion is that, the original MP3 (without hidden message) will not lose its accuracy. If the stego audio file faced a distortion in an audibly noticeable way, two drawbacks will be faced; the first is to make the audio MP3 not reliable for common use and human ear, and the second is, it will be subjected to some question marks and thus, it will be easy in some way to detect it. The performance evaluation that is described in table II is actually the replacement of comparison with other related work as it shown in table III. It in fact compares the power of the presented algorithm with the impact of the related works to hide the data message within a stego file. TABLE III COMPARSION FOR STEGO FILE AND SUCCESSFUL ACCURACFY Paper Technique Proposed Model Accuracy [9] LSB Conversional 75% [10] AM PCA 95% [11] LSB Embedding SVM 95% with FFt [12] QIM Embedded SVM 89% [13] Mel-Ceptrum Embedded SVM 50% [14] Multiply Embed model Embedded SVM 94% The quality of input stego audio files that is shown in figure 4 illustrates that, the proposal model using neural network can attack the steganography MP3 file. The very low

5 International Journal of Engineering & Technology IJET-IJENS Vol:15 No:04 78 distortion will not stop the proposal model and its capable detects the message existence regardless of the noise level. Fig. 4. Comparsion of MP3 file before and after Embedding the secrt text message The proposed model has the ability to extract the features of MP3 file, then, it is able to detect the inconsistency in the basic structure. In contrast, the steganography algorithms are normally concentrates on hiding the message with low distortion of the general structure of file with fine details like Peak Signal-to-Noise Ratio PSNR and Mean Square Error MSE. The accuracy of building steganography file with very low distortion is not real performance. That is because; the basic structure of the audio or sound signal is not the same before and after steganography. Therefore, the proposed Model presented in this paper used unique feature set of audio file and shown an ability attack different stego file with an accuracy percentage around 98%. REFERENCES [1] Curran, K. and Bailey, (June, 2006) An evaluation of imagebased steganography methods, International Journal of Digital Evidence, Multimed Tools Appl, Springer Science + Business Media, 30, pp [2] Wang, H & Wang, S, (October 2004), Cyber warfare: Steganography vs. Steganalysis, Communications of the ACM, New York, NY, USA, 47(10), pp [3] S.K.Bandyopadhyay, Debnath Bhattacharyya, Poulumi Das, S. Mukherjee, D. Ganguly, (August 2008), A Tutorial Review on Steganography, IC3 Noida, pp [4] Nameer N. EL-Emam, (April 2007), Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science, pp , [5] Shashikala Channalli, Ajay Jadhav, (2009) "Steganography: An Art of Hiding Data", International Journal on Computer Science and Engineering IJCSE, 1(3), pp [6] Waffaa S. Ahmed and Loay E. George, (March, 2013), "Audio Hiding Using Wavelet Transform with Amplitude Modulation", Journal of Al-Nahrain University, 16 (1), pp [7] B. Geetha vani, Prof. E. V. Prasad, (2003) "A Hybrid Model for Secure Data Transfer in Audio Signals using HCNN and DD DWT", (IJACSA) International Journal of Advanced Computer Science and Applications IJACSA, 4(7), pp [8] Abdulaleem Z. Al-Othmani, Azizah Abdul Manaf and Akram M. Zeki. A Survey on Steganography Techniques in Real Time Audio Signals and Evaluation. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January ISSN (Online): [9] M. Jiang, E. Wong, N. Memon and X. Wu, (December 2004), "A Simple Technique For Estimating Message Lengths For Additive Noise Steganography", 8th International Conference on Control, Automation, Robotics lind Vision Kunming, China, 1(2), pp [10] J. W. Fu, Y.C. QI and J. S. Yuan, (Nov 2007), Wavelet Domain Audio Steganalysis Based On Statistical Moments And PCA, Proceedings of the 2007 International Conference on Wavelet Analysis and Pattern Recognition, Beijing, China, pp [11] W. Zeng, H. Ai, R. Hu, (Aug 2007) A Novel Steganalysis Algorithm of Phase Coding in Audio Signal, International Conference on Advanced Language Processing and Web Information Technology, 1(4), pp [12] H.-Y. Gao, A Blind Steganalysis Algorithm of QIM-based Hiding, (Aug 2008), International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp [13] J.-W. Fu, Y.-C. QI, J.-S. Yuan, (July 2009), Wavelet Domain Audio Steganalysis For Multiplicative Embedding Model, International Conference On Wavelet Analysis And Pattern Recognition, Baoding, pp [14] J. Cosic and M. Baca, (Sep 2010), Steganography and Steganalysis - Does Local Web Sites Contain Stego Contents?, ELMAR, 2010 PROCEEDINGS, pp Mr. Alaa alarood He still continues his Ph.D. in Universiti Teknologi Malaysia (UTM) Faculty of computing. He is Lecturer of king abed alaziz university, Department of Computing and Information Technology.His research interests are Artificial Intelligence ANN, Information Security, and Computer Graphics. (aaarood@kau.edu.sa) Prof. Azizah Abdul Manaf, Professor of Computer Science, Deputy Dean Academic Advanced Informatics School (UTM AIS) Universiti Teknologi Malaysia (UTM) her research interests are Image Processing, Multimedia Security, Computer Forensics, azizaham.kl@utm.my Subariah Ibrahim Associate Professor in Faculty of computing at Universiti Teknologi Malaysia (UTM) her research interests are cryptography, steganography, security of data, pixels, authentication. subariah@utm.my Mohammed J. Alhaddad Associate Professor in Faculty of Information Technology at King Abdul-Aziz University. Honorary Lecturer at Essex University, UK, School of Computer Science and Electronic Engineer and Visiting Associate Professor at University Teknologi Malaysia, His research interests are: network Security, Artificial Intelligence, Robots, Brain Computer Interface BCI (malhaddad@kau.edu.sa)..

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

International Journal of Computer Engineering and Applications,

International Journal of Computer Engineering and Applications, International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO International journal of computer science & information Technology (IJCSIT) Vol., No.5, October A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO Pranab Kumar Dhar *, Mohammad

More information

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

Appendix A. Definition of Terms

Appendix A. Definition of Terms Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted

More information

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

QR-Code Image Steganography

QR-Code Image Steganography M. Ramesh 1,,G.Prabakaran 2 and R. Bhavani 3 1 Department of CSE, Assistant Professor, AVS college of Engineering & Technology, Nellore 524 111, India. 2,3 Department of CSE, Faculty of Engineering & Technology,

More information

Image Processing and Watermark

Image Processing and Watermark IJCST Vo l. 7, Is s u e 1, Ja n - Ma r c h 2016 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Image Processing and Watermark 1 Dr. Amit Verma, 2 Navdeep Kaur Gill 1,2 Dept. Computer Science and Engineering,

More information

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME

A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam

More information

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information

More information

Image Compression: An Artificial Neural Network Approach

Image Compression: An Artificial Neural Network Approach Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and

More information

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)

New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding) New Technique for Encoding the Secret to Enhance the Performance of Image Steganography Method (MPK Encoding) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al -

More information

A Novel Information Security Scheme using Cryptic Steganography

A Novel Information Security Scheme using Cryptic Steganography A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in

More information

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Mr. K. Nandha Kumar 1, Mr. R. Anandan 2 1PG Scholar, Department of Electronics and Communication Engineering, Gojan School of Business

More information

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Secured Watermarking in DCT Domain using CRT and Complexity Analysis Secured Watermarking in DCT Domain using CRT and Complexity Analysis Varun Kumar Department of Electronics & Communication Engg Om Institute of Technology and Management, HISAR-125001, INDIA Kuldeep Bhardwaj

More information

A NOVEL METHOD FOR HIDING INFORMATION

A NOVEL METHOD FOR HIDING INFORMATION A NOVEL METHOD FOR HIDING INFORMATION Samer Thaaban Abaas Al-Shibley Education College, Kufa University samir-alshebly@uokufa.edu.iq Abstract In this paper, we introduce a new method to hide information

More information

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers A. Salhi, B. Minaoui, M. Fakir, H. Chakib, H. Grimech Faculty of science and Technology Sultan Moulay Slimane

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

EFFECTIVE USE OF STEGANOGRAPHY ON AUDIO WAVE AND SPY ANALYSIS

EFFECTIVE USE OF STEGANOGRAPHY ON AUDIO WAVE AND SPY ANALYSIS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 4, July-August 2016, pp. 32 39, Article ID: IJECET_07_04_004 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=4

More information

Application of Data Hiding in Audio-Video Using Advance Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT Maneesha Paliwal Research scholar Computer Science and Engineering Department Samrat Ashok Technological Institute Vidisha (M.P.),

More information

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE 1 Naitik P Kamdar, 2 Dipesh G. Kamdar 3 Dharmesh N.khandhar. 1 (Student of Master of Engineering in Electronics & Communication,

More information

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT COMPARISO BETWEE TWO WATERMARKIG ALGORITHMS USIG DCT COEFFICIET, AD LSB REPLACEMET Mona M. El-Ghoneimy Associate Professor, Elect. & Comm. Dept., Faculty of Engineering, Cairo University, Post code 12316

More information

3D Mesh Sequence Compression Using Thin-plate Spline based Prediction

3D Mesh Sequence Compression Using Thin-plate Spline based Prediction Appl. Math. Inf. Sci. 10, No. 4, 1603-1608 (2016) 1603 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.18576/amis/100440 3D Mesh Sequence Compression Using Thin-plate

More information

Robust DWT Based Technique for Digital Watermarking

Robust DWT Based Technique for Digital Watermarking Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

A Digital Video Watermarking Algorithm Based on LSB and DCT

A Digital Video Watermarking Algorithm Based on LSB and DCT A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

The Effect of Various Number of Least Significant Bits substitution in Audio using Discrete Cosine Transform

The Effect of Various Number of Least Significant Bits substitution in Audio using Discrete Cosine Transform www.ijcsi.org 298 The Effect of Various Number of Least Significant Bits substitution in Audio using Discrete Cosine Transform Sahib Khan 1, Umar Said 2, Ejaz Ahmad 3, Fazlullah 4 and Mukhtair Ali 5 1-5

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

Survey paper - Audio-Video Steganography Using Anti Forensics Technique Survey paper - Audio-Video Steganography Using Anti Forensics Technique Ms. V.Sarangpure 1 ; Mrs. R. B. Talmale 2 ;Ms. M. Domke 3 1 Final Year M. Tech (CSE), Tulsiramji Gaikwad Patil College of Engineering

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of

More information

Metamorphosis of High Capacity Steganography Schemes

Metamorphosis of High Capacity Steganography Schemes 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami

More information

Secret Communication through Audio for Defense Application

Secret Communication through Audio for Defense Application Secret Communication through Audio for Defense Application A.Nageshwar Rao Maduguri Sudhir R.Venkatesh Abstract: A steganographic method of embedding textual information in an audio file is presented in

More information

Data Hiding in Color Images Using Modified Quantization Table

Data Hiding in Color Images Using Modified Quantization Table Data Hiding in Color Images Using Modified Quantization Table Neha Batra 1 Pooja Kaushik 2 1 Pursuing M.Tech, Dept., of ECE, MMU, Mullana, India 2 Assistant Professor, Dept., of ECE, MMU, Mullana, India

More information

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2 International Journal of Scientific Research and Management (IJSRM) Volume 5 Issue 06 Pages 5378-5385 2017 Website: www.ijsrm.in ISSN (e): 2321-3418 Index Copernicus value (2015): 57.47 DOI: 10.18535/ijsrm/v5i6.04

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

Feature Based Watermarking Algorithm by Adopting Arnold Transform

Feature Based Watermarking Algorithm by Adopting Arnold Transform Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate

More information

DCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM. Jeoong Sung Park and Tokunbo Ogunfunmi

DCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM. Jeoong Sung Park and Tokunbo Ogunfunmi DCT-BASED IMAGE QUALITY ASSESSMENT FOR MOBILE SYSTEM Jeoong Sung Park and Tokunbo Ogunfunmi Department of Electrical Engineering Santa Clara University Santa Clara, CA 9553, USA Email: jeoongsung@gmail.com

More information

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm Prabhu Kumar 1,, Nikhil Tirpathi, 2, G.Michael 3 UG Student, Dept. of CSE, Bharath University, Chennai, India 1,2 Assistant

More information

A Survey on An Advanced Approach For Motion Video Steganography Using LSB Technique

A Survey on An Advanced Approach For Motion Video Steganography Using LSB Technique A Survey on An Advanced Approach For Motion Video Steganography Using LSB Technique Megha K.Patel 1, Ujas S.Patel 2 1 Student(Master of Engineering), Computer Engineering Department, Laljibhai Chaturbhai

More information

Fast Real-Time Hardware Engine for Multipoint Text Steganography

Fast Real-Time Hardware Engine for Multipoint Text Steganography Fast Real-Time Hardware Engine for Multipoint Text Steganography Ammar Odeh, Khaled Elleithy, and Miad Faezipour Dept. of Computer Science and Engineering University Of Bridgeport Bridgeport, CT 06604,

More information

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method

DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method DWT-SVD Based Hybrid Approach for Digital Watermarking Using Fusion Method Sonal Varshney M.tech Scholar Galgotias University Abhinandan Singh M.tech Scholar Galgotias University Abstract With the rapid

More information

AUDIO-VIDEO STEGANOGRAPHY USING FACE RECOGNITION TECHNIQUE FOR AUTHENTICATION

AUDIO-VIDEO STEGANOGRAPHY USING FACE RECOGNITION TECHNIQUE FOR AUTHENTICATION AUDIO-VIDEO STEGANOGRAPHY USING FACE RECOGNITION TECHNIQUE FOR AUTHENTICATION Sumanth C, Dr. M B Meenavathi Abstract - Steganography is a method of hiding any secret information like password, text, image

More information

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based

More information

User-Friendly Sharing System using Polynomials with Different Primes in Two Images

User-Friendly Sharing System using Polynomials with Different Primes in Two Images User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra

More information

EMBEDDING WATERMARK IN VIDEO RECORDS

EMBEDDING WATERMARK IN VIDEO RECORDS EMBEDDING WATERMARK IN VIDEO RECORDS D.Abirami UG (CSE), Sri Krishna College of Technology, Anna University abidhanabal17@gmail.com R.Gowsika UG (CSE), Sri Krishna College of Technology, Anna University

More information

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION D. AMBIKA *, Research Scholar, Department of Computer Science, Avinashilingam Institute

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

Implementation of Random Byte Hiding algorithm in Video Steganography

Implementation of Random Byte Hiding algorithm in Video Steganography Implementation of Random Byte Hiding algorithm in Video Steganography S.Aswath 1, K.Akshara 2, P.Pavithra 2, D.S.Abinaya 2 Asssisant Professor 1, Student 2 (IV Year) Department of Electronics and Communication

More information

A Review of Approaches for Steganography

A Review of Approaches for Steganography International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 6, June-2018 SECURE DATA HIDING IN AUDIO

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD

A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute

More information

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform Wafaa Mustafa Abduallah 1, Abdul Monem S. Rahma 2, and Al-Sakib Khan Pathan 1 1 Department of Computer Science,

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm

Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm Video Watermarking Technique Based On Combined DCT and DWT Using PN Sequence Algorithm Darshan M. S 1, Sudha B. S 2, 1 M.Tech Scholar, Department of ECE, Dr. Ambedkar Institute of Technology, Bangalore,

More information

Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique

Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Sarita R. Visavalia 1, Dr. Amit Ganatra 2 1 Department of Information Technology, CHARUSAT, India 2 Dpartmentof Computer

More information

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication

QR Code Watermarking Algorithm Based on DWT and Counterlet Transform for Authentication Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1233-1244 Research India Publications http://www.ripublication.com QR Code Watermarking Algorithm Based on

More information

Robust Image Watermarking based on DCT-DWT- SVD Method

Robust Image Watermarking based on DCT-DWT- SVD Method Robust Image Watermarking based on DCT-DWT- SVD Sneha Jose Rajesh Cherian Roy, PhD. Sreenesh Shashidharan ABSTRACT Hybrid Image watermarking scheme proposed based on Discrete Cosine Transform (DCT)-Discrete

More information

Complex Encryption Methodology Based On Two Level Encryption Technique

Complex Encryption Methodology Based On Two Level Encryption Technique Complex Encryption Methodology Based On Two Level Encryption Technique Samir Kumar Bandyopadhyay University of Calcutta India skb1@vsnl.com ABSTRACT: In this paper a complex encryption methodology has

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

An Improved Performance of Watermarking In DWT Domain Using SVD

An Improved Performance of Watermarking In DWT Domain Using SVD An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program K. Jayamalini 1, Shashank Dubey 2, Ashish Singh 3, Geetesh Tiwari 4, Gaurav Singh 5

More information

COMBINING NEURAL NETWORKS FOR SKIN DETECTION

COMBINING NEURAL NETWORKS FOR SKIN DETECTION COMBINING NEURAL NETWORKS FOR SKIN DETECTION Chelsia Amy Doukim 1, Jamal Ahmad Dargham 1, Ali Chekima 1 and Sigeru Omatu 2 1 School of Engineering and Information Technology, Universiti Malaysia Sabah,

More information

University of Mustansiriyah, Baghdad, Iraq

University of Mustansiriyah, Baghdad, Iraq Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Compression

More information

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING

COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING International Journal of Computer Engineering and Applications, Volume X, Issue VII, July 16 www.ijcea.com ISSN 2321-3469 COMPARATIVE STUDY OF HISTOGRAM SHIFTING ALGORITHMS FOR DIGITAL WATERMARKING Geeta

More information

Receiver Operating Characteristic (ROC) Graph to Determine the Most Suitable Pairs Analysis Threshold Value

Receiver Operating Characteristic (ROC) Graph to Determine the Most Suitable Pairs Analysis Threshold Value Advances in Electrical and Electronics Engineering - IAENG Special Edition of the World Congress on Engineering and Computer Science 2008 Receiver Operating Characteristic (ROC) Graph to Determine the

More information

A Survey on Digital Image Steganography and Steganalysis

A Survey on Digital Image Steganography and Steganalysis IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 8, Issue 1 (Sep. - Oct. 2013), PP 56-60 A Survey on Digital Image Steganography and Steganalysis

More information

Advanced Digital Image Forgery Detection by Using SIFT

Advanced Digital Image Forgery Detection by Using SIFT RESEARCH ARTICLE OPEN ACCESS Advanced Digital Image Forgery Detection by Using SIFT Priyanka G. Gomase, Nisha R. Wankhade Department of Information Technology, Yeshwantrao Chavan College of Engineering

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 Volume 1 Issue 4 ǁ May 2016 ǁ PP.01-07 Comparative Analysis of 2-Level and 4-Level for Watermarking and Tampering

More information